Summary

This Recommendation describes the security threats to mobile end-to-end data communications and the security requirements from the point of view of the mobile users and application service providers (ASP). In addition, this Recommendation shows where the security technologies which realize certain security function appear in the models of mobile end-to-end data communications.