Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study
AU - Kibirige Mukisa, Sarah
AU - Rashid, Awais
N1 - ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
PY - 2017/9/4
Y1 - 2017/9/4
N2 - Multi-agent approaches have a key role to play in intelligent transportation systems as such systems must service dynamically changing environments in an autonomous fashion. Such Intelligent Transportation Systems (ITS) are exemplified by Google’s driverless car. The driverless car can be considered a multi-agent system because it involves multiple interacting intelligent agents analysing and detecting stimuli in its environment and mobilising suitable and safe responses to those stimuli. This position paper discusses the security threats that may result from introducing multiagent technology in such intelligent transportation systems.We argue that, while multi-agent approaches have a major role to play in this domain, their introduction in vehicleto-vehicle communication or autonomous driving systems raises new security challenges that must be addressed byboth cyber-security and multi-agent research.
AB - Multi-agent approaches have a key role to play in intelligent transportation systems as such systems must service dynamically changing environments in an autonomous fashion. Such Intelligent Transportation Systems (ITS) are exemplified by Google’s driverless car. The driverless car can be considered a multi-agent system because it involves multiple interacting intelligent agents analysing and detecting stimuli in its environment and mobilising suitable and safe responses to those stimuli. This position paper discusses the security threats that may result from introducing multiagent technology in such intelligent transportation systems.We argue that, while multi-agent approaches have a major role to play in this domain, their introduction in vehicleto-vehicle communication or autonomous driving systems raises new security challenges that must be addressed byboth cyber-security and multi-agent research.
U2 - 10.1109/REW.2017.48
DO - 10.1109/REW.2017.48
M3 - Conference contribution/Paper
BT - 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)
PB - IEEE
ER -