‹#›
U.S. Department of Transportation
Research and Innovative Technology Administration
Triscallion_Black
Next Steps for Communications Security
§Conclusion: Approach provides us with a solid basis for moving to next step–prototyping and analyzing business models. 
§Next Steps:
□Refine security approach
▪Interoperability and scalability tests Fall 2011
□Engage privacy advocates
▪Privacy Roundtable – Outreach to privacy advocacy groups in Winter 2011
□Identify options for organizational and operational scenarios (see Roadmap for Safety Policy)
▪Certificate Management Entities – Organizational and Operational  Interim Models Spring 2012
▪Costs – Interim security cost estimates Spring 2012
▪Governance – Develop options and guidance for understanding roles and responsibilities  – Spring 2012
□Develop technical design (if appropriate)  – Spring 2012
□Test prototype during Safety Pilot Model Deployment
§