[{"name":"S3-180565","title":"[eMCSEC] 33180 R14 GMK management","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Rules to manage a GMK when a user is removed from a group.","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5650,"status":"revised","reservation_date":"2018-02-15 21:21:45","uploaded":"2018-02-19 15:14:55","revisionof":"","revisedto":"S3-180863","release":"Rel-14","crspec":33.18,"crspecversion":"14.2.0","workitem":[{"winame":"eMCSec"}],"crnumber":52.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180565.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180566","title":"[eMCSEC] 33180 R14 key storage and persistence","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Secure storage and persistence of mission critical keys and key material in the UE.","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5660,"status":"revised","reservation_date":"2018-02-15 21:24:19","uploaded":"2018-02-19 15:14:55","revisionof":"","revisedto":"S3-180864","release":"Rel-14","crspec":33.18,"crspecversion":"14.2.0","workitem":[{"winame":"eMCSec"}],"crnumber":53.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180566.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180567","title":"[eMCSEC] 33180 R15 GMK management (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Managing a GMK when a user is removed from a group.","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5670,"status":"revised","reservation_date":"2018-02-15 21:27:00","uploaded":"2018-02-19 15:14:55","revisionof":"","revisedto":"S3-180865","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":54.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180567.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180568","title":"[eMCSEC] 33180 R15 key storage and persistence (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Secure storage and persistence of mission critical keys and key material  in the UE.","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5680,"status":"revised","reservation_date":"2018-02-15 21:30:43","uploaded":"2018-02-19 15:14:55","revisionof":"","revisedto":"S3-180866","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":55.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180568.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180799","title":"[eMCSEC] Adding Integrity Key for KMS communications - Correcting XML","source":"NCSC","contact":"Peter Haigh","contact-id":70254,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":7990,"status":"withdrawn","reservation_date":"2018-02-19 13:41:26","uploaded":null,"revisionof":"S3-180332","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":51.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180800","title":"[eMCSec] 33.180 R15 Interconnection and Interworking media and signaling","source":"NCSC","contact":"Peter Haigh","contact-id":70254,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":8000,"status":"revised","reservation_date":"2018-02-19 13:42:58","uploaded":"2018-02-19 14:01:04","revisionof":"S3-180376","revisedto":"S3-180926","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":45.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180800.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180801","title":"[eMCSEC] Cleanup of EAR description","source":"NCSC","contact":"Peter Haigh","contact-id":70254,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":8010,"status":"withdrawn","reservation_date":"2018-02-19 13:43:29","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":58.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180802","title":"[eMCSEC] Providing details of EARs into Annex J","source":"NCSC","contact":"Peter Haigh","contact-id":70254,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":8020,"status":"agreed","reservation_date":"2018-02-19 13:43:30","uploaded":"2018-02-19 14:01:04","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":59.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180802.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180803","title":"[eMCSEC] Clarification of purpose of Inter-domain user service authorisation","source":"NCSC","contact":"Peter Haigh","contact-id":70254,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":8030,"status":"revised","reservation_date":"2018-02-19 13:43:31","uploaded":"2018-02-19 14:01:04","revisionof":"","revisedto":"S3-180906","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":60.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180803.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180804","title":"[eMCSEC] Correction of reference to SA1 specification","source":"NCSC","contact":"Peter Haigh","contact-id":70254,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":8040,"status":"agreed","reservation_date":"2018-02-19 13:43:31","uploaded":"2018-02-19 14:01:04","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":61.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180804.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180863","title":"[eMCSEC] 33180 R14 GMK management","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5651,"status":"agreed","reservation_date":"2018-02-27 17:13:13","uploaded":"2018-02-27 17:13:13","revisionof":"S3-180565","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.2.0","workitem":[{"winame":"eMCSec"}],"crnumber":52.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180863.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180864","title":"[eMCSEC] 33180 R14 key storage and persistence","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5661,"status":"agreed","reservation_date":"2018-02-27 17:13:13","uploaded":"2018-02-27 17:13:13","revisionof":"S3-180566","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.2.0","workitem":[{"winame":"eMCSec"}],"crnumber":53.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180864.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180865","title":"[eMCSEC] 33180 R15 GMK management (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5671,"status":"agreed","reservation_date":"2018-02-27 17:13:13","uploaded":"2018-02-27 17:13:13","revisionof":"S3-180567","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":54.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180865.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180866","title":"[eMCSEC] 33180 R15 key storage and persistence (mirror)","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":5681,"status":"agreed","reservation_date":"2018-02-27 17:13:13","uploaded":"2018-02-27 17:13:13","revisionof":"S3-180568","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":55.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180866.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180906","title":"[eMCSEC] Clarification of purpose of Inter-domain user service authorisation","source":"NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":8031,"status":"agreed","reservation_date":"2018-02-27 18:35:50","uploaded":"2018-02-27 18:35:50","revisionof":"S3-180803","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":60.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180906.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180926","title":"[eMCSec] 33.180 R15 Interconnection and Interworking media and signaling","source":"NCSC,Motorola Solutions","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":80,"ainumber":"4.3","ainame":"Mission Critical Security Enhancements (eMCSec) (Rel-15)","tdoc_agenda_sort_order":8001,"status":"agreed","reservation_date":"2018-02-27 18:35:50","uploaded":"2018-02-27 18:35:50","revisionof":"S3-180800","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.0.0","workitem":[{"winame":"eMCSec"}],"crnumber":45.0,"crrevision":3.0,"crcategory":"B","tsg_crp":"SP-180043","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180926.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]