Foreword
Summary
Introduction
1
Scope
2
Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards equivalent in
technical content
3
Definitions
4
Abbreviations
5
Concepts
5.1 Security policy
5.2 Security associations
5.3 Security state
5.4 Application Layer requirements
6
Architecture
6.1 Overall model
6.2 Security associations
6.3 Security exchange functions
6.4 Security transformations
7
Services and mechanisms
7.1 Authentication
7.2 Access control
7.3 Non-repudiation
7.4 Integrity
7.5 Confidentiality
8
Layer interactions
8.1 Interactions between Application and Presentation Layers
8.2 Interactions between Presentation and Session Layers
8.3 Use of lower layer services
Annex A – Relationship to OSI management
Annex B – Bibliography