Table of Contents - X.1384 (09/2024) - Security requirements and guidelines for vehicular edge computing
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of vehicular edge computing (VEC) 7 Threats identified in vehicle edge computing 7.1 Threats to confidentiality 7.2 Threats to integrity 7.3 Threats to availability 7.4 Threats to non-repudiation 7.5 Threats to authenticity 8 Security requirements 8.1 Confidentiality 8.2 Integrity 8.3 Availability 8.4 Non-repudiation 8.5 Authenticity 9 Use cases for vehicular edge computing 9.1 Real-time situational awareness 9.2 Cooperative passing assistant 9.3 Vulnerable road user discovery Bibliography
|