[{"name":"S3-161306","title":"Discussion on NextGen Security Architecture","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"discussion","for":"Discussion","abstract":"This presentation aims to start a discussion about the need of target NextGen security architecture to be flexible, allowing on-demand association between Core Network (CN) and RAN, and replacing transfer of root key with key derivation.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13060,"status":"noted","reservation_date":"2016-09-15 16:33:46","uploaded":"2016-09-20 12:29:48","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161306.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161307","title":"Key Issue 1.3 User plane integrity between UE and network","source":"BlackBerry UK Limited","contact":"Nicholas Alfano","contact-id":16849,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes to allow the option for a UE to connect to a network without user plane integrity protection (encryption) operating at the radio interface. This option would only be invoked if all user data was encrypted at a higher layer.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13070,"status":"withdrawn","reservation_date":"2016-09-15 19:13:53","uploaded":"2016-09-15 19:24:39","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161307.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161308","title":"Identity Management","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"","abstract":"This contribution raises the issue of identity management in the security framework of NextGen,, it proposes to take the issue into the study area of security  architecture in the  work program (33.899)","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13080,"status":"noted","reservation_date":"2016-09-17 17:48:37","uploaded":"2016-09-20 17:51:32","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161308.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161309","title":"Security Layer: Identity and Slice Management","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13090,"status":"noted","reservation_date":"2016-09-17 17:54:43","uploaded":"2016-09-20 17:52:11","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161309.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161324","title":"Adding security requirements of low latency","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution presents security requirements of low latency","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13240,"status":"revised","reservation_date":"2016-09-19 09:44:11","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"S3-161485","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161324.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161328","title":"Integrity protection of UE supported algorithms and UE\u2019s preferences","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13280,"status":"noted","reservation_date":"2016-09-19 09:56:02","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161328.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161329","title":"Add security threats and potential requirements for KI#1.11","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13290,"status":"revised","reservation_date":"2016-09-19 09:57:34","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"S3-161486","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161329.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161334","title":"Clarification on relation between flexible UP-traffic protection and slicing\/heterogeneous access network","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13340,"status":"approved","reservation_date":"2016-09-19 10:07:06","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161334.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161335","title":"threats of control plane between UE and network","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13350,"status":"revised","reservation_date":"2016-09-19 10:08:29","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"S3-161483","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161335.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161348","title":"pCR to TR 33.899: Update of a solution on key hierarchy for 5G security","source":"NEC Corporation","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"This pCR updates a solution of #1.4 Key hierarchy in the security area of architectural aspects of 5G security in TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13480,"status":"revised","reservation_date":"2016-09-20 02:25:41","uploaded":"2016-09-20 04:35:47","revisionof":"","revisedto":"S3-161488","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161348.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161359","title":"pCR to TR 33.899: Solution #1.z Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes a solution to Key Issues of \u201c#1 Architectural aspects of NextGen security\u201c","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13590,"status":"revised","reservation_date":"2016-09-20 03:50:15","uploaded":"2016-09-20 05:11:49","revisionof":"","revisedto":"S3-161489","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161359.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161362","title":"UP protection for PDU session (re)establishment triggered by handover","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13620,"status":"revised","reservation_date":"2016-09-20 07:44:28","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"S3-161508","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161362.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161363","title":"Key hierarchy and the related procedure","source":"Huawei, HiSilicon, KPN","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13630,"status":"revised","reservation_date":"2016-09-20 07:46:23","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"S3-161490","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161363.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161373","title":"Modification on Solution #1.5: User plane security policy and key derivation","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13730,"status":"revised","reservation_date":"2016-09-20 08:05:53","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"S3-161484","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161373.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161375","title":"Clarify the KI #1.7 and modify the corresponding solution","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13750,"status":"approved","reservation_date":"2016-09-20 08:14:22","uploaded":"2016-09-20 08:20:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161375.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161376","title":"Security threats and potential requirements for KI#1.9 and KI#1.10","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13760,"status":"revised","reservation_date":"2016-09-20 08:16:15","uploaded":"2016-09-20 08:20:20","revisionof":"","revisedto":"S3-161487","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161376.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161377","title":"Basic security call flow for UE initial attach","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13770,"status":"revised","reservation_date":"2016-09-20 08:18:41","uploaded":"2016-09-20 08:20:20","revisionof":"","revisedto":"S3-161492","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161377.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161414","title":"pCR for adding a solution for key issue #1.13: Security Implications of Low Latency","source":"THALES","contact":"Christiane KAMENI NGASSA","contact-id":64495,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes a solution dealing with the key issues #1.13\u201cSecurity Implications of Low Latency\u201d.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14140,"status":"revised","reservation_date":"2016-09-20 12:09:58","uploaded":"2016-09-20 12:14:03","revisionof":"","revisedto":"S3-161493","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161414.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161420","title":"Making UP security termination point a key issue of its own","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14200,"status":"revised","reservation_date":"2016-09-20 12:13:13","uploaded":"2016-09-20 13:58:12","revisionof":"","revisedto":"S3-161462","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161420.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161421","title":"Making UP protection granularity a key issue of its own","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14210,"status":"revised","reservation_date":"2016-09-20 12:13:58","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"S3-161481","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161421.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161423","title":"Interconnection Security Key Issue","source":"Nokia, Telecom Italia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14230,"status":"approved","reservation_date":"2016-09-20 12:15:15","uploaded":"2016-09-20 13:13:18","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161423.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161425","title":"Making On-demand security policy a key issue of its own","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14250,"status":"revised","reservation_date":"2016-09-20 12:16:51","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"S3-161482","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161425.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161426","title":"Interconnection Security - Circles of Trust","source":"Nokia, Telecom Italia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14260,"status":"revised","reservation_date":"2016-09-20 12:18:12","uploaded":"2016-09-20 13:13:18","revisionof":"","revisedto":"S3-161515","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161426.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161428","title":"Solution proposal for enhancing security of sending of authentication vectors","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14280,"status":"revised","reservation_date":"2016-09-20 12:20:04","uploaded":"2016-09-20 13:13:18","revisionof":"","revisedto":"S3-161497","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161428.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161431","title":"Update of solution #1.6 to include roaming architectural aspects","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14310,"status":"revised","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161491","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161431.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161433","title":"Clarifying the scope of the confidentiality and integrity requirements for UE to network control plane message","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14330,"status":"merged","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:30","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161433.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161462","title":"Making UP security termination point a key issue of its own","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14201,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161420","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161462.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161481","title":"Making UP protection granularity a key issue of its own","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14211,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161421","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161481.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161482","title":"Making On-demand security policy a key issue of its own","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14251,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161425","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161482.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161483","title":"threats of control plane between UE and network","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13351,"status":"approved","reservation_date":"2016-10-06 09:48:15","uploaded":"2016-10-06 09:48:15","revisionof":"S3-161335","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161483.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161484","title":"Modification on Solution #1.5: User plane security policy and key derivation","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13731,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161373","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161484.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161485","title":"Adding security requirements of low latency","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13241,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161324","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161485.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161486","title":"Add security threats and potential requirements for KI#1.11","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13291,"status":"approved","reservation_date":"2016-10-06 09:48:15","uploaded":"2016-10-06 09:48:15","revisionof":"S3-161329","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161486.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161487","title":"Security threats and potential requirements for KI#1.9 and KI#1.10","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13761,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161376","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161487.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161488","title":"pCR to TR 33.899: Update of a solution on key hierarchy for 5G security","source":"NEC Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13481,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161348","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161488.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161489","title":"pCR to TR 33.899: Solution #1.z Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13591,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161359","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161489.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161490","title":"Key hierarchy and the related procedure","source":"Huawei, HiSilicon, KPN","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13631,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161363","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161490.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161491","title":"Update of solution #1.6 to include roaming architectural aspects","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14311,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161431","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161491.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161492","title":"Basic security call flow for UE initial attach","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13771,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161377","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161492.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161493","title":"pCR for adding a solution for key issue #1.13: Security Implications of Low Latency","source":"THALES","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14141,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161414","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161493.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161497","title":"Solution proposal for enhancing security of sending of authentication vectors","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14281,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161428","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161497.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161508","title":"UP protection for PDU session (re)establishment triggered by handover","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13621,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161362","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161508.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161515","title":"Interconnection Security - Circles of Trust","source":"Nokia, Telecom Italia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14261,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161426","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161515.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]