Table of Contents

 1     Scope        
 2     References             
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation          
 4     Abbreviations and acronyms           
 5     Conventions           
 6     OTP-based authentication service   
        6.1     Introduction 
        6.2     General features       
        6.3     OTP-based authentication service      
 7     OTP management architecture       
        7.1     OTP entities 
        7.2     OTP management blocks       
        7.3     OTP management framework            
        7.4     OTP management procedures            
        7.5     OTP management requirements        
 8     General management framework   
        8.1     OTP management model for the general management framework      
        8.2     OTP management operations for the general management framework            
        8.3     Security considerations for the general management framework         
 9     Interoperable management frameworks     
        9.1     Centralized management framework
        9.2     Enhanced centralized management framework           
        9.3     Cross-domain management framework          
Appendix I – Service deployment scenarios    
        I.1               Overview of service deployment scenarios          
        I.2               Local network access control scenario    
        I.3               Remote access control scenario 
        I.4               Application/contents access control scenario      
Bibliography