CONTENTS

�1���� Scope�
�2���� References�
�3���� Terms and definitions�������
������� 3.1���� Public-key and attribute certificate framework definitions����
������� 3.2���� OSI Reference Model security architecture definitions��������
������� 3.3���� Guidelines for the use and management of trusted third party services definitions������
������� 3.4���� Service features and operational provisions in IMT-2000 definitions
������� 3.5���� Additional definitions����������
�4���� Abbreviations���
�5���� Categories to which PKI technologies belong�������
�6���� Models of secure mobile systems based on PKI���
������� 6.1���� General model of secure mobile systems based on PKI������
������� 6.2���� Gateway model of secure mobile systems based on PKI�����
�7���� PKI operations for mobile end-to-end data communication�����������
������� 7.1���� PKI operations related to the life cycle of the certificate������
�8���� The usage model in telecommunication services����
������� 8.1���� Functions to be realized in the over-the-session-layer usage model��
������� 8.2���� Usage model on the application level����������
�9���� System configuration examples�����
������� 9.1���� Configuration examples of a certificate management system�
������� 9.2���� An example of an authentication model based on the certificate�������
10���� Considerations of PKI for mobile end-to-end data communication�����������
������ 10.1���� Considerations of interoperability with an existing system���
������ 10.2���� Considerations for the use of PKI in the mobile environment����������
������ 10.3���� Considerations concerning the PKI in general��������
Appendix I � Examples of service models����
������� I.1���� �����Certificate management service models����