1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Security threats of smart
contract management
7 Security framework of smart contract management
8 Security requirements for smart contract management
8.1 Security requirements in the design and development
phase
8.2 Security requirements in the compilation and deployment phase
8.3 Security requirements in the invocation and execution phase
8.4 Security requirements in the maintenance and management phase
Appendix I – Smart contract weakness classification
Bibliography