1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards equivalent in technical content
3 Definitions
3.1 Basic Reference Model definitions
3.2 Security architecture definitions
3.3 Security frameworks overview definitions
3.4 Additional definitions
4 Abbreviations
5 General discussion of confidentiality
5.1 Basic concepts
5.1.1 Protection of information
5.1.2 Hide and reveal operations
5.2 Classes of confidentiality services
5.3 Types of confidentiality mechanisms
5.4 Threats to confidentiality
5.4.1 Threats when confidentiality is provided through access prevention
5.4.2 Threats when confidentiality is provided through information hiding
5.5 Types of confidentiality attacks
6 Confidentiality policies
6.1 Policy expression
6.1.1 Information characterization
6.1.2 Entity characterization
7 Confidentiality information and facilities
7.1 Confidentiality information
7.1.1 Hiding confidentiality information
7.1.2 Revealing confidentiality information
7.2 Confidentiality facilities
7.2.1 Operation related facilities Hide Reveal
7.2.2 Management related facilities
8 Confidentiality mechanisms
8.1 Confidentiality provision through access prevention
8.1.1 Confidentiality protection through physical media protection
8.1.2 Confidentiality protection through routing control
8.2 Confidentiality provision through encipherment
8.2.1 Confidentiality provision through data padding
8.2.2 Confidentiality provision through dummy events
8.2.3 Confidentiality provision through PDU header protection
8.2.4 Confidentiality provision through time varying fields
8.3 Confidentiality provision through contextual location
9 Interactions with other security services and mechanisms
9.1 Access Control
Annex A Confidentiality in the OSI Reference Model
Annex B Example of a sequence of movements through different confidentiality protected environments
Annex C Representation of Information
Annex D Covert Channels
Annex E Confidentiality Facilities Outline