EVITA

E-safety vehicle intrusion protected applications
EVITA

Registration

Register here to receive username and password required for downloading the files.


Public reports

No. Deliverable name Date
D0 Project summary Apr. 2012
D1.2.5.1 Presentation slides from the EVITA Workshop on 1 July 2010 Jul. 2010
D1.2.5.2 Presentation slides from the Final EVITA Workshop on 23 November 2011 Nov. 2011
D1.2.6 Final liaisons documentation Mar. 2012
D1.2.7 Final dissemination strategy Apr. 2012
D2.1 Specification and evaluation of e-security relevant use cases Dec. 2009
D2.3 Security requirements for automotive on-board networks based on dark-side scenarios Dec. 2009
D2.4 Legal framework and requirements of automotive on-board networks Sept. 2011
D3.1 Security and trust model Nov. 2009
D3.2 Secure on-board architecture specification Aug. 2011
D3.3 Secure on-board protocols specification Jul. 2011
D3.4.3 On-board architecture and protocols verification Dec. 2010
D3.4.4 On-board architecture and protocols attack analysis Dec. 2010
D4.0.3 Security architecture implementation – Progress report Jul. 2011
D4.2.3 LLD modelling, verification, and automatic C-code generation Jan. 2012
D4.4.2 Test results Feb. 2012


SysML models

Requirement diagrams for automotive on-board networks

These models are to be viewed with the open source UML toolkit TTool.


Comment form

Download

15/05/2012


  • Home
  • Objectives
  • Work plan
  • Project partners
  • Fact sheet
  • Deliverables
  • Publications
  • News
  • Private area
  • Related links
  • Contact
  • Data Protection Information


Copyright © 2008 Fraunhofer SIT – Disclaimer & Imprint