Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Outlines of Protection Profile
Annex A (informative) - Procedures for preparing documents
Annex B (informative) - Example of threat analysis evaluation
method
Annex C (informative) - Abstract from Definition of threats
and security controls for the Charging Interface
in Electronic Fee Collection
Annex D (informative) - Common Criteria Recognition Arrangement
(CCRA)
Bibliography