Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviation and notation
5 Scope of application
6 Validation procedures for HPKI credentials
Annex A (informative) - Examples of authentication
technology of which available X.509
certification as credentials
Annex B (informative) - Appropriate use of authentication
certificates
Bibliography