Table of Contents

 1     Scope            
 2     References   
 3     Definitions   
        3.1     Terms defined elsewhere
        3.2     Terms defined in this supplement 
 4     Abbreviations and acronyms  
 5     Conventions
 6     Introduction
 7     Architecture of enhanced web-based telecommunication services  
 8     Threats of enhanced web-based telecommunication services          
        8.1     General security threats  
        8.2     Security threats to asynchronous script       
        8.3     Security threats to web application programming interfaces  
        8.4     Security threats to data syndication            
        8.5     Security threats to mashup            
 9     Security objectives of enhanced web-based telecommunication services      
        9.1     Access control  
        9.2     Authentication 
        9.3     Authorization   
        9.4     Availability       
        9.5     Communication security
        9.6     Data confidentiality        
        9.7     Data integrity    
        9.8     Guarantee of efficiency 
        9.9     Non-repudiation               
       9.10     Privacy             
       9.11     Secure remote backup of device 
       9.12     Secure user management              
       9.13     Separating key management       
       9.14     Trust service    
       9.15     Relationship between security objectives and security threats              
Bibliography