Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Scenarios and requirements             
        6.1     Scenarios       
        6.2     Requirements             
 7     Solutions   
        7.1     Overview       
        7.2     Description of solutions           
 8     Security considerations       
Bibliography