CONTENTS

�1���� Scope
�2���� Normative references
������� 2.1���� Identical Recommendations | International Standards
�3���� Definitions
�4���� Abbreviations
�5���� General overview
������� 5.1���� Model of a protecting transfer syntax
������� 5.2���� Initial encoding rules
������� 5.3���� Security transformation
������� 5.4���� Syntax structure
�6���� Data structures for a protecting transfer syntax
�7���� Incorporation into underlying protocol
�8���� Synchronization procedures
�9���� Object identifier assignment
10���� Conformance