{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:37:28Z","timestamp":1743154648700,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030397487"},{"type":"electronic","value":"9783030397494"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39749-4_2","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T13:03:07Z","timestamp":1579870987000},"page":"16-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Authorization Framework for\u00a0Cooperative Intelligent Transport Systems"],"prefix":"10.1007","author":[{"given":"Sowmya","family":"Ravidas","sequence":"first","affiliation":[]},{"given":"Priyanka","family":"Karkhanis","sequence":"additional","affiliation":[]},{"given":"Yanja","family":"Dajsuren","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"unstructured":"CONVERGE. \nhttps:\/\/converge-online.de\n\n. Accessed 25 June 2019","key":"2_CR1"},{"unstructured":"US-ITS. \nhttps:\/\/local.iteris.com\/arc-it\n\n. Accessed 25 June 2019","key":"2_CR2"},{"unstructured":"User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization. \nhttps:\/\/kantarainitiative.org\/file-downloads\/rec-oauth-uma-grant-2-0-pdf\/\n\n. Accessed 25 June 2019","key":"2_CR3"},{"unstructured":"Directive 2010\/40\/EU of the European Parliament and of the Council. Official Journal of the European Union, vol. 50, p. 207 (2010)","key":"2_CR4"},{"unstructured":"Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management. ETSI TS 102 940, ETSI (2018)","key":"2_CR5"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1002\/sec.641","volume":"6","author":"K Abrougui","year":"2013","unstructured":"Abrougui, K., Boukerche, A.: Efficient group-based authentication protocol for location-based service discovery in intelligent transportation systems. Secur. Commun. Netw. 6(4), 473\u2013484 (2013)","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Ahmad, T., Morelli, U., Ranise, S., Zannone, N.: A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study. In: Proceedings of Symposium on Access Control Models and Technologies, pp. 235\u2013246. ACM (2018)","key":"2_CR7","DOI":"10.1145\/3205977.3205989"},{"doi-asserted-by":"crossref","unstructured":"Albouq, S.S., Fredericks, E.M.: Securing communication between service providers and road side units in a connected vehicle infrastructure. In: Proceedings of International Symposium on Network Computing and Applications, pp. 1\u20135. IEEE (2017)","key":"2_CR8","DOI":"10.1109\/NCA.2017.8171378"},{"unstructured":"Dajsuren, Y., Karkhanis, P., Kadiogullary, D., Fuenfrocken, M.: C-MobILE D3.1 reference architecture. Technical report (2017). \nhttp:\/\/c-mobile-project.eu\/library\/","key":"2_CR9"},{"doi-asserted-by":"crossref","unstructured":"Damen, S., den Hartog, J., Zannone, N.: Collac: collaborative access control. In: Proceedings of International Conference on Collaboration Technologies and Systems, pp. 142\u2013149. IEEE (2014)","key":"2_CR10","DOI":"10.1109\/CTS.2014.6867557"},{"unstructured":"Denniss, W., Bradley, J.: OAuth 2.0 for Native Apps. RFC 8252, IETF (2017). \nhttps:\/\/tools.ietf.org\/html\/rfc6749","key":"2_CR11"},{"issue":"12","key":"2_CR12","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","volume":"55","author":"A Dorri","year":"2017","unstructured":"Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119\u2013125 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"12","key":"2_CR13","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/MCOM.2014.6979970","volume":"52","author":"A Festag","year":"2014","unstructured":"Festag, A.: Cooperative intelligent transport systems standards in Europe. IEEE Commun. Mag. 52(12), 166\u2013172 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.infsof.2008.04.004","volume":"51","author":"P Guarda","year":"2009","unstructured":"Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Software Technol. 51(2), 337\u2013350 (2009)","journal-title":"Inf. Software Technol."},{"doi-asserted-by":"crossref","unstructured":"Gupta, M., Sandhu, R.: Authorization framework for secure cloud assisted connected cars and vehicular internet of things. In: Proceedings of Symposium on Access Control Models and Technologies, pp. 193\u2013204. ACM (2018)","key":"2_CR15","DOI":"10.1145\/3205977.3205994"},{"issue":"3\/4","key":"2_CR16","first-page":"1","volume":"3","author":"JL Hern\u00e1ndez-Ramos","year":"2013","unstructured":"Hern\u00e1ndez-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3\/4), 1\u201316 (2013)","journal-title":"J. Internet Serv. Inf. Secur."},{"doi-asserted-by":"crossref","unstructured":"Jia, Y.J., et al.: ContexIoT: towards providing contextual integrity to appified IoT platforms. In: Proceedings of Network and Distributed System Security Symposium (2017)","key":"2_CR17","DOI":"10.14722\/ndss.2017.23051"},{"doi-asserted-by":"crossref","unstructured":"Kaluvuri, S.P., Egner, A.I., den Hartog, J., Zannone, N.: SAFAX - anextensible authorization service for cloud environments. Front. ICT (2015)","key":"2_CR18","DOI":"10.3389\/fict.2015.00009"},{"doi-asserted-by":"crossref","unstructured":"Karafili, E., Lupu, E.C.: Enabling data sharing in contextual environments: Policy representation and analysis. In: Proceedings of Symposium on Access Control Models and Technologies, pp. 231\u2013238. ACM (2017)","key":"2_CR19","DOI":"10.1145\/3078861.3078876"},{"doi-asserted-by":"crossref","unstructured":"Karkhanis, P., van den Brand, M., Rajkarnikar, S.: Defining the C-ITS reference architecture. In: Proceedings of International Conference on Software Architecture Companion, pp. 148\u2013151. IEEE (2018)","key":"2_CR20","DOI":"10.1109\/ICSA-C.2018.00044"},{"doi-asserted-by":"crossref","unstructured":"Laaroussi, Z., Morabito, R., Taleb, T.: Service provisioning in vehicular networks through edge and cloud: an empirical analysis. In: Proceedings of Conference on Standards for Communications and Networking. IEEE (2018)","key":"2_CR21","DOI":"10.1109\/CSCN.2018.8581855"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comcom.2018.09.010","volume":"132","author":"VH Le","year":"2018","unstructured":"Le, V.H., den Hartog, J., Zannone, N.: Security and privacy for innovative automotive applications: a survey. Comput. Commun. 132, 17\u201341 (2018)","journal-title":"Comput. Commun."},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-41483-6_15","volume-title":"Data and Applications Security and Privacy XXX","author":"R Mahmudlu","year":"2016","unstructured":"Mahmudlu, R., den Hartog, J., Zannone, N.: Data governance and transparency for collaborative systems. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 199\u2013216. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-41483-6_15"},{"doi-asserted-by":"crossref","unstructured":"Martinez, J.A., Ruiz, P.M., Marin, R.: Impact of the pre-authentication performance in vehicular networks. In: Proceedings of Vehicular Technology Conference-Fall. IEEE (2010)","key":"2_CR24","DOI":"10.1109\/VETECF.2010.5594249"},{"doi-asserted-by":"crossref","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L.: CNL4DSA: a controlled natural language for data sharing agreements. In: Proceedings of Symposium on Applied Computing, pp. 616\u2013620. ACM (2010)","key":"2_CR25","DOI":"10.1145\/1774088.1774218"},{"unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) v. 3.0. OASIS Standard (2013)","key":"2_CR26"},{"doi-asserted-by":"crossref","unstructured":"Ojanper\u00e4, T., M\u00e4kel\u00e4, J., M\u00e4mmel\u00e4, O., Majanen, M., Martikainen, O.: Use cases and communications architecture for 5G-enabled road safety services. In: Proceedings of European Conference on Networks and Communications, pp. 335\u2013340. IEEE (2018)","key":"2_CR27","DOI":"10.1109\/EuCNC.2018.8443193"},{"issue":"1","key":"2_CR28","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/3146025","volume":"51","author":"F Paci","year":"2018","unstructured":"Paci, F., Squicciarini, A.C., Zannone, N.: Survey on access control for community-centered collaborative systems. ACM Comput. Surv. 51(1), 6:1\u20136:38 (2018)","journal-title":"ACM Comput. Surv."},{"issue":"9","key":"2_CR29","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MC.2011.225","volume":"44","author":"S Pearson","year":"2011","unstructured":"Pearson, S., Casassa-Mont, M.: Sticky policies: an approach for managing privacy across multiple parties. Computer 44(9), 60\u201368 (2011)","journal-title":"Computer"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jnca.2019.06.017","volume":"144","author":"S Ravidas","year":"2019","unstructured":"Ravidas, S., Lekidis, A., Paci, F., Zannone, N.: Access control in internet-of-things: a survey. J. Netw. Comput. Appl. 144, 79\u2013101 (2019)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"2_CR31","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","volume":"13","author":"M Raya","year":"2006","unstructured":"Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13(5), 8\u201315 (2006)","journal-title":"IEEE Wirel. Commun."},{"doi-asserted-by":"crossref","unstructured":"Riabi, I., Saidane, L.A., Ayed, H.K.B.: A proposal of a distributed access control over Fog computing: the ITS use case. In: Proceedings of International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks. IEEE (2017)","key":"2_CR32","DOI":"10.23919\/PEMWN.2017.8308029"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-33331-1_2","volume-title":"Critical Information Infrastructures Security","author":"S Salonikias","year":"2016","unstructured":"Salonikias, S., Mavridis, I., Gritzalis, D.: Access control issues in utilizing fog computing for transport infrastructure. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 15\u201326. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-33331-1_2"},{"unstructured":"van Sambeek, M., et al.: Towards an architecture for cooperative-intelligent transport system (C-ITS) applications in the Netherlands. Technical report, DITCM Innovations (2015)","key":"2_CR34"},{"doi-asserted-by":"crossref","unstructured":"Schuster, R., Shmatikov, V., Tromer, E.: Situational access control in the internet of things. In: Proceedings of Conference on Computer and Communications Security, pp. 1056\u20131073. ACM (2018)","key":"2_CR35","DOI":"10.1145\/3243734.3243817"},{"doi-asserted-by":"crossref","unstructured":"Sha, K., Xi, Y., Shi, W., Schwiebert, L., Zhang, T.: Adaptive privacy-preserving authentication in vehicular networks. In: Proceedings of International Conference on Communications and Networking in China, pp. 1\u20138. IEEE (2006)","key":"2_CR36","DOI":"10.1109\/CHINACOM.2006.344746"},{"key":"2_CR37","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.cose.2016.04.006","volume":"60","author":"V Sucasas","year":"2016","unstructured":"Sucasas, V., Mantas, G., Saghezchi, F.B., Radwan, A., Rodriguez, J.: An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Computers & Security 60, 193\u2013205 (2016)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39749-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,25]],"date-time":"2020-01-25T00:14:04Z","timestamp":1579911244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-39749-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030397487","9783030397494"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39749-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iit.cnr.it\/etaa2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}