CONTENTS

 1     Scope 
 2     References 
 3     Definitions  
        3.1     OSI Reference Model security architecture definitions        
        3.2     Additional definitions          
 4     Abbreviations   
 5     Overview   
 6     Models of mobile end-to-end data communications          
        6.1     General model of mobile end-to-end data communication between the mobile user and the ASP    
        6.2     Gateway model of mobile end-to-end data communication between the mobile user and the ASP    
 7     Characteristics of mobile end-to-end data communication 
 8     Security threats to the mobile environment
        8.1     General security threats      
        8.2     Mobile-oriented security threats     
        8.3     Relationship of security threats to end-to-end communication models          
 9     Security requirements for mobile end-to-end data communications
        9.1     Security requirements from the mobile user's point of view  
        9.2     Security requirements for ASP's point of view        
        9.3     Relationship between security requirements and security threats      
10     Security functions for satisfying mobile security requirements        
11     Security technologies for mobile end-to-end data communication