Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Requirements for exchangeable embedded CA/DRM solutions         
        6.1     General remarks         
        6.2     Generic requirements              
        6.3     Versatility related requirements          
        6.4     Practicability related requirements    
        6.5     ECI Client Swap related requirements
        6.6     ECI System Security related requirements       
Annex A – Use Cases    
        A.1     Use case 1     
        A.2     Use case 2     
        A.3     Use case 3     
        A.4     Use case 4 (Trusted third party (TTP) related use case)              
Bibliography