CONTENTS

Foreword           
Summary     
Introduction       
 1     Scope
 2     Normative references
        2.1     Identical Recommendations | International Standards
        2.2     Paired Recommendations | International Standards equivalent in technical content
 3     Definitions
 4     Abbreviations
 5     Concepts
        5.1     Security policy
        5.2     Security associations
        5.3     Security state
        5.4     Application Layer requirements
 6     Architecture
        6.1     Overall model
        6.2     Security associations
        6.3     Security exchange functions
        6.4     Security transformations
 7     Services and mechanisms
        7.1     Authentication
        7.2     Access control
        7.3     Non-repudiation
        7.4     Integrity
        7.5     Confidentiality
 8     Layer interactions
        8.1     Interactions between Application and Presentation Layers
        8.2     Interactions between Presentation and Session Layers
        8.3     Use of lower layer services
Annex A – Relationship to OSI management
Annex B – Bibliography