Home > Research > Publications & Outputs > Challenges of Privacy Requirements Modelling in...

Links

Text available via DOI:

View graph of relations

Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study. / Kibirige Mukisa, Sarah; Rashid, Awais.
2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 2017.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

APA

Vancouver

Kibirige Mukisa S, Rashid A. Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE. 2017 doi: 10.1109/REW.2017.48

Author

Kibirige Mukisa, Sarah ; Rashid, Awais. / Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study. 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 2017.

Bibtex

@inproceedings{dc70fbb15ac14b8587f5fb53fd44e0a6,
title = "Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study",
abstract = "Multi-agent approaches have a key role to play in intelligent transportation systems as such systems must service dynamically changing environments in an autonomous fashion. Such Intelligent Transportation Systems (ITS) are exemplified by Google{\textquoteright}s driverless car. The driverless car can be considered a multi-agent system because it involves multiple interacting intelligent agents analysing and detecting stimuli in its environment and mobilising suitable and safe responses to those stimuli. This position paper discusses the security threats that may result from introducing multiagent technology in such intelligent transportation systems.We argue that, while multi-agent approaches have a major role to play in this domain, their introduction in vehicleto-vehicle communication or autonomous driving systems raises new security challenges that must be addressed byboth cyber-security and multi-agent research.",
author = "{Kibirige Mukisa}, Sarah and Awais Rashid",
note = "{\textcopyright}2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.",
year = "2017",
month = sep,
day = "4",
doi = "10.1109/REW.2017.48",
language = "English",
booktitle = "2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

AU - Kibirige Mukisa, Sarah

AU - Rashid, Awais

N1 - ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2017/9/4

Y1 - 2017/9/4

N2 - Multi-agent approaches have a key role to play in intelligent transportation systems as such systems must service dynamically changing environments in an autonomous fashion. Such Intelligent Transportation Systems (ITS) are exemplified by Google’s driverless car. The driverless car can be considered a multi-agent system because it involves multiple interacting intelligent agents analysing and detecting stimuli in its environment and mobilising suitable and safe responses to those stimuli. This position paper discusses the security threats that may result from introducing multiagent technology in such intelligent transportation systems.We argue that, while multi-agent approaches have a major role to play in this domain, their introduction in vehicleto-vehicle communication or autonomous driving systems raises new security challenges that must be addressed byboth cyber-security and multi-agent research.

AB - Multi-agent approaches have a key role to play in intelligent transportation systems as such systems must service dynamically changing environments in an autonomous fashion. Such Intelligent Transportation Systems (ITS) are exemplified by Google’s driverless car. The driverless car can be considered a multi-agent system because it involves multiple interacting intelligent agents analysing and detecting stimuli in its environment and mobilising suitable and safe responses to those stimuli. This position paper discusses the security threats that may result from introducing multiagent technology in such intelligent transportation systems.We argue that, while multi-agent approaches have a major role to play in this domain, their introduction in vehicleto-vehicle communication or autonomous driving systems raises new security challenges that must be addressed byboth cyber-security and multi-agent research.

U2 - 10.1109/REW.2017.48

DO - 10.1109/REW.2017.48

M3 - Conference contribution/Paper

BT - 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)

PB - IEEE

ER -