Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 33.839  Word version:  17.1.0

Top   Top   Up   Prev   Next
1…   4…   6…

 

4  Overview of Edge Computing (EC)Word‑p. 11

5  Key issuesWord‑p. 12

5.0  GeneralWord‑p. 12

5.1  Key issue #1: Authentication and Authorization between EEC and EESWord‑p. 12

5.2  Key issue #2: Authentication and Authorization between EEC and ECSWord‑p. 13

5.3  Key issue #3: Authentication and Authorization between EES and ECSWord‑p. 14

5.4  Key Issue #4 Edge Data Network Authentication and AuthorizationWord‑p. 15

5.5  Key Issue #5 Edge Data Network User Identifier and Credential ProtectionWord‑p. 15

5.6  Key issue #6: Transport security for the EDGE-1-9 interfacesWord‑p. 16

5.6.1  Key issue detailsWord‑p. 16

5.6.2  ThreatsWord‑p. 16

5.6.3  Potential security requirementsWord‑p. 17

5.7  Key Issue #7: Security of Network Information Provisioning to Local Applications with low latency procedureWord‑p. 17

5.8  Key Issue #8: authentication and authorization in EES capability exposureWord‑p. 18

5.9  Key Issue #9: Security of EAS discovery procedureWord‑p. 19

5.10  Key issue #10: Authorization during Edge Data Network changeWord‑p. 19


Up   Top   ToC