BS EN ISO 17427-1:2018
$198.66
Intelligent transport systems. Cooperative ITS – Roles and responsibilities in the context of co-operative ITS architecture(s)
Published By | Publication Date | Number of Pages |
BSI | 2018 | 54 |
This document contains a detailed description of the (actor invariant) roles (3.22) and responsibilities (3.21) required to deploy and operate Cooperative-ITS (C-ITS) (3.8). The organization/organization of actors / roles described in this document are designed to be appropriate for any fully operational system that uses the C-ITS concepts and techniques in order to achieve its service provision. This document is presented in terms of an organizational or enterprise viewpoint (3.10) as defined in ISO/IEC 10746‑1.
This document is for all types of road traffic of all classes, and for any other actors involved in the provision of applications and services which use C-ITS techniques to achieve service provision. The description of roles is technology agnostic and, in terms of C-ITS, agnostic in respect of communication modes and embraces vehicle-vehicle communications, vehicle-infrastructure communications and infrastructure-infrastructure communications.
This document provides a methodology for the identification of service specific roles and their corresponding responsibilities based on a process oriented approach. Additionally, the methodology is used to identify the roles and responsibilities for C-ITS in general. Both the methodology as well as the roles and responsibilities for C-ITS are deduced from ISO/IEC 10746‑1, ISO/IEC 10746‑2,ISO/IEC 10746‑3, the reference model of Open Distributed Processing. Open Distributed Processing offers five viewpoints of which the enterprise viewpoint corresponds with the organizational architecture and its roles and responsibilities.
To limit the scope of the document to the core of C-ITS, the roles are separated into external and internal. Considered to be internal are all roles that are highly relevant for the purpose of achieving service provision by means of C-ITS. Considered to be external are all roles involved in C-ITS, but not set up only for the purpose of C-ITS.
This document provides a description of a high-level architectural viewpoint on C-ITS. It is designed to be used as a blueprint when implementing service provision systems that use C-ITS, and the corresponding organizational structures. The characteristics of C-ITS entail a huge number of data/ information exchanges. Therefore the implementation stringently respects privacy and data protection as it is defined in ISO/TR 12859 and in national laws and regulations (where instantiated). Privacy and data protection affects all roles defined in this document due to these characteristics and all actors occupying roles in C-ITS respects the corresponding standards and regulations.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
4 | European foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references |
10 | 3 Terms and definitions |
13 | 4 Abbreviated terms 5 Compliance 6 How to use this document 6.1 Roles and responsibilities in the context of Cooperative-ITS |
14 | 6.2 Guidance for developers and implementers of C-ITS application standards |
15 | Introduction and theoretical framework 7.1 Use of ODP 7.2 Transferring ODP to roles and responsibilities for C-ITS |
17 | 7.3 External enterprise objects |
18 | 7.4 Internal enterprise objects 8 Roles and responsibilities 8.1 Introduction 8.2 Generic description of organizational architecture |
19 | 8.2.1 System operation 8.2.2 Functional operation 8.2.3 System management 8.2.4 Policy framework |
20 | 8.3 General responsibilities of actors involved in C-ITS 8.3.1 Registration and authorization 8.3.2 Privacy and data protection |
21 | 8.4 Role — Functional operation 8.4.1 General 8.4.2 Sub-role — Generic functional operation |
23 | 8.4.3 Sub-role — Specific functional operation |
24 | 8.5 Role — System management 8.5.1 Sub-role — Service catalogue manager 8.5.2 Sub-role — C-ITS architect 8.5.3 Sub-role — Change manager 8.5.4 Sub-role — Test manager |
25 | 8.5.5 Sub-role — Service level manager 8.5.6 Sub-role — Homologation manager 8.5.7 Sub-role — Compliance manager 8.5.8 Sub-role — Financial manager 8.5.9 Sub-role — Service owner 8.5.10 Sub-role — Project manager 8.5.11 Sub-role — Information security manager 8.5.12 Sub-role — Privacy manager 8.6 Role — System operation 8.6.1 Sub-role — Capacity manager 8.6.2 Sub-role — Availability manager |
26 | 8.6.3 Sub-role — Technical analyst 8.6.4 Sub-role — Configuration manager 8.6.5 Sub-role — IT-operations manager 8.6.6 Sub-role — Access manager 8.7 Role — Policy framework 8.7.1 Sub-role — Non-regulatory policy institution 8.7.2 Sub-role —Cooperative ITS Credential Management system (CCMS) 8.7.3 Privacy body 8.7.4 Information security body 8.7.5 Sub-role — Authority |
27 | 8.8 Profiles |
28 | Annex A (informative) Methodology and its sample application |
39 | Annex B (informative) Profiles |
52 | Bibliography |