• Publications
  • Influence
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
The basic characteristics of vehicular networks are introduced, an overview of applications and associated requirements, along with challenges and their proposed solutions are provided, and the current and past major ITS programs and projects in the USA, Japan and Europe are provided.
Adding Attributes to Role-Based Access Control
Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly changing applications.
ABAC and RBAC: Scalable, Flexible, and Auditable Access Management
Is it possible to obtain the flexibility and advantages of attribute-based access control while maintaining role-based access control's advantages for analysis and risk control?
Service Management for ITS Using WAVE (1609.3) Networking
IT Risk and Resilience - Cybersecurity Response to COVID-19
The rapid and worldwide spread of the coronavirus and its illness known as COVID-19 has made huge impact on almost everything and the resulting economic, business, and social impact will last for years.
Vehicle Infrastructure Integration Proof‐of‐Concept Results and Findings – Infrastructure
The purpose and procedures for various tests are outlined, the test articles are identified, the results of that testing are documents, and the implications of those test results relative to the overall viability of the VII concept are discussed.
VPKI Hits the Highway: Secure Communication for the Connected Vehicle Program
The author discusses the ways in which government, industry, and academia have converged to bring the promise of vehicular networks as ITS into the reality of the 21st century.
Risk Assessment Methods for Cloud Computing Platforms
  • Timothy R. Weil
  • Computer Science
    IEEE 43rd Annual Computer Software and…
  • 1 July 2019
Risk assessment (RA) use cases for cloud computing platforms are presented in the context of an ISO 27001 Information Security Management System (ISMS) developed for Alcohol Monitoring Systems (AMS)
An RBAC Implementation and Interoperability Standard: The INCITS Cyber Security 1.1 Model
An operational definition for role-based access control (RBAC) is that permission assignment is based on the role a principal is assuming during a work session, so that IT permissions are assigned to roles rather than directly to users.