1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Supplement
4 Abbreviations and acronyms
5 Conventions
6 Introduction
7 Application deployment
7.1 Life cycle of application deployment
7.2 General security considerations
8 Secure application distribution framework for communication devices
8.1 Developer authentication
8.2 Application review
8.3 Reputation
8.4 Revocation
8.5 Access control based on users' attributes
8.6 Secure payment system
9 Requirements for secure application distribution
9.1 Developer authentication
9.2 Application review
9.3 Reputation
9.4 Revocation
9.5 Access control based on users' attributes
Appendix I – Application review
I.1 Examples of checking items
I.2 Testing and evaluation mechanism
Bibliography