G. Ellison, J. Lacy, Dave Maher, Y. Nagao, Anahita D. Poonegar, Talal G. Shamoon
{"title":"汽车作为联网设备,或者如何制造可信的联网汽车","authors":"G. Ellison, J. Lacy, Dave Maher, Y. Nagao, Anahita D. Poonegar, Talal G. Shamoon","doi":"10.1109/IEVC.2012.6183244","DOIUrl":null,"url":null,"abstract":"This paper presents an overall approach to creating security and trust architecture for networked automotive vehicles and outlines basic principles for mitigating certain risks facing this new paradigm.","PeriodicalId":134818,"journal":{"name":"2012 IEEE International Electric Vehicle Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"The car as an Internet-enabled device, or how to make trusted networked cars\",\"authors\":\"G. Ellison, J. Lacy, Dave Maher, Y. Nagao, Anahita D. Poonegar, Talal G. Shamoon\",\"doi\":\"10.1109/IEVC.2012.6183244\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an overall approach to creating security and trust architecture for networked automotive vehicles and outlines basic principles for mitigating certain risks facing this new paradigm.\",\"PeriodicalId\":134818,\"journal\":{\"name\":\"2012 IEEE International Electric Vehicle Conference\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Electric Vehicle Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEVC.2012.6183244\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Electric Vehicle Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEVC.2012.6183244","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The car as an Internet-enabled device, or how to make trusted networked cars
This paper presents an overall approach to creating security and trust architecture for networked automotive vehicles and outlines basic principles for mitigating certain risks facing this new paradigm.