1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of IMT-2020 edge computing
6.1 Deployment scheme
6.2 Typical application scenario
7 Security threats
7.1 The infrastructure layer
7.2 The network layer
7.3 The application layer
8 Security requirements
8.1 The infrastructure layer
8.2 The network layer
8.3 The application layer
9 Security capabilities guidelines for the edge computing service
9.1 The infrastructure layer
9.2 The network layer
9.3 The application layer
Bibliography