[{"name":"S3-200613","title":"Authentication between network functions and the NRF in indirect communication","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6130,"status":"noted","reservation_date":"2020-04-02 12:42:07","uploaded":"2020-04-02 20:02:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200613.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200614","title":"Token-based authorization in Scenario D","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6140,"status":"noted","reservation_date":"2020-04-02 12:43:21","uploaded":"2020-04-02 20:02:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200614.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200616","title":"LS on Misalignment on HTTP connections for N32-c and on N32-f contexts termination","source":"C4-200781","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6160,"status":"withdrawn","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200616.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200617","title":"LS on Misalignments on N32-f context Id","source":"C4-200782","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6170,"status":"withdrawn","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200617.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200660","title":"Way forward on authentication and authorization in SBA","source":"CableLabs","contact":"Tao Wan","contact-id":79074,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6600,"status":"noted","reservation_date":"2020-04-03 01:53:29","uploaded":"2020-04-03 01:57:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200660.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200662","title":"Validation of Access Token ownership requirement","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"clarification to the validation of the access token during token-based authorization in the case of Direct and Indirect communication","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6620,"status":"not pursued","reservation_date":"2020-04-03 04:54:23","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":786.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200662.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200663","title":"Discussion End-2-End Access Token ownership validation","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"discussion","for":"Endorsement","abstract":"What is required for end-2-end access token authorization","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6630,"status":"noted","reservation_date":"2020-04-03 04:54:28","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200663.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200664","title":"end-2-end client authentication during Indirect communication","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"discussion","for":"Endorsement","abstract":"Discussion on the required proof for enabling end-2-end authentication during Indirect communication","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6640,"status":"noted","reservation_date":"2020-04-03 04:54:28","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200664.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200665","title":"Clarification of Token-based authorization","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"What is required to enable end-2-end hop-by-hop mutual authentuication","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6650,"status":"not pursued","reservation_date":"2020-04-03 04:54:28","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":787.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200665.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200666","title":"Clarification of Indirect Communication Mutual Authentication","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"Removing ambiguity regarding mutual authentication between NFs within same PLMN during Indirect communication, e.g., with SCP as a proxy service node","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6660,"status":"not pursued","reservation_date":"2020-04-03 04:54:30","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":788.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200666.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200686","title":"Trust mode in the eSBA","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6860,"status":"not pursued","reservation_date":"2020-04-03 07:28:54","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":791.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200686.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200687","title":"eSBA: Discussion on the subscribe\/notify issue","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6870,"status":"noted","reservation_date":"2020-04-03 07:28:58","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200687.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200688","title":"Authorization in the Subscribe-Notify interaction scenarios","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6880,"status":"not pursued","reservation_date":"2020-04-03 07:28:58","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":792.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200688.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200689","title":"Clarification on NF consumer instance ID verification","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6890,"status":"not pursued","reservation_date":"2020-04-03 07:28:59","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":793.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200689.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200792","title":"Token based authorization in model D - Scenario 1","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"Token based authorization for Model D - Scenario 1","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7920,"status":"noted","reservation_date":"2020-04-03 14:51:57","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200792.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200794","title":"Token based authorization in model D - Scenario 2","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7940,"status":"noted","reservation_date":"2020-04-03 14:56:01","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200794.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200795","title":"Authentication between Network Functions","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7950,"status":"noted","reservation_date":"2020-04-03 14:59:27","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200795.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200796","title":"Authentication between NRF and NF","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7960,"status":"noted","reservation_date":"2020-04-03 15:02:04","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200796.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200797","title":"Access token ownership in Direct communication scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7970,"status":"noted","reservation_date":"2020-04-03 15:10:44","uploaded":"2020-04-03 15:27:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200797.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200798","title":"Access token ownership in Indirect communication scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7980,"status":"noted","reservation_date":"2020-04-03 15:12:47","uploaded":"2020-04-03 15:27:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200798.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200799","title":"Token based authorization in model D","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7990,"status":"withdrawn","reservation_date":"2020-04-03 15:14:39","uploaded":"2020-04-03 15:27:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200799.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200800","title":"SBA Network Function certificate profile","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":8000,"status":"noted","reservation_date":"2020-04-03 15:28:33","uploaded":"2020-04-03 15:29:52","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200800.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200801","title":"Discussion paper on authentication for indirect communication","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":8010,"status":"noted","reservation_date":"2020-04-03 15:32:13","uploaded":"2020-04-03 15:33:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200801.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]