1 Scope
2 References
3 Definitions
3.1 OSI Reference Model security architecture
definitions
3.2 Additional definitions
4 Abbreviations
5 Overview
6 Models of mobile end-to-end
data communications
6.1 General model of mobile end-to-end data
communication between the mobile user and the ASP
6.2 Gateway model of mobile end-to-end data
communication between the mobile user and the ASP
7 Characteristics
of mobile end-to-end data communication
8 Security
threats to the mobile environment
8.1 General security threats
8.2 Mobile-oriented security threats
8.3 Relationship of security threats to end-to-end
communication models
9 Security
requirements for mobile end-to-end data communications
9.1 Security requirements from the mobile user's
point of view
9.2 Security requirements for ASP's point of view
9.3 Relationship between security requirements and
security threats
10 Security functions for satisfying mobile
security requirements
11 Security technologies for mobile end-to-end
data communication