Table of Contents - Y.2502 (09/2025) - Computing power network – Authentication and orchestration architecture
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of resource authentication and orchestration in computing power network 7 Requirements 7.1 Service process 7.2 Requirements of authentication and orchestration of CPN resources 8 Architecture of resource authentication and orchestration in CPN 8.1 Resource authentication functional entity 8.2 Resource orchestration functional entity 9 Security considerations Bibliography
|