Table of Contents - X.1648 (04/2025) - Guideline on edge computing data security

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
6.1 Reference architecture
6.2 Data security risks
7 MEC typical application scenarios and related data security risks
8 Data security guidelines for edge computing
8.1 Edge computing data security guidelines for edge computing providers
8.2 Edge computing data security guidelines for edge computing developers
8.3 Edge computing data security guidelines for edge computing users
Bibliography