Table of Contents
1Scope
2References
3Termsanddefinitions
4Abbreviationsandacronyms
5Conventions
6Authorizationforthehomenetwork
7Authorizationentitiesforthehomenetwork
8Authorizationmodelsforthehomenetwork
9Relationshipbetweenauthorizationentitiesandhome
networkentities
10Authorizationmodes
11Securitythreatsforauthorizationinthehomenetwork
12Authorizationrequirementsforthehomenetwork
13Relationshipbetweensecuritythreatsandrequirements
AppendixI-Authorizationmethods
AppendixII-Conceptualpolicymodelforauthorization
AppendixIII-Servicescenarioofthedynamicauthorization
mode
AppendixIV-Usecasesofauthorizationmodels
Bibliography Abstract
Specifies the security threats and authorization requirements for the home network, identifies the authorization entities and methods, and develops authorization models and authorization modes for guaranteeing the security of the home network.