CONTENTS

 1     Scope and field of application
 2     Normative references
        2.1     Identical Recommendations | International Standards
        2.2     Paired Recommendations | International Standards equivalent in technical content
        2.3     Additional references
 3     Definitions
        3.1     Reference Model definitions
                  3.1.1     Basic Reference Model definitions
                  3.1.2     Security architecture definitions
                  3.1.3     Naming and addressing definitions
        3.2     Service conventions definitions
        3.3     Presentation service definitions
        3.4     Application Layer Structure definitions
        3.5     ACSE service definitions
        3.6     Association Control protocol specification definitions
 4     Abbreviations
        4.1     Data units
        4.2     Types of application-protocol-data-units
        4.3     Other abbreviations
 5     Conventions
 6     Overview of the protocol
        6.1     Service provision
        6.2     Functional units
        6.3     Use of the presentation-service
        6.4     Relationship to the session-service
        6.5     Model
 7     Elements of procedure
        7.1     Association establishment
                  7.1.1     Purpose    
                  7.1.2     APDUs used
                  7.1.3     Association establishment procedure
                  7.1.4     Use of the AARQ APDU fields
                  7.1.5     Use of the AARE APDU fields
                  7.1.6     Collisions and interactions
        7.2     Normal release of an association
                  7.2.1     Purpose    
                  7.2.2     APDUs used
                  7.2.3     Normal release procedure
                  7.2.4     Use of the RLRQ APDU fields
                  7.2.5     Use of the RLRE APDU fields
                  7.2.6     Collisions and disruptions
        7.3     Abnormal release of an association
                  7.3.1     Purpose    
                  7.3.2     APDUs used
                  7.3.3     Abnormal release procedure
                  7.3.4     Use of the ABRT APDU fields
                  7.3.5     Collisions and interactions
        7.4     Rules for extensibility
 8     Mapping to the presentation-service
        8.1     Association establishment (normal mode)
                  8.1.1     Directly mapped parameters
                  8.1.2     Use of other P-CONNECT request and indication parameters
                  8.1.3     Use of other P-CONNECT response and confirm parameters
        8.2     Normal release of an association (normal mode)
                  8.2.1     Use of P-RELEASE request and indication parameters
                  8.2.2     Use of P-RELEASE response and confirm parameters
        8.3     Abnormal release of an association (normal mode)
                  8.3.1     Use of P-U-ABORT request and indication parameters
                  8.3.2     Use of P-P-ABORT indication parameter
        8.4     Association establishment (X.410-1984 mode)
                  8.4.1     Directly mapped parameters
                  8.4.2     Use of other P-CONNECT request and indication parameters
                  8.4.3     Use of other P-CONNECT response and confirm parameters
        8.5     Normal release of an association (X.410-1984 mode)
        8.6     Abnormal release of an association (X.410-1984 mode)
                  8.6.1     Use of P-U-ABORT request and indication parameters
                  8.6.2     Use of P-P-ABORT indication parameter
 9     Structure and encoding of ACSE APDUs
        9.1     Abstract syntax of the ACSE APDUs
        9.2     Encoding rules used to reference the transfer syntax
10     Conformance
       10.1     Statement requirements
       10.2     Static requirements
                 10.2.1     Normal mode
                 10.2.2     X.410-1984 mode
       10.3     Dynamic requirements
                 10.3.1     Normal mode
                 10.3.2     X.410-1984 mode
11     Precedence
12     Registration requirements
       12.1     Application titles
       12.2     Application context
       12.3     Authentication-mechanism
Annex  A  –  ACPM state table
        A.1     General
        A.2     Conventions
        A.3     Actions to be taken by the ACPM
                  A.3.1     Invalid intersections
                  A.3.2     Valid intersections
        A.4     Relationship to Presentation and other ASEs
Annex  B  –  Authentication-mechanism using password
        B.0     Introduction
        B.1     Assigned name
        B.2     Authentication-value ASN.1 datatype
        B.3     Processing specification
                  B.3.1     Requesting authentication
                  B.3.2     Performing authentication