1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Authentication attributes sharing mechanisms
6.1 Framework
6.2 Network pushing mechanism
6.3 Service pulling mechanism
7 Security considerations
Appendix I – Use Cases
I.1 Network pushing use case
I.2 Service pulling use case
Bibliography