CONTENTS

 1     Introduction
        1.1     Scope
        1.2     References
                  1.2.1     Normative references
                  1.2.2     Other references
        1.3     Abbreviations
        1.4     Definitions
 2     Architecture and communication requirements
        2.1     Organizational requirements
        2.2     Organizational interworking requirements
                  2.2.1     Cooperative Management Model
                  2.2.2     Joint Management Model
                  2.2.3     Customer Network Management Model
        2.3     Function Block Aspects
        2.4     Naming and Addressing requirements
        2.5     Communication Services
                  2.5.1     Interactive Service Aspects
                  2.5.2     File Transfer Service Aspects
                  2.5.3     Directory Service Aspects
                  2.5.4     Store/Forward Service Aspects
        2.6     Data Communication Network Aspects
 3     Management Service Requirements
        3.1     Telecommunications Managed Areas
        3.2     Relationship to TMN Methodology
        3.3     Management Requirement Categories
                  3.3.1     Network Operator-to-Network Operator Management Requirement Category
                  3.3.2     Network Operator-Service Provider Management Requirement Category
                  3.3.3     Service Provider-Service Provider Management Requirement Category
                  3.3.4     Customer-to-Service Provider Management Requirement Category
                  3.3.5     Network Operator-Vendor Management Requirement Category
        3.4     Shared Management Knowledge (SMK) for the X-interface
 4     Security considerations
        4.1     Security Scope and Objectives
                  4.1.1     Application considerations
                  4.1.2     Implementation considerations
        4.2     Security threats
                  4.2.1     Disclosure of information
                  4.2.2     Unauthorized access
                  4.2.3     Masquerade
                  4.2.4     Threats to integrity of information
                  4.2.5     Denial of service
                  4.2.6     Repudiation
                  4.2.7     Fraud
        4.3     Security requirements
                  4.3.1     Identification requirements
                  4.3.2     Privacy requirements
                  4.3.3     Authentication requirements
                  4.3.4     Access Control requirements
                  4.3.5     Integrity requirements
                  4.3.6     Security audit requirements
        4.4     Security services
                  4.4.1     Authentication services
                  4.4.2     Access Control services
                  4.4.3     Confidentiality services
                  4.4.4     Data Integrity
                  4.4.5     Non-repudiation
        4.5     Management of security
                  4.5.1     Audit requirement
                  4.5.2     Audit Trail
                  4.5.3     Alarm reporting
                  4.5.4     Administrative requirements
                  4.5.5     Key Management
                  4.5.6     Requirements
                  4.5.7     Private-Key Management
                  4.5.8     Public-Key Management
                  4.5.9     Trust Systems
        4.6     Data Cryptography
Appendix I – Additional information on Security Risk Assessment
Appendix II – Additional information on Private Key Management
Appendix III – Additional information on Data Cryptography