Table of Contents - X.1384 (09/2024) - Security requirements and guidelines for vehicular edge computing

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of vehicular edge computing (VEC)
7 Threats identified in vehicle edge computing
7.1 Threats to confidentiality
7.2 Threats to integrity
7.3 Threats to availability
7.4 Threats to non-repudiation
7.5 Threats to authenticity
8 Security requirements
8.1 Confidentiality
8.2 Integrity
8.3 Availability
8.4 Non-repudiation
8.5 Authenticity
9 Use cases for vehicular edge computing
9.1 Real-time situational awareness
9.2 Cooperative passing assistant
9.3 Vulnerable road user discovery
Bibliography