Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Authentication attributes sharing mechanisms         
        6.1     Framework     
        6.2     Network pushing mechanism 
        6.3     Service pulling mechanism       
 7     Security considerations        
Appendix I – Use Cases    
        I.1                   Network pushing use case          
        I.2                   Service pulling use case
Bibliography