Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
First, some definitions and context:
Situation data: applies to the fundamental data that move throughout the system.  e.g., location of a vehicle at a specific time; color of traffic light at a specific time.  So whenever data on the state of an element is transmitted, it needs to include a time stamp.
Time and place context:  e.g., vehicle location is hyper-local data: needs to be known at the millisecond level.  But, it can also be used in other contexts, where it does not need to be hyper-local any more.   Can be aggregated, for example, for analysis – derivative data.  And can then be returned back to hyper-local level, to assist drivers with decisions
This is a fundamental concern – and needs to be built into the design of the system from the beginning.
Privacy/anonymity protection team – to guide development to ensure that privacy protection is application and communication media neutral.
To facilitate the movement of data from one object in the system to another
New collections of objects are constantly forming, dissolving and re-forming.  Never the same collection of objects for very long.
So, an overall data exchange strategy is needed that that takes this into account.
The data exchange sequence is designed to work in this context: objects come together, establish trust, communicate, dissolve, and have a record to deal with disputes
The CV architecture and systems are designed to address all these needs – now we are testing them to see how well they work, both with transactional data, and in “broadcast mode.”
Integrity: being able to detect bad actors/bad data
Uniform deployment based on concepts developed in Southeast Michigan 2014 project.
More likely that system will be interoperable.
Goal is continent-wide deployment.  Everything in the testing is being developed to be deployed on a much larger scale.
Comments and critiques are welcome
Question: How do we know when a particular application is “approved” 
Answer: Complex policy question – no answer yet.  We will learn more about the level of governance and peer review needed as we move ahead
Question: What is the threat model used to evaluate security?  Who is the attacker?
Answer: everything from innocent pranksters to malicious hackers