1   
 Scope  
 2     References  
 3     Definitions   
        3.1     Terms defined elsewhere     
        3.2     Terms defined in this Recommendation        
 4     Abbreviations    
 5     Conventions      
 6     Concepts of P2P communications 
        6.1     Basic P2P service concept  
        6.2     Unstructured and structured P2P communications    
 7     Service scenarios of P2P communications 
        7.1     Information sharing and contents distribution            
        7.2     Communication platform     
        7.3     Groupware (Collaboration) 
        7.4     Distributed computing         
 8     Characteristics of P2P communications     
 9     Security threats to P2P communications    
        9.1     Eavesdropping        
        9.2     Communication jamming     
        9.3     Injection and modification of data    
        9.4     Unauthorized access           
        9.5     Repudiation            
        9.6     Man-in-the-middle attack   
        9.7     Sybil attack            
10     Security requirements for P2P communications     
       10.1     User authentication            
       10.2     Anonymity 
       10.3     Privacy   
       10.4     Data integrity         
       10.5     Data confidentiality            
       10.6     Access control       
       10.7     Non-repudiation    
       10.8     Usability 
       10.9     Availability 
      10.10     Traceability           
      10.11     Traffic control       
      10.12     Relationship between security requirements and security threats     
11     Security functions for satisfying security requirements of P2P
communications        
       11.1     Encipherment         
       11.2     Key exchange        
       11.3     Digital signature     
       11.4     Trust management  
       11.5     Access control       
       11.6     Data integrity mechanism    
       11.7     Authentication exchange     
       11.8     Notarization           
       11.9     Secure routing       
      11.10     Traffic control mechanism 
      11.11     ID assignment       
      11.12     Relationship between security requirements and functions   
Bibliography