Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.844
Security Study on
IMS-based Peer-to-Peer Content Distribution Services

V11.0.0 (Wzip)  2012/12  16 p.
Rapporteur:
Dr. Qing, Yu
China Mobile Com. Corporation

full Table of Contents for  TR 33.844  Word version:  11.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 5
2References  p. 5
3Definitions and abbreviations  p. 5
3.1Definitions  p. 5
3.2Abbreviations  p. 5
4System Architecture  p. 5
4.1Alternative Architecture 1  p. 5
4.2Alternative Architecture 2  p. 6
4.3Alternative Architecture 3  p. 6
4.4Alternative Architecture 4  p. 7
4.5Alternative Architecture 5  p. 7
4.6Security Architecture  p. 8
5Security threats  p. 9
5.1User Identity Privacy  p. 9
5.2Eavesdropping  p. 9
5.3Adversarial content announcement  p. 9
5.4Content Tampering and Replacement (Trojan Horse)  p. 9
6Security Requirements  p. 9
6.1Security requirement for User Identity Privacy  p. 9
6.2Security requirement for eavesdropping  p. 9
6.3Security requirement for adversarial content announcement  p. 10
6.4Security requirement for Content Tampering and Replacement (Trojan Horse)  p. 10
7Security Solutions  p. 10
7.1Security protection to prevent eavesdropping  p. 10
7.2Security solution against adversarial content announcement  p. 12
7.3Security protection on user identity privacy  p. 12
7.4Security protection against content tampering and replacement  p. 13
8Conclusions  p. 15
$Change history  p. 16

Up   Top