CONTENTS

 1     Scope 
 
2     References 
 3     Terms and definitions       
 4     Abbreviations and acronyms        
 5     Security architecture        
 6     Security dimensions         
        6.1     Access control security dimension  
        6.2     Authentication security dimension   
        6.3     Non-repudiation security dimension
        6.4     Data confidentiality security dimension        
        6.5     Communication security dimension 
        6.6     Data integrity security dimension     
        6.7     Availability security dimension        
        6.8     Privacy security dimension 
 7     Security layers  
        7.1     The infrastructure security layer      
        7.2     The services security layer  
        7.3     The applications security layer        
 8     Security planes 
        8.1     The management security plane      
        8.2     The control security plane  
        8.3     The end-user security plane
 9     Security threats 
10     Description of the objectives achieved by application of security dimensions to security layers    
       10.1     Securing the infrastructure layer     
       10.2     Securing the services layer
       10.3     Securing the applications layer