Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.839
Word version: 17.1.0
1…
4…
6…
4
Overview of Edge Computing (EC)
5
Key issues
4
Overview of Edge Computing (EC)
Word‑p. 11
5
Key issues
Word‑p. 12
5.0
General
Word‑p. 12
5.1
Key issue #1: Authentication and Authorization between EEC and EES
Word‑p. 12
5.1.1
Key Issue Details
Word‑p. 12
5.1.2
Security Threats
Word‑p. 12
5.1.3
Potential Security Requirements
Word‑p. 13
5.2
Key issue #2: Authentication and Authorization between EEC and ECS
Word‑p. 13
5.2.1
Key Issue Details
Word‑p. 13
5.2.2
Security Threats
Word‑p. 13
5.2.3
Potential Security Requirements
Word‑p. 14
5.3
Key issue #3: Authentication and Authorization between EES and ECS
Word‑p. 14
5.3.1
Key Issue Details
Word‑p. 14
5.3.2
Security Threats
Word‑p. 14
5.3.3
Potential Security Requirements
Word‑p. 14
5.4
Key Issue #4 Edge Data Network Authentication and Authorization
Word‑p. 15
5.4.1
Key issue detail
Word‑p. 15
5.4.2
Security threats
Word‑p. 15
5.4.3
Potential security requirements
Word‑p. 15
5.5
Key Issue #5 Edge Data Network User Identifier and Credential Protection
Word‑p. 15
5.5.1
Key issue detail
Word‑p. 15
5.5.2
Security threats
Word‑p. 15
5.5.3
Potential security requirements
Word‑p. 15
5.6
Key issue #6: Transport security for the EDGE-1-9 interfaces
Word‑p. 16
5.6.1
Key issue details
Word‑p. 16
5.6.2
Threats
Word‑p. 16
5.6.3
Potential security requirements
Word‑p. 17
5.7
Key Issue #7: Security of Network Information Provisioning to Local Applications with low latency procedure
Word‑p. 17
5.7.1
Key issue details
Word‑p. 17
5.7.2
Security threats
Word‑p. 18
5.7.3
Potential Security requirements
Word‑p. 18
5.8
Key Issue #8: authentication and authorization in EES capability exposure
Word‑p. 18
5.8.1
Key issue details
Word‑p. 18
5.8.2
Security threats
Word‑p. 18
5.8.3
Potential security requirements
Word‑p. 18
5.9
Key Issue #9: Security of EAS discovery procedure
Word‑p. 19
5.9.1
Key issue details
Word‑p. 19
5.9.2
Security threats
Word‑p. 19
5.9.3
Potential Security requirements
Word‑p. 19
5.10
Key issue #10: Authorization during Edge Data Network change
Word‑p. 19
5.10.1
Key issue details
Word‑p. 19
5.10.2
Security threats
Word‑p. 20
5.10.3
Potential security requirements
Word‑p. 20