Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Architecture for interconnection between trustable network entities             
        6.1     Reference architecture            
        6.2     Functional entities     
        6.3     Reference points        
 7     Security services    
 8     Security association attribute definition       
        8.1     Security association identifier (SAI)    
        8.2     Cryptographic parameters per security association      
 9     Structure of protected messages    
        9.1     Security header           
        9.2     Security payload         
        9.3     Digital signature algorithms (DSA) signature algorithms             
10     Signalling procedures         
       10.1     TSa  
       10.2     Sa    
       10.3     Sc     
Annex AList of verifiable CSP identifiers to be sent in the PEEC request    
Annex BASN.1 format for signalling messages    
Appendix I – Information validation techniques    
Bibliography