Trusted computing for automotive systems

被引:0
|
作者
Bogdanov, A. [1 ]
Eisenbarth, T.
Wolf, M. [1 ]
Wollinger, T. [1 ]
机构
[1] Embedded Sec, Bochum, Germany
来源
AUTOMOTIVE SECURITY | 2007年 / 2016卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
For new automotive applications and services, information technology (IT) has gained central importance. Safety and reliability has become a relatively well-established field. However, the protection of vehicular IT-systems against systematic manipulation or intrusion has started to emerge just recently. For example, user privacy aspects aren't considered at all for the time being. Nevertheless, some complex IT-systems are already base of various security-critical vehicular applications, such as immobilizers or digital tachographs. In Order to securely enable future automotive applications and business models while ensuring users' privacy as well, IT-security will be an obligatory technology for the next generation of vehicles.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 50 条
  • [41] How trustworthy is trusted computing?
    Vaughan-Nichols, SJ
    COMPUTER, 2003, 36 (03) : 18 - 20
  • [42] High Time for Trusted Computing
    Potter, Bruce
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 54 - 56
  • [43] The trusted computing exemplar project
    Irvine, CE
    Levin, TE
    Nguyen, TD
    Dinolt, GW
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 109 - 115
  • [44] Development of Trusted Computing Research
    ZHANG Huanguo~ 1
    2. State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1407 - 1413
  • [45] TOCTOU, traps, and trusted computing
    Bratus, Sergey
    D'Cunha, Nihal
    Sparks, Evan
    Smith, Sean W.
    TRUSTED COMPUTING - CHALLENGES AND APPLICATIONS, PROCEEDINGS, 2008, 4968 : 14 - 32
  • [46] Autonomic and trusted computing paradigms
    Li, Xiaolin
    Kang, Hui
    Harrington, Patrick
    Thomas, Johnson
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 143 - 152
  • [47] Reconfigurable Trusted Computing in Hardware
    Eisenbarth, Thomas
    Gueneysu, Tim
    Paar, Christof
    Sadeghi, Ahmad-Reza
    Schellekens, Dries
    Wolf, Marko
    STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 15 - 20
  • [48] Advances in trusted network computing
    Wu, Yulei
    Wang, Guojun
    Al-Dubai, Ahmed
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1311 - 1312
  • [49] Trusted Environments for Volunteer Computing
    Ianni, Michele
    Masciari, Elio
    2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2018, : 526 - 529
  • [50] A cluster of patterns for trusted computing
    Eduardo B. Fernandez
    Antonio Muñoz
    International Journal of Information Security, 2025, 24 (1)