1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Basic model of remote software update
6.1 Modules of ITS environment for software update
6.2 Model of software update procedure
7 Specification of secure software update procedure
7.1 General message format with security functions
7.2 Protocol definition and data format
Appendix I – Methodology on risk analysis
I.1 Methodology on risk analysis based on [b-JASO TP15002]
I.2 Data verification using MAC algorithms
Appendix II – Threats, security requirements and security controls
II.1 Definition of target of evaluation
II.2 Identification of major threats
II.3 Security Requirements in TOE
II.4 Security controls
Bibliography