1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Network model for differentiated security service 
 7     Differentiated security service       
        7.1     Types of assets in the mobile environment   
        7.2     Framework of differentiated security service           
 8     Security policy  
        8.1     Framework of security policy         
        8.2     Configuration of security policy      
 9     Negotiation process         
        9.1     Negotiation process of security policy        
        9.2     Negotiation process between terminal and SGW    
        9.3     Negotiation process between SGWs          
        9.4     Negotiation process between SGW and terminal    
10     Billing of security service 
11     Triggering of security resources   
Annex A – Functions of the network model for differentiated security service     
        A.1     Functions of the network model     
        A.2     Depiction of functions        
        A.3     Protocols between functions          
Appendix I – Example of security mechanism in line with subgroup of security policy