1 Scope
2
Normative references
2.1 Identical Recommendations | International Standards
3
Definitions
4
Abbreviations
5
General overview
5.1 Model of a protecting transfer syntax
5.2 Initial encoding rules
5.3 Security transformation
5.4 Syntax structure
6
Data structures for a protecting transfer syntax
7
Incorporation into underlying protocol
8
Synchronization procedures
9
Object identifier assignment
10 Conformance