The automotive industry is experiencing a transformation with the rapid integration of software-based systems inside vehicles, which are complex systems with multiple sensors. The use of vehicle sensor data has enabled vehicles to communicate with other entities in the connected vehicle ecosystem, such as the cloud, road infrastructure, other vehicles, pedestrians, and smart grids, using either cellular or wireless networks. This vehicle data are distributed, private, and vulnerable, which can compromise the safety and security of vehicles and their passengers. It is therefore necessary to design an access control mechanism around the vehicle data’s unique attributes and distributed nature. Since connected vehicles operate in a highly dynam...
Intelligent Transport Systems (ITS) are crucial to support Situation Awareness (SA), which aims to k...
[[abstract]]An intelligent transportation system is proposed to integrate information and communicat...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
[[abstract]]In this paper, we propose an Attribute-Based Access Control System (ABACS) for emergency...
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issu...
2019 Spring.Includes bibliographical references.Workflow is the automation of process logistics for ...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
This licentiate thesis work investigates two medium access control (MAC) methods, when used in traff...
This licentiate thesis work investigates two medium access control (MAC) methods, when used in traff...
Two current trends in the automotive industry are the increasing number of connected vehicles and au...
Vehicular networks (VANETs) have distinctive structures that distinguish them in comparison to gener...
Safety messages dissemination in vehicular networks requires real-time and deterministic medium acce...
Technology advancements in smart mobile devices empower mobile users by enhancing mobility, customiz...
In recent years, information technology has entered the automobile domain. Most of the functionality...
In recent years, information technology has entered the automobile domain. Most of the functionality...
Intelligent Transport Systems (ITS) are crucial to support Situation Awareness (SA), which aims to k...
[[abstract]]An intelligent transportation system is proposed to integrate information and communicat...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
[[abstract]]In this paper, we propose an Attribute-Based Access Control System (ABACS) for emergency...
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issu...
2019 Spring.Includes bibliographical references.Workflow is the automation of process logistics for ...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
This licentiate thesis work investigates two medium access control (MAC) methods, when used in traff...
This licentiate thesis work investigates two medium access control (MAC) methods, when used in traff...
Two current trends in the automotive industry are the increasing number of connected vehicles and au...
Vehicular networks (VANETs) have distinctive structures that distinguish them in comparison to gener...
Safety messages dissemination in vehicular networks requires real-time and deterministic medium acce...
Technology advancements in smart mobile devices empower mobile users by enhancing mobility, customiz...
In recent years, information technology has entered the automobile domain. Most of the functionality...
In recent years, information technology has entered the automobile domain. Most of the functionality...
Intelligent Transport Systems (ITS) are crucial to support Situation Awareness (SA), which aims to k...
[[abstract]]An intelligent transportation system is proposed to integrate information and communicat...
Role Based Access Control (RBAC) is an effective access control method for protecting i...