[{"name":"S3-161316","title":"Security Architecture for Network Slicing","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for the Key Issue #8.3 Security on UEs\u2019 access to slices of TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13160,"status":"noted","reservation_date":"2016-09-18 09:02:42","uploaded":"2016-09-19 10:35:01","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161316.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161317","title":"Scenarios for key sharing between slices","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose scenarios for key sharing between slices that authenticating UE\u2019s access to slices needs to consider","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13170,"status":"approved","reservation_date":"2016-09-19 03:07:45","uploaded":"2016-09-22 05:14:35","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161317.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161318","title":"Solution for UE access network and slices","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose a solution for UE access network and slices","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13180,"status":"revised","reservation_date":"2016-09-19 03:13:26","uploaded":"2016-09-22 05:14:35","revisionof":"","revisedto":"S3-161460","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161318.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161347","title":"Network Slice initial attach and authentication","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes network slice authentication scenario where the default CCNF itself hosts the network slice for the UE or the default CCNF selects and assigns a different network slice serving CCNF for serving the UE.","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13470,"status":"revised","reservation_date":"2016-09-19 19:29:41","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"S3-161528","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161347.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161350","title":"Removal of Editor's Notes of Solution 8.1","source":"NEC Corporation","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13500,"status":"noted","reservation_date":"2016-09-20 02:29:29","uploaded":"2016-09-20 04:35:47","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161350.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161364","title":"Solution for Security Mechanism Differentiation for Network Slices","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13640,"status":"noted","reservation_date":"2016-09-20 07:48:04","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161364.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161374","title":"pCR_amendment to security requirements and threats for key issue #8.3","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13740,"status":"approved","reservation_date":"2016-09-20 08:07:47","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161374.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161460","title":"Solution for UE access network and slices","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13181,"status":"revised","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161318","revisedto":"S3-161529","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161460.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161528","title":"Network Slice initial attach and authentication","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13471,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161347","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161528.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161529","title":"Solution for UE access network and slices","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13182,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161460","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161529.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]