Security Analysis and Characteristical Constraints in the Automotive Domain

  • Marko Wolf


Based on the threat analysis in Chapter 5, this chapter describes how to identify the particular security objectives of the entities involved in typical automotive security-critical applications. It then describes how to deduce the corresponding security requirements to fulfill the before identified security objectives. It further indicates characteristical technical and non-technical constraints as well as characteristical advantages that have to be faced while establishing IT security in the automotive domain. Parts of this chapter are based on published research in [PW08, WWW07].


Security Requirement Security Analysis Security Measure Security Risk Vehicle Owner 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2009

Authors and Affiliations

  • Marko Wolf

There are no affiliations available

Personalised recommendations