Results for area 13.2 Roles
combination of enabling technologies and services that will provide the foundation for the support of a distributed, diverse set of applications/application transactions, which work in conjunction with ‘External Support Systems’ such as ‘Certificate Authorities’; the system boundary for the core system is not defined in terms of devices or agencies or vendors, but by the open, standardized interface specifications that govern the behaviour of all interactions between core system users
staff that operate and maintain the ‘Core System’
NOTE 1 to entry In addition to network managers and operations personnel, ‘Core System’ personnel includes the administrators, operators, maintainers, developers, deployers and testers.
facilities that assist in C-ITS service provision, including security credentials certificate and registration authorities, that allow devices and systems to establish trust relationships
persons with mobile phones, tablets or similar communications devices that provide data collection and processing capacity to perform in the C-ITS context