CONTENTS

Foreword���� ����� 
Summary���� 
Introduction���� ��
�1���� Scope
�2���� Normative references
������� 2.1���� Identical Recommendations | International Standards
������� 2.2���� Paired Recommendations | International Standards equivalent in technical content
�3���� Definitions
�4���� Abbreviations
�5���� Concepts
������� 5.1���� Security policy
������� 5.2���� Security associations
������� 5.3���� Security state
������� 5.4���� Application Layer requirements
�6���� Architecture
������� 6.1���� Overall model
������� 6.2���� Security associations
������� 6.3���� Security exchange functions
������� 6.4���� Security transformations
�7���� Services and mechanisms
������� 7.1���� Authentication
������� 7.2���� Access control
������� 7.3���� Non-repudiation
������� 7.4���� Integrity
������� 7.5���� Confidentiality
�8���� Layer interactions
������� 8.1���� Interactions between Application and Presentation Layers
������� 8.2���� Interactions between Presentation and Session Layers
������� 8.3���� Use of lower layer services
Annex A � Relationship to OSI management
Annex B � Bibliography