Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions 
 6     Overview   
        6.1     General model of open capabilities of telecommunication services      
        6.2     Open capabilities categorization  
 7     Security threats to open capabilities of telecommunication service  
        7.1     Disclosure of personally identifiable information  
        7.2     Modification of capability usage  
        7.3     Relationship of security threats to OCTS model
        7.4     Trojan and virus attacks 
        7.5     Unauthorized access 
 8     Security requirements for open capabilities of telecommunication services 
        8.1     Access control
        8.2     Authentication  
        8.3     Business isolation  
        8.4     Emergency response for virus/DDoS 
        8.5     Innovation business security test before online usage
        8.6     Personally identifiable information protection  
        8.7     Physical network capability security 
        8.8     Secure audit 
        8.9     Virtual network capability security 
       8.10     Relationship between security requirements and security threats       
 9     Security functions for open capabilities of telecommunication services          
        9.1     Access control
        9.2     Authentication  
        9.3     Digital signature  
        9.4     Encipherment 
        9.5     Event detection  
        9.6     Key exchange  
        9.7     Security audit trail
        9.8     Security recovery 
        9.9     Relationship between security functions and security requirements    
Bibliography