Identifier Registry --> Cooperative ITS Credentials Management System:
service identifiers

Definitions

service identifiers (Information Flow): Identifiers assigned to particular services, and the context necessary when and how to use these identifiers.

Identifier Registry (Source Physical Object): The 'Identifier Registry' maintains identifiers that must be unique to facilitate interoperability in the connected vehicle environment.

Cooperative ITS Credentials Management System (Destination Physical Object): The 'Cooperative ITS Credentials Management System' (CCMS) is a high-level aggregate representation of the interconnected systems that enable trusted communications between mobile devices and other mobile devices, roadside devices, and centers and protect data they handle from unauthorized access. Representing the different interconnected systems that make up a Public Key Infrastructure (PKI), this physical object represents an end user view of the credentials management system with focus on the exchanges between the CCMS and user devices that support the secure distribution, use, and revocation of trust credentials.

Included In

This Triple is in the following Service Packages:

This triple is associated with the following Functional Objects:

This Triple is described by the following Functional View Data Flows:

This Triple has the following triple relationships:

Communication Solutions

  • No communications solutions identified.
  • Characteristics

    CharacteristicValue
    Time Context Recent
    Spatial Context Regional
    Acknowledgement True
    CardinalityUnicast
    InitiatorSource
    AuthenticableTrue
    EncryptFalse


    InteroperabilityDescription
    NationalThis triple should be implemented consistently within the geopolitical region through which movement is essentially free (e.g., the United States, the European Union).

    Security

    Information Flow Security
      Confidentiality Integrity Availability
    Rating Low High Low
    Basis Likely openly published information. Identifiers are used with associated permissions to determine who/what can perform various activities. A compromise in this information would significantly compromise all of C-ITS that was affected. Identifiers are expected to be updated infrequently, thus requiring only intermittent connectivity to the CCMS.


    Security CharacteristicsValue
    AuthenticableTrue
    Encrypt False