CONTENTS

Foreword  
Summary 
Introduction
1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards equivalent in technical content
3 Definitions
4 Abbreviations
5 Concepts
5.1 Security policy
5.2 Security associations
5.3 Security state
5.4 Application Layer requirements
6 Architecture
6.1 Overall model
6.2 Security associations
6.3 Security exchange functions
6.4 Security transformations
7 Services and mechanisms
7.1 Authentication
7.2 Access control
7.3 Non-repudiation
7.4 Integrity
7.5 Confidentiality
8 Layer interactions
8.1 Interactions between Application and Presentation Layers
8.2 Interactions between Presentation and Session Layers
8.3 Use of lower layer services
Annex A Relationship to OSI management
Annex B Bibliography