1
Scope
2 References
3 Definitions
3.1 Terms
defined elsewhere
3.2 Terms
defined in this Recommendation
4 Abbreviations
and acronyms
5 Conventions
6 Overview
6.1 General
model of open capabilities of telecommunication services
6.2 Open
capabilities categorization
7 Security
threats to open capabilities of telecommunication service
7.1 Disclosure
of personally identifiable information
7.2 Modification
of capability usage
7.3 Relationship
of security threats to OCTS model
7.4 Trojan
and virus attacks
7.5 Unauthorized
access
8 Security
requirements for open capabilities of telecommunication services
8.1 Access
control
8.2 Authentication
8.3 Business
isolation
8.4 Emergency
response for virus/DDoS
8.5 Innovation
business security test before online usage
8.6 Personally
identifiable information protection
8.7 Physical
network capability security
8.8 Secure
audit
8.9 Virtual
network capability security
8.10 Relationship
between security requirements and security threats
9 Security
functions for open capabilities of telecommunication services
9.1 Access
control
9.2 Authentication
9.3 Digital
signature
9.4 Encipherment
9.5 Event
detection
9.6 Key
exchange
9.7 Security
audit trail
9.8 Security
recovery
9.9 Relationship
between security functions and security requirements
Bibliography