1     Scope           
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere         
        3.2     Terms defined in this Supplement        
 4     Abbreviations and acronyms              
 5     Conventions              
 6     Introduction              
 7     Application deployment       
        7.1     Life cycle of application deployment    
        7.2     General security considerations             
 8     Secure application distribution framework for communication devices           
        8.1     Developer authentication         
        8.2     Application review       
        8.3     Reputation      
        8.4     Revocation      
        8.5     Access control based on users' attributes          
        8.6     Secure payment system            
 9     Requirements for secure application distribution      
        9.1     Developer authentication         
        9.2     Application review       
        9.3     Reputation      
        9.4     Revocation      
        9.5     Access control based on users' attributes          
Appendix I – Application review     
        I.1                   Examples of checking items        
        I.2                   Testing and evaluation mechanism          
Bibliography