{"user_id":"263827","ipc":"H04L 9/40","department":[{"_id":"102"}],"type":"patent","title":"[EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS","citation":{"chicago":"Wette, Philip, Holger Kiehne, Johannes Morgenroth, and Sascha Guebner. “[EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS,” 2025.","alphadin":"Wette, Philip ; Kiehne, Holger ; Morgenroth, Johannes ; Guebner, Sascha: [EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS (2025)","ieee":"P. Wette, H. Kiehne, J. Morgenroth, and S. Guebner, “[EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS.” 2025.","ama":"Wette P, Kiehne H, Morgenroth J, Guebner S. [EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS. 2025.","short":"P. Wette, H. Kiehne, J. Morgenroth, S. Guebner, (2025).","apa":"Wette, P., Kiehne, H., Morgenroth, J., & Guebner, S. (2025). [EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS.","bibtex":"@article{Wette_Kiehne_Morgenroth_Guebner_2025, title={[EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS}, author={Wette, Philip and Kiehne, Holger and Morgenroth, Johannes and Guebner, Sascha}, year={2025} }","mla":"Wette, Philip, et al. [EN] PARTICIPATIVE SECURITY PROTOCOL FOR DATA CLOUD-BASED FUNCTIONS. 2025."},"_id":"6412","year":"2025","date_updated":"2025-12-12T08:33:18Z","date_created":"2025-12-11T12:34:48Z","status":"public","publication_date":"09.01.2025","author":[{"first_name":"Philip","id":"246560","last_name":"Wette","full_name":"Wette, Philip"},{"full_name":"Kiehne, Holger","last_name":"Kiehne","first_name":"Holger"},{"full_name":"Morgenroth, Johannes","last_name":"Morgenroth","first_name":"Johannes"},{"full_name":"Guebner, Sascha","last_name":"Guebner","first_name":"Sascha"}],"ipn":"US020250016168A1","abstract":[{"text":"A method for distributing communication resources between subfunctions of a function, executable on two or more executability levels, of a communication system for a vehicle. The method includes ascertaining a communication resource requirement of the function on a first executability level, provided by subfunctions of the function; checking whether the communication resource requirement is able to be met with available communication resources; if not, determining at least one of the subfunctions that is able, with the available communication resources, to provide only a second executability level that is restricted in relation to the first executability level; distributing available communication resources between the two or more subfunctions comprising restricting the available communication resources for one or more other subfunctions that differ from the at least one subfunction, so that the two or more subfunctions provide the second executability level of the function following the restriction.","lang":"eng"}],"application_date":"22.11.2025"}