Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere          
        3.2     Terms defined in this Recommendation              
 4     Abbreviations and acronyms
 5     Conventions             
 6     Overview    
        6.1     A conceptual model of trustworthy networking
        6.2     Trust-centric network domains
 7     Requirements           
        7.1     High-level requirements            
        7.2     Functional requirements           
 8     Functional architecture         
        8.1     Trust management functions   
        8.2     Domain administration functions           
        8.3     Access and delivery control functions   
        8.4     Reference point Tp      
        8.5     Reference point Ts      
 9     Scalability of the trust-centric network domain           
        9.1     Building and managing trust-centric network domains   
        9.2     Trustworthy communication between more than two trust-centric network domains              
        9.3     Expanding trust-centric network domains          
10     Deployment architecture and procedures for trustworthy networking with trust‑centric network domains in IP networks    
       10.1     Introduction 
       10.2     Deployment architecture of trustworthy networking in IP networks        
       10.3     Address mapping mechanism 
       10.4     Deployment procedures for trustworthy networking     
11     Security considerations       
Appendix I – Extending the trust model for trustworthy networking    
Bibliography