1     Scope           
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere         
        3.2     Terms defined in this Recommendation             
 4     Abbreviations and acronyms              
 5     Conventions              
 6     Authentication attributes sharing mechanisms          
        6.1     Framework      
        6.2     Network pushing mechanism  
        6.3     Service pulling mechanism        
 7     Security considerations         
Appendix I – Use Cases     
        I.1                   Network pushing use case           
        I.2                   Service pulling use case 
Bibliography