Table of Contents
1Scope
1.1RelationshipbetweenIPCablecom2.0and3GPPIMS
1.2ScopeofthepresentRecommendation
2References
3Definitions,abbreviationssymbolsandconventions
3.1Definitions
3.2Abbreviations
3.3Symbols
3.4Conventions
4GenericBootstrappingArchitecture
4.1Referencemodel
4.2Networkelements
4.3Bootstrappingarchitectureandreferencepoints
4.4Requirementsandprinciplesforbootstrapping
4.5Procedures
5UICC-basedenhancementstoGenericBootstrapping
Architecture(GBA_U)
6HTTPDigestOverTLSenhancementstoGeneric
BootstrappingArchitecture(GBA_H)
6.1Bootstrappingprocedure
6.2ProceduresusingbootstrappedSecurityAssociation
AnnexB(normative)-Specificationofthekeyderivation
functionKDF
B.2Generickeyderivationfunction
B.3NAFspecifickeyderivationinGBA,andGBA_U,andGBA_H
AnnexC(informative)-Void
AnnexD(informative)-Dialogexampleforuserselectionof
UICCapplicationusedinGBA
AnnexE(normative)-TLSprofileforsecuringZn'referencepoint
AnnexF(informative)-HandlingofTLScertificates
AnnexG(normative)-GBA_UUICC-MEinterface
AnnexH(normative)-Uasecurityprotocolidentifier Abstract
Specifies the security features and a mechanism to bootstrap authentication and key agreement for application security.