Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.839  Word version:  17.1.0

Top   Top   Up   Prev   Next
1…   4…   6…

 

4  Overview of Edge Computing (EC)p. 11

5  Key issuesp. 12

5.0  Generalp. 12

5.1  Key issue #1: Authentication and Authorization between EEC and EESp. 12

5.2  Key issue #2: Authentication and Authorization between EEC and ECSp. 13

5.3  Key issue #3: Authentication and Authorization between EES and ECSp. 14

5.4  Key Issue #4 Edge Data Network Authentication and Authorizationp. 15

5.5  Key Issue #5 Edge Data Network User Identifier and Credential Protectionp. 15

5.6  Key issue #6: Transport security for the EDGE-1-9 interfacesp. 16

5.7  Key Issue #7: Security of Network Information Provisioning to Local Applications with low latency procedurep. 17

5.8  Key Issue #8: authentication and authorization in EES capability exposurep. 18

5.9  Key Issue #9: Security of EAS discovery procedurep. 19

5.10  Key issue #10: Authorization during Edge Data Network changep. 19


Up   Top   ToC