1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Roles in QKDN for security application services
6.1 Security application service user
6.2 Security application service provider
6.3 QKDN provider
6.4 QKDN management provider
6.5 User network provider
6.6 International scenarios
7 Role-based models and service scenarios
7.1 Model 1
7.2 Model 2
7.3 Model 3
7.4 Model 4
7.5 Model 5
7.6 Model 6
7.7 Model 7
8 Security considerations
Appendix I – Implementation description of QKDN roles
I.1 Introduction
I.2 Existing structure
I.3 Mapping process
Bibliography