This clause specifies the security requirements.
[AR-5.2.6.2-a]
The application layer architecture shall provide mechanisms for the Edge Computing Service Provider to authorize the usage of Edge Computing services by the EEC.
[AR-5.2.6.2-b]
The application layer architecture shall provide mechanisms for the Edge Computing Service Provider to authorize the usage of Edge Computing services by the EASs.
[AR-5.2.6.2-c]
Communication between the functional entities of the application layer architecture shall be protected.
[AR-5.2.6.2-d]
The authentication and authorization for the use of Edge Computing services shall support the deployment where the functional entities providing the Edge Computing services are in the same trust domain as the 3GPP system, different trust domains or both.
[AR-5.2.6.2-e]
The application layer architecture shall support the use of either 3GPP credentials or application specific credentials or both for different deployment needs, for the communication between the UE and the functional entities providing the Edge Computing service.
[AR-5.2.6.2-f]
The application layer architecture shall support mutual authentication and authorization check between clients and servers or servers and servers that interact.
[AR-5.2.6.2-g]
The application layer architecture shall support EASs to obtain user's authorization in order to access to user's sensitive information (e.g. user's location).
[AR-5.2.6.2-h]
The application layer architecture shall provide mechanisms to support privacy protection of the user.