Table of Contents

 1     Scope          
 2     References 
 3     Definitions 
        3.1     Terms defined elsewhere           
        3.2     Terms defined in this Supplement           
 4     Abbreviations and acronyms
 5     Conventions             
 6     Introduction              
        6.1     Concept of security information sharing negotiation         
        6.2     Relationship with other CYBEX Recommendations          
 7     Functional capabilities for security information sharing negotiation       
        7.1     Negotiation capabilities             
        7.2     Agreement capabilities
        7.3     Security capabilities    
 8     Reference model of security information negotiation   
 9     Life cycle and data model of SSA       
        9.1     Life cycle of SSA          
        9.2     Structure of SSA           
10     Process of SSA negotiation  
       10.1     SSA negotiating messages         
       10.2     SSA negotiating scenarios        
Appendix I – The example of security information sharing negotiation    
        I.1     Negotiation between the security management server and security agent