Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
Security for DSRC‐applications in the context of EFC has a long history in standardisation. Currently the area is covered by several standards, successively developed over time:
EN ISO 14906 (DSRC‐EFC) provides a toolbox of functions and security measures which can be used for DSRC application.
EN 15509 (IAP for DSRC‐EFC) defines an interoperable application profile which comprises a selection of such measures with a definition of security algorithms associated to it. It is based on the experience of many EU projects related to DSRC‐EFC.
TS 16439 analyses the threats to an EFC system as a whole, but not specifically for the DSRC technology. Instead of proposing new security measures, it reuses the EN 15509 security measures.
TS 12813 (CCC) and TS 13141 (LAC) mirror EN 15509 as best‐practice security measures.
TS 16702‐1 (SM‐CC) provides an EFC enforcement concept, partially dependent on a DSRC application.
As the security domain has evolved it is now necessary to again analyse the threats, vulnerabilities and risks of using the CEN DSRC technology in all DSRCbased applications related to EFC.
The Scope includes:
‐ a threat analysis, based on the EFC Security Framework, of the CEN DSRC link as used in EFC applications in the published standards or under revision (DSRC‐EFC, CCC,, LAC and SM‐CC);
‐ a qualitative risk analysis in relation to the context (local tolling system, interoperable tolling environment, EETS);
‐ an assessment of the current recommended or defined security algorithms and measures to identify existing and possible future security leaks;
‐ an outline of potential security measures which might be added to those already defined for DSRC;
‐ an analysis of effects on existing EFC systems and interoperability clusters;
‐ a set of recommendations on how to revise the current standards, or proposal for new work items, with already made implementations taken into account.
Reģistrācijas numurs (WIID)
58692
Darbības sfēra
Security for DSRC‐applications in the context of EFC has a long history in standardisation. Currently the area is covered by several standards, successively developed over time:
EN ISO 14906 (DSRC‐EFC) provides a toolbox of functions and security measures which can be used for DSRC application.
EN 15509 (IAP for DSRC‐EFC) defines an interoperable application profile which comprises a selection of such measures with a definition of security algorithms associated to it. It is based on the experience of many EU projects related to DSRC‐EFC.
TS 16439 analyses the threats to an EFC system as a whole, but not specifically for the DSRC technology. Instead of proposing new security measures, it reuses the EN 15509 security measures.
TS 12813 (CCC) and TS 13141 (LAC) mirror EN 15509 as best‐practice security measures.
TS 16702‐1 (SM‐CC) provides an EFC enforcement concept, partially dependent on a DSRC application.
As the security domain has evolved it is now necessary to again analyse the threats, vulnerabilities and risks of using the CEN DSRC technology in all DSRCbased applications related to EFC.
The Scope includes:
‐ a threat analysis, based on the EFC Security Framework, of the CEN DSRC link as used in EFC applications in the published standards or under revision (DSRC‐EFC, CCC,, LAC and SM‐CC);
‐ a qualitative risk analysis in relation to the context (local tolling system, interoperable tolling environment, EETS);
‐ an assessment of the current recommended or defined security algorithms and measures to identify existing and possible future security leaks;
‐ an outline of potential security measures which might be added to those already defined for DSRC;
‐ an analysis of effects on existing EFC systems and interoperability clusters;
‐ a set of recommendations on how to revise the current standards, or proposal for new work items, with already made implementations taken into account.