1    
Scope             
 2    
References   
 3    
Definitions    
        3.1     Terms
defined elsewhere               
        3.2     Terms
defined in this Recommendation       
 4    
Abbreviations and acronyms     
 5    
Conventions 
 6    
Conceptual Models     
        6.1     Trust
Elevation Core Model             
        6.2     Trust
Elevation Concepts 
        6.3     Use of
Authorization Architectures and Models         
 7    
Architecture & Design                
        7.1     Trust
Elevation System Context      
        7.2     Assumptions
for Trust Elevation Systems      
        7.3     Architecture
& Design Factors       
        7.4     Trust
Elevation Architecture Components   
        7.5     Other
Architecture Components   
 8    
Implementation Considerations                
        8.1     Orchestration    
        8.2     Enumeration
of Authentication Methods     
        8.3     User
Enrolment 
 9    
Trust Elevation Sequence, Metadata and Assertions and Conformance           
Appendix I – Trust Elevation Sequence (Example)     
        I.1                    Use
Case: Online banking transactions            
Appendix II – Metadata and Assertions     
       II.1     Component-Component
Communications     
       II.2     PDP to
TE Method Determiner Request         
       II.3     TE
Method Determiner to PDP Response      
Appendix III – Conformance     
Appendix IV – State Models for Assurance Level Evaluation     
       IV.1     Evaluation
of Assurance Requirements at Transaction Time