�1���� Scope
�2����
Normative references
������� 2.1���� Identical Recommendations | International Standards
�3����
Definitions
�4����
Abbreviations
�5����
General overview
������� 5.1���� Model of a protecting transfer syntax
������� 5.2���� Initial encoding rules
������� 5.3���� Security transformation
������� 5.4���� Syntax structure
�6����
Data structures for a protecting transfer syntax
�7����
Incorporation into underlying protocol
�8����
Synchronization procedures
�9����
Object identifier assignment
10���� Conformance