Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.805  Word version:  12.0.0

Top   Top   Up   Prev   None
1…   4…   A…

 

A  Application of the methodologiesp. 77

B  Common criteria overviewp. 91

C  Self-evaluation and Self-evaluation with Third-party Certification Analysisp. 94

D  Threat modelling frameworksp. 96

E  Vendor network product development and network product lifecycle management process assurance requirementsp. 104

$  Change historyp. 106


Up   Top