1
Scope
2 References
3 Terms and definitions
3.1 Public-key and attribute certificate framework
definitions
3.2 OSI Reference Model security architecture
definitions
3.3 Guidelines for the use and management of
trusted third party services definitions
3.4 Service features and operational provisions in IMT-2000
definitions
3.5 Additional definitions
4 Abbreviations
5 Categories
to which PKI technologies belong
6 Models of
secure mobile systems based on PKI
6.1 General model of secure mobile systems based on
PKI
6.2 Gateway model of secure mobile systems based on
PKI
7 PKI
operations for mobile end-to-end data communication
7.1 PKI operations related to the life cycle of the certificate
8 The usage model in telecommunication
services
8.1 Functions to be realized in the over-the-session-layer usage model
8.2 Usage model on the application level
9 System
configuration examples
9.1 Configuration examples of a certificate management system
9.2 An example of an authentication model based on the certificate
10 Considerations of PKI for mobile end-to-end
data communication
10.1 Considerations of interoperability with an existing
system
10.2 Considerations for the use of PKI in the mobile environment
10.3 Considerations concerning the PKI in general
Appendix I – Examples
of service models
I.1 Certificate
management service models