Table of Contents - Y.2502 (09/2025) - Computing power network – Authentication and orchestration architecture

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of resource authentication and orchestration in computing power network
7 Requirements
7.1 Service process
7.2 Requirements of authentication and orchestration of CPN resources
8 Architecture of resource authentication and orchestration in CPN
8.1 Resource authentication functional entity
8.2 Resource orchestration functional entity
9 Security considerations
Bibliography