Intellectual Property Rights
Foreword
1 Scope
2 References
2.1 Normative references
2.2 Informative references
3 Definitions, and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Review of IdM
4.1 Overview
4.2 Characterization of theft potential of identity
4.3 Regulatory protection of Identity
4.4 Purpose of Identity and Identity Management in the NGN
4.5 Identity portability
4.6 Identity versus identifier
4.7 Principles for handling personal data in ICT networks
5 IdM themes in other standardization bodies
5.1 Overview
5.2 Common thematic model
5.3 Common functional themes
6 Identity in the NGN
6.1 Overview of the NGN
6.2 IdM models relevant to the NGN
6.3 The NGN transport platform
6.4 Service platform
6.5 Identity crime in the NGN
6.6 NGN security objectives related to IdM
7 IdM Threat, Vulnerability and Risk Analysis (TVRA)
7.1 TVRA overview and introduction
7.2 Unwanted incidents relating to Identity and IdM in
the NGN
7.3 IdM assets
7.4 Vulnerabilities in NGNs with relevance to IdM
7.5 IdM Risk assessment
7.6 IdM risk classification
7.7 IdM countermeasure framework
7.8 Functional security requirements
Annex A: An analysis of IdM activities in non-ETSI bodies
A.1 ITU-T
A.2 3GPP
A.3 Liberty Alliance Project (LAP)
A.4 OASIS
A.5 OpenID
History