1
Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and
acronyms
5 Convention
6 TTP services for secure
end-to-end data communication
7 System model
8 Processes of a secure
end-to-end data communication
8.1 Establishment phase
8.2 Data transmission phase
8.3 Termination phase
9 Online TTP services to support
secure end-to-end data communication
9.1 TTP services for establishment phase
9.2 TTP services for data transmission phase
9.3 TTP services for termination phase
9.4 Possibilities of online TTP services to support secure end-to-end
data communication
9.5 Integration of TTP services
10 Basic interfaces for secure
end-to-end data communication based on online TTP
10.1 Requester-TTP interface
10.2 Responder-TTP interface
10.3 Requester-Responder interface
10.4 TTP internal interface
10.5 Requester internal interface
10.6 Responder internal interface
11 Basic interactions for secure
end-to-end data communication based on online TTP
11.1
Preconditions
11.2
Establishment of control path
11.3
Establishment of secure data communication path
11.4
Secure data transmission
11.5 Audit trail creation
11.6
Termination of secure data communication path
11.7
Termination of control path
12 Security considerations
12.1
Requester-TTP interface
12.2
Responder-TTP interface
12.3
Establishment of the secure data communication path between
entities
12.4
Stored data in the entity
12.5
Stored data in the TTP
Annex A – Re-establishment
A.1 Re-establishment process of a secure
end-to-end data communication
A.2 TTP services for re-establishment process
Annex B – Entity level granularity and
communication level granularity
Appendix I – Service scenario
Appendix II – Relationship among this Recommendation, ITU-T
X.842 and the Liberty Alliance Project
Bibliography