Intellectual Property Rights
Foreword
1 Scope
2 References
2.1 Normative references
2.2 Informative references
3 Abbreviations
4 General overview
5 Threat analysis for UC in the NGN
5.1 UC attack configurations for basis of TVRA
5.2 Attack vector of UC in NGN
5.3 Risk assessment for UC in NGN
5.4 Objectives for the prevention of UC in NGN
5.5 Security requirements for prevention of UC in the NGN
5.6 Prevention of UC in NGN countermeasure framework
5.7 System management requirements
6 Feasibility of providing UC prevention in the NGN
6.1 Identifying UC
6.2 Marking UC
6.3 Reacting to UC
6.4 Architectural impact
6.5 NGN design impact
7 Recommendations for future work
Annex A: Comparable work in other standardization bodies
A.1 IETF
A.2 ITU
A.3 3GPP
A.4 OMA
Annex B: Completed eTVRA proforma for UC
History