PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Information systems safety in a context of autmotive applications

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Strong expansion of IT tools in area of management and control of systems and devices of road transport is connected inseparably with a need of assurance of proper level of credibility and data safety. In paper one related to issues connected with threatens and ways of their reduction in a context of selected law regulation and analysis obtained during studies on modern motion sensor applied in system of digital tachograph in vehicles from delivery trucks and buses group. Departures from assumed scheme of information flow in vehicle can result from random interfering environmental factors as well as , action taken deliberately for specific purpose, as change of object's operation (e.g. tuning of power transmission system), or illicit modification of data subjected to revision by institutions obligated to control of vehicle. Presented in the paper example of threads and methods of information protection are part of the whole system of defined threats and securities necessary to obtain applied certificates granted by selected institutions such as BSI (Bundesamt für Sicherheit in der Informationstechnik) and development of so called PPprotection profile. In summary there are also pointed another ways to enhance a security level of described system such as e.g. redundancy in acquiring and transmission of data.
Twórcy
autor
autor
  • University of Warmia and Mazury in Olsztyn Faculty of Technical Sciences, S..oneczna Street 46A, 10-710 Olsztyn, tel.: 89 524 51 50, fax: 89 524 51 01, smieja@uwm.edu.pl
Bibliografia
  • [1] Council Regulation (EEC) No. 3821/85 from December 20, 1985.
  • [2] Comission Regulation (EC) No. 1360/2002 from June 13, 2002.
  • [3] Comission Regulation (EC) No. 1266/2009 from December 16, 2009.
  • [4] ISO 16844-3 (Road vehicles-Tachograph systems Part 3: Motion sensor interface).
  • [5] PN-ISO/IEC 15408-1:2002 Information technology - Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model.
  • [6] PN-ISO/IEC 15408-3:2002 Information technology - Security techniques – Evaluation criteria for IT security – Part 3: Requirements for justification of trust for security.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUJ8-0021-0015
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.