Identifier Registry --> Other Identifier Registries:
identifier coordination
This triple is bi-directional. See also
Other Identifier Registries --> Identifier Registry: identifier coordination
Definitions
identifier coordination (Information Flow): Coordination of identifiers between registries to help ensure no duplication of identifier assignments.
Identifier Registry (Source Physical Object): The 'Identifier Registry' maintains identifiers that must be unique to facilitate interoperability in the connected vehicle environment.
Other Identifier Registries (Destination Physical Object): 'Other Identifier Registries' provides a source and destination for information flows between registries, supporting coordination between registries.
Included In
This Triple is in the following Service Packages:
This triple is associated with the following Functional Objects:
This Triple is described by the following Functional View Data Flows:
This Triple has the following triple relationships:
Relationship | Source | Destination | Flow |
---|---|---|---|
Request-Response | Other Identifier Registries | Identifier Registry | identifier coordination |
Communication Solutions
No communications solutions identified.Characteristics
Characteristic | Value |
---|---|
Time Context | Recent |
Spatial Context | Regional |
Acknowledgement | True |
Cardinality | Unicast |
Initiator | Source |
Authenticable | True |
Encrypt | False |
Interoperability | Description |
---|---|
Regional | Interoperability throughout the geopolitical region is highly desirable, but if implemented differently in different transportation management jurisdictions, significant benefits will still accrue in each jurisdiction. Regardless, this Information Flow Triple should be implemented consistently within a transportation jurisdiction (i.e., the scope of a regional architecture). |
Security
Information Flow Security | ||||
---|---|---|---|---|
Confidentiality | Integrity | Availability | ||
Rating | Low | High | Low | |
Basis | Likely openly published information. | Identifiers are used with associated permissions to determine who/what can perform various activities. A compromise in this information would significantly compromise all of C-ITS that was affected. | Identifiers are expected to be updated infrequently, thus requiring only intermittent connectivity to the CCMS. |
Security Characteristics | Value |
---|---|
Authenticable | True |
Encrypt | False |