Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Security in C-ITS
6 Security analysis and controls for an IDX device
7 ISO/TS 21177 access control implementation guidance
8 C-ITS CP security requirements gaps and needs
Annex A (informative) Scenario threats
Annex B (informative) Scenario security objectives to security functional requirements mapping
Annex C (informative) Informative proposal for improvements of TS 21177:2019: CRL request
Annex D (informative) Informative proposal for complements to TS 21177:2019: Ownership and access policy
Annex E (informative) Informative proposal for improvements of TS 21177:2019: Errata, additional rationale material, and session persistence across certificate expiry
Bibliography