Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Basic model of remote software update      
        6.1     Modules of ITS environment for software update        
        6.2     Model of software update procedure
 7     Specification of secure software update procedure
        7.1     General message format with security functions           
        7.2     Protocol definition and data format   
Appendix I – Methodology on risk analysis    
        I.1     Methodology on risk analysis based on [b-JASO TP15002]          
        I.2     Data verification using MAC algorithms              
Appendix II – Threats, security requirements and security controls    
       II.1     Definition of target of evaluation          
       II.2     Identification of major threats
       II.3     Security Requirements in TOE
       II.4     Security controls          
Bibliography