Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Architecture of telecommunication network based on P2P 
 7     Security requirements analysis         
        7.1     Authentication and authorization         
        7.2     Trust management     
        7.3     Confidentiality              
        7.4     Integrity           
        7.5     Digital rights management       
 8     Security mechanisms            
        8.1     Authentication and authorization mechanism 
        8.2     Trust management mechanism             
        8.3     Confidentiality and integrity mechanisms         
        8.4     Digital rights management mechanism in streaming services   
Appendix I – Relationship of Recommendation ITU-T X.1163 and DSN-related Recommendations    
        I.1     Comparison between this Recommendation and [b-ITU-T Y.2206] and [ITU‑T Y.2080]    
        I.2     Mapping with DSN functional architecture in [ITU-T Y.2080]