ETSITR102659-2V1.1.1(2009-02)TechnicalReportGRID;StudyofICTGRIDinteroperabilitygaps;Part2:ListofidentifiedGapsETSIETSITR102659-2V1.1.1(2009-02)2ReferenceDTR/GRID-0001-2Keywordsanalysis;directory;ICT;interoperability;testingETSI650RoutedesLuciolesF-06921SophiaAntipolisCedex-FRANCETel.:+33492944200Fax:+33493654716SiretN°34862356200017-NAF742CAssociationàbutnonlucratifenregistréeàlaSous-PréfecturedeGrasse(06)N°7803/88ImportantnoticeIndividualcopiesofthepresentdocumentcanbedownloadedfrom:(PDF).Incaseofdispute,thereferenceshallbetheprintingonETSIprintersofthePDFversionkeptonaspecificnetworkdrivewithinETSISecretariat.Usersofthepresentdocumentshouldbeawarethatthedocumentmaybesubjecttorevisionorchangeofstatus.InformationonthecurrentstatusofthisandotherETSIdocumentsisavailableat:©EuropeanTelecommunicationsStandardsInstitute2009.Allrightsreserved.DECTTM,PLUGTESTSTM,UMTSTM,TIPHONTM,theTIPHONlogoandtheETSIlogoareTradeMarksofETSIregisteredforthebenefitofitsMembers.3GPPTMisaTradeMarkofETSIregisteredforthebenefitofitsMembersandofthe3GPPOrganizationalPartners.LTE™isaTradeMarkofETSIcurrentlybeingregisteredforthebenefitofitsMembersandofthe3GPPOrganizationalPartners.GSM®andtheGSMlogoareTradeMarksregisteredandownedbytheGSMAssociation.ETSIETSITR102659-2V1.1.1(2009-02)3ContentsIntellectualPropertyRights................................................................................................................................5Foreword.............................................................................................................................................................51Scope........................................................................................................................................................62References................................................................................................................................................62.1Normativereferences.........................................................................................................................................62.2Informativereferences........................................................................................................................................73Definitionsandabbreviations.................................................................................................................113.1Definitions........................................................................................................................................................113.2Abbreviations...................................................................................................................................................124MethodologyforGapAnalysis..............................................................................................................145SpecificationAreasselectedforAnalysis..............................................................................................145.1ServiceLevelAgreements................................................................................................................................155.1.1Introduction.................................................................................................................................................155.1.2SLATerminology.......................................................................................................................................155.1.3SecondaryDefinitions.................................................................................................................................175.1.4Discussion...................................................................................................................................................175.1.5DifferenttypesofSLA...............................................................................................................................185.2Security............................................................................................................................................................195.2.1Introduction.................................................................................................................................................195.2.2Definitions..................................................................................................................................................195.2.3Authentication....................