FOREWORD
INTRODUCTION
1 SCOPE
2 INFORMATIVE REFERENCES
3 TERMS AND DEFINITIONS
4 COMMUNICATION SCENARIOS
4.1 THE ORIGINS OF HC USER REQUIREMENTS
4.2 THE PURPOSE OF COMMUNICATION
4.3 ORGANISATIONAL VIEW
4.4 THE SAFE USE OF UNSECURE NETWORKS
5 COMMUNICATION SECURITY SERVICES
5.1 THE WORLD OF STANDARDS
5.2 THE THREATS AND THE SERVICES REQUIRED
5.3 UTILISATION OF OPEN NETWORKS
5.4 SECURITY AT THE APPLICATION LAYER
5.5 NETWORK SECURITY
6 NEED FOR ASSURANCES
6.1 OVERVIEW
6.2 STANDARDISATION OBJECTIVES
7 THE NEED FOR STANDARDS
7.1 PROTECTION PROFILE CONCEPT AND METHODOLOGY
7.2 IMMEDIATE NEEDS FOR PROTECTION PROFILES
7.3 THE NEED FOR SECURITY POLICY BRIDGING
7.4 FUTURE NEEDS
7.5 KEY DISTRIBUTION AND THIRD PARTY INFRASTRUCTURE