Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of IMT-2020 edge computing        
        6.1     Deployment scheme
        6.2     Typical application scenario   
 7     Security threats      
        7.1     The infrastructure layer           
        7.2     The network layer      
        7.3     The application layer 
 8     Security requirements         
        8.1     The infrastructure layer           
        8.2     The network layer      
        8.3     The application layer 
 9     Security capabilities guidelines for the edge computing service         
        9.1     The infrastructure layer           
        9.2     The network layer      
        9.3     The application layer 
Bibliography