Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Supplement       
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Introduction             
 7     Application deployment      
        7.1     Life cycle of application deployment   
        7.2     General security considerations            
 8     Secure application distribution framework for communication devices          
        8.1     Developer authentication        
        8.2     Application review      
        8.3     Reputation     
        8.4     Revocation     
        8.5     Access control based on users' attributes         
        8.6     Secure payment system           
 9     Requirements for secure application distribution     
        9.1     Developer authentication        
        9.2     Application review      
        9.3     Reputation     
        9.4     Revocation     
        9.5     Access control based on users' attributes         
Appendix I – Application review    
        I.1                   Examples of checking items       
        I.2                   Testing and evaluation mechanism         
Bibliography