1     Scope  
 2     References  
 3     Definitions   
 4     Abbreviations    
 5     Upper layer protocol specifications for the
OSI paradigm  
        5.1     Introduction to Upper layer protocol specifications
for the OSI paradigm     
        5.2     Upper layer protocol specification for
Interactive Class services       
        5.3     Upper layer protocol specification for
File-oriented Class services   
        5.4     Upper layer protocol specification for Directory services     
        5.5     Upper layer protocol specification for store and forward services     
 6     Upper layer protocol specification for
Interactive Class services using the OSI paradigm    
        6.1     Transport layer profiles       
        6.2     Session layer          
        6.3     Presentation layer   
        6.4     Application layer     
        6.5     Security support for interactive applications
 7     Upper layer protocol specification for
File-oriented Class functions using the OSI paradigm           
        7.1     Session layer          
        7.2     Presentation layer   
        7.3     Application layer profile      
        7.4     Security support for FTAM services           
 8     Upper layer protocol specification for Directory services using the OSI
paradigm   
        8.1     Session layer          
        8.2     Presentation layer   
        8.3     Application layer     
        8.4     Security support for directory services         
 9     Conformance for the OSI paradigm          
10     Protocol profile for CORBA-based services        
       10.1     Scope of CORBA protocol profile
       10.2     Overview of profile for CORBA-based services     
       10.3     Service definition   
       10.4     GIOP protocol specification           
       10.5     Secure IOP protocol specification  
       10.6     IIOP protocol specification            
       10.7     TCP/IP protocol profile for use with IIOP  
11     Protocol Profile for EDI/EDIFACT
based services           
       11.1     Scope of EDI/EDIFACT protocol profile   
       11.2     Layer summary      
       11.3     TCP/IP protocol profile for use with IA      
       11.4     TLS protocol profile for use with IA           
       11.5     IA profile   
       11.6     Security module for whole message protection profile         
       11.7     EDI/EDIFACT translator protocol
12     Protocol profile for the SNMP paradigm  
13     Protocol profile for the Telecommunications Markup Language (tML)
paradigm   
Appendix I – Guidance on using
allomorphic management     
        I.1        Introduction          
        I.2        CMIP operations  
        I.3        CMIP notification
        I.4        Implementation issues        
        I.5        Examples of the use of allomorphism         
Appendix II – Changes to ISP
conformance requirements