CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Convention
 6     TTP services for secure end-to-end data communication  
 7     System model   
 8     Processes of a secure end-to-end data communication     
        8.1     Establishment phase           
        8.2     Data transmission phase     
        8.3     Termination phase  
 9     Online TTP services to support secure end-to-end data communication    
        9.1     TTP services for establishment phase         
        9.2     TTP services for data transmission phase    
        9.3     TTP services for termination phase 
        9.4     Possibilities of online TTP services to support secure end-to-end data communication         
        9.5     Integration of TTP services
10     Basic interfaces for secure end-to-end data communication based on online TTP 
       10.1     Requester-TTP interface   
       10.2     Responder-TTP interface  
       10.3     Requester-Responder interface     
       10.4     TTP internal interface        
       10.5     Requester internal interface           
       10.6     Responder internal interface          
11     Basic interactions for secure end-to-end data communication based on online TTP           
       11.1     Preconditions        
       11.2     Establishment of control path         
       11.3     Establishment of secure data communication path  
       11.4     Secure data transmission   
       11.5     Audit trail creation
       11.6     Termination of secure data communication path     
       11.7     Termination of control path           
12     Security considerations   
       12.1     Requester-TTP interface   
       12.2     Responder-TTP interface  
       12.3     Establishment of the secure data communication path between entities        
       12.4     Stored data in the entity    
       12.5     Stored data in the TTP      
Annex A – Re-establishment     
        A.1     Re-establishment process of a secure end-to-end data communication       
        A.2     TTP services for re-establishment process 
Annex B – Entity level granularity and communication level granularity     
Appendix I – Service scenario     
Appendix II – Relationship among this Recommendation, ITU-T X.842 and the Liberty Alliance Project     
Bibliography