[{"name":"S3-240314","title":"Draft TR33.794 Skeleton","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2024-02-15 09:14:53","uploaded":"2024-02-15 09:16:42","revisionof":"","revisedto":"S3-240896","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240314.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240332","title":"Scope to TR 33.794","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications, Nokia, Nokia Shanghai Bell, Johns Hopkins University APL","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2024-02-16 10:47:33","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"S3-240897","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240332.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240333","title":"Introduction to TR 33.794","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications, Nokia, Nokia Shanghai Bell","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":30,"status":"noted","reservation_date":"2024-02-16 10:48:49","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240333.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240334","title":"Security Assumptions for TR 33.794","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications, Johns Hopkins University APL","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2024-02-16 10:50:21","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"S3-240898","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240334.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240335","title":"Data related to Malformed Message","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":60,"status":"revised","reservation_date":"2024-02-16 10:51:49","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"S3-240903","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240335.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240336","title":"Data related to Massive number of Service Messages","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications, Nokia, Nokia Shanghai Bell","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2024-02-16 10:53:22","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"S3-240904","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240336.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240337","title":"KI related to WT1","source":"Lenovo, Motorola Mobility, AT&T","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2024-02-16 10:56:39","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"S3-241005","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240337.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240338","title":"Usecase for security policy enforcement","source":"Lenovo, Motorola Mobility, AT&T","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":120,"status":"revised","reservation_date":"2024-02-16 10:57:56","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"S3-241021","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240338.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240382","title":"FS_eZTS Timeline","source":"MITRE Corporation","contact":"David Gabay","contact-id":90111,"tdoctype":"discussion","for":"Endorsement","abstract":"This contribution proposes a timeline for the contents to be included into the TR 33.794.","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2024-02-16 20:05:16","uploaded":"2024-02-16 20:16:25","revisionof":"","revisedto":"","release":"Rel-19","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240382.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240383","title":"ZTS New Data exposure use case: Unauthorized\/unauthenticated NF service access request","source":"MITRE Corporation","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"A NF service access request that is made by an unauthenticated or unauthorized NF should be logged and reported for security monitoring and evaluation to enable traceability and accountability and detect potentially compromised NFs.","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":80,"status":"revised","reservation_date":"2024-02-16 20:09:26","uploaded":"2024-02-16 20:16:25","revisionof":"","revisedto":"S3-240905","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240383.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240385","title":"ZTS New data exposure use case: Topology discovery","source":"MITRE Corporation","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Only checking to see if a certificate is valid and not applying any context (e.g. is NF consumer allowed to or expected to contact the NF producer) to the check allows the consumer NF to discover the network topology.","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2024-02-16 20:12:42","uploaded":"2024-02-16 20:16:25","revisionof":"","revisedto":"S3-241020","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240385.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240688","title":"Security Assumptions for Study on enablers for Zero Trust Security","source":"Nokia, Nokia Shanghai Bell, AT&T, Lenovo","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-02-19 10:39:26","uploaded":"2024-02-19 13:05:17","revisionof":"","revisedto":"S3-240902","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240688.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240740","title":"FS_eZTS offline Call Minutes","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":140,"status":"noted","reservation_date":"2024-02-19 11:50:01","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240740.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240814","title":"Use case : security data exposure for API security risks on 5G SBA layer","source":"Nokia, Nokia Shanghai Bell, AT&T, Lenovo","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2024-02-19 14:01:23","uploaded":"2024-02-19 14:29:15","revisionof":"","revisedto":"S3-241004","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240814.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240896","title":"Draft TR33.794 Skeleton","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":11,"status":"approved","reservation_date":"2024-05-03 15:45:49","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240314","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240896.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240897","title":"Scope to TR 33.794","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications, Nokia, Nokia Shanghai Bell, Johns Hopkins University APL","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":21,"status":"approved","reservation_date":"2024-05-03 15:45:49","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240332","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240897.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240898","title":"Security Assumptions for TR 33.794","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications, Johns Hopkins University APL","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":41,"status":"approved","reservation_date":"2024-05-03 15:45:50","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240334","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240898.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240902","title":"Security Assumptions for Study on enablers for Zero Trust Security","source":"Nokia, Nokia Shanghai Bell, AT&T, Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":51,"status":"approved","reservation_date":"2024-05-03 15:45:52","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240688","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240902.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240903","title":"Data related to Malformed Message","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":61,"status":"approved","reservation_date":"2024-05-03 15:45:52","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240335","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240903.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240904","title":"Data related to Massive number of Service Messages","source":"Lenovo, Motorola Mobility, AT&T, Charter Communications, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":71,"status":"approved","reservation_date":"2024-05-03 15:45:52","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240336","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240904.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240905","title":"ZTS New Data exposure use case: Unauthorized\/unauthenticated NF service access request","source":"MITRE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":81,"status":"approved","reservation_date":"2024-05-03 15:45:53","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240383","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240905.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241004","title":"Use case : security data exposure for API security risks on 5G SBA layer","source":"Nokia, Nokia Shanghai Bell, AT&T, Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":101,"status":"approved","reservation_date":"2024-05-03 15:46:48","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240814","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241004.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241005","title":"KI related to WT1","source":"Lenovo, Motorola Mobility, AT&T","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":111,"status":"approved","reservation_date":"2024-05-03 15:46:48","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240337","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241005.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241020","title":"ZTS New data exposure use case: Topology discovery","source":"MITRE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":91,"status":"approved","reservation_date":"2024-05-03 15:46:56","uploaded":"2024-03-05 15:51:18","revisionof":"S3-240385","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241020.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241021","title":"Usecase for security policy enforcement","source":"Lenovo, Motorola Mobility, AT&T","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":121,"status":"approved","reservation_date":"2024-05-03 15:46:56","uploaded":"2024-03-05 15:51:18","revisionof":"S3-240338","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.0.1","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241021.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241038","title":"Draft TR 33.794","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"5.1","ainame":"New Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2024-05-03 15:47:00","uploaded":"2024-03-07 14:41:10","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241038.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241103","title":"New use case for security evaluation and monitoring: NFV vulnerabilities","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":120,"status":"noted","reservation_date":"2024-03-04 15:09:20","uploaded":"2024-04-03 15:22:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241103.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241104","title":"New use case for security evaluation and monitoring: API security risks","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2024-03-04 15:10:18","uploaded":"2024-04-03 15:22:57","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241104.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241105","title":"New use case for security evaluation and monitoring: Man-in-the-Middle (MitM) attacks","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":140,"status":"noted","reservation_date":"2024-03-04 15:11:01","uploaded":"2024-04-03 15:23:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241105.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241106","title":"New use case for security evaluation and monitoring: Identity spoofing and impersonation (Aka Rogue Elements)","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":150,"status":"noted","reservation_date":"2024-03-04 15:11:41","uploaded":"2024-04-03 15:23:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241106.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241134","title":"FS_eZTS Offline Call#3 Minutes","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":260,"status":"noted","reservation_date":"2024-05-04 19:16:46","uploaded":"2024-04-08 14:22:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241134.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241135","title":"New KI on dynamic security policy enforcement","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":210,"status":"merged","reservation_date":"2024-05-04 19:17:19","uploaded":"2024-04-08 14:22:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241135.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241136","title":"Updates to KI#1","source":"Lenovo, Nokia, Nokia Shanghai Bell, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":190,"status":"merged","reservation_date":"2024-05-04 19:17:59","uploaded":"2024-04-08 14:22:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241136.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241137","title":"Updates to Access control decision enhancement usecase","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":180,"status":"approved","reservation_date":"2024-05-04 19:18:33","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241137.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241138","title":"Updates to Massive number of SBI messages","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":80,"status":"revised","reservation_date":"2024-05-04 19:19:17","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"S3-241568","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241138.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241139","title":"Updates to Malformed Message Usecase","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-05-04 19:21:13","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"S3-241570","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241139.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241140","title":"Resolving EN on dynamic security policy enforcement","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":30,"status":"merged","reservation_date":"2024-05-04 19:22:21","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241140.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241141","title":"Resolving EN on data exposure","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":20,"status":"merged","reservation_date":"2024-05-04 19:23:04","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241141.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241154","title":"Resolve EN and provide updates to use case 3","source":"MITRE Corporation, US NSA, Lenovo","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #3 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2024-07-04 17:26:03","uploaded":"2024-04-07 17:33:10","revisionof":"","revisedto":"S3-241537","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241154.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241155","title":"Resolve EN and provide updates to use case 4","source":"MITRE Corporation, US NSA, Lenovo","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #4 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2024-07-04 17:28:08","uploaded":"2024-04-07 17:33:10","revisionof":"","revisedto":"S3-241538","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241155.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241156","title":"Abnormal SBI Call Flow","source":"US National Security Agency, MITRE Corporation, OTD_US","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2024-07-04 19:53:40","uploaded":"2024-04-07 19:55:50","revisionof":"","revisedto":"S3-241604","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241156.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241320","title":"Data related to failed audience claim in the access token","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":170,"status":"merged","reservation_date":"2024-08-04 09:25:05","uploaded":"2024-04-08 13:00:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241320.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241339","title":"Evaluation for the use case on malformed messages","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2024-08-04 09:25:06","uploaded":"2024-04-08 13:00:15","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241339.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241340","title":"Evaluation for the use case on number of messages","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":90,"status":"merged","reservation_date":"2024-08-04 09:25:06","uploaded":"2024-04-08 13:00:15","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241340.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241341","title":"Discussion on the exposure of security related data","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2024-08-04 09:25:06","uploaded":"2024-04-08 13:00:15","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241341.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241421","title":"LS on security data management for continuous security monitoring","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":250,"status":"noted","reservation_date":"2024-08-04 11:14:59","uploaded":"2024-04-08 12:33:22","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA5","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241421.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241423","title":"Adding requirements to KI#1 \"Data exposure for security evaluation and monitoring\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2024-08-04 11:21:09","uploaded":"2024-04-08 13:06:56","revisionof":"","revisedto":"S3-241525","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241423.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241424","title":"Adding Key Issue on WT2 \"Security mechanism for dynamic policy enforcement\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":220,"status":"revised","reservation_date":"2024-08-04 11:21:09","uploaded":"2024-04-08 13:06:57","revisionof":"","revisedto":"S3-241526","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241424.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241425","title":"Update of the security assumptions","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2024-08-04 11:21:10","uploaded":"2024-04-08 13:06:57","revisionof":"","revisedto":"S3-241527","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241425.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241426","title":"Update on malformed messages in the 5G SBA","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":70,"status":"merged","reservation_date":"2024-08-04 11:21:10","uploaded":"2024-04-08 13:06:56","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241426.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241437","title":"New Solution for Key Issue 1","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":240,"status":"noted","reservation_date":"2024-08-04 11:28:37","uploaded":"2024-04-08 12:33:49","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241437.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241445","title":"New Key Issue on data exposure relevant for network level attacks","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":230,"status":"noted","reservation_date":"2024-08-04 12:29:21","uploaded":"2024-04-08 12:35:52","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241445.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241525","title":"Adding requirements to KI#1 \"Data exposure for security evaluation and monitoring\"","source":"Ericsson, Lenovo, Nokia, Nokia Shanghai Bell, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15250,"status":"approved","reservation_date":"2024-04-19 12:38:51","uploaded":"2024-04-19 14:50:14","revisionof":"S3-241423","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241525.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241526","title":"Adding Key Issue on WT2 \"Security mechanism for dynamic policy enforcement\"","source":"Ericsson, Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15260,"status":"approved","reservation_date":"2024-04-19 12:40:15","uploaded":"2024-04-19 14:50:14","revisionof":"S3-241424","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241526.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241527","title":"Update of the security assumptions","source":"Ericsson, Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15270,"status":"approved","reservation_date":"2024-04-19 12:41:41","uploaded":"2024-04-19 14:50:14","revisionof":"S3-241425","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241527.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241537","title":"Resolve EN and provide updates to use case 3","source":"MITRE Corporation, US NSA, Lenovo, Huawei, HiSilicon","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #3 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15370,"status":"approved","reservation_date":"2024-04-19 13:42:48","uploaded":"2024-04-19 14:26:46","revisionof":"S3-241154","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241537.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241538","title":"Resolve EN and provide updates to use case 4","source":"MITRE Corporation, US NSA, Lenovo","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #4 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15380,"status":"approved","reservation_date":"2024-04-19 13:43:17","uploaded":"2024-04-19 14:26:46","revisionof":"S3-241155","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241538.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241568","title":"Updates to Massive number of SBI messages","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility, Huawei, HiSilicon","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15680,"status":"approved","reservation_date":"2024-04-19 14:40:12","uploaded":"2024-04-19 15:05:55","revisionof":"S3-241138","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241568.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241570","title":"Updates to Malformed Message Usecase","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility, Ericsson, Huawei, HiSilicon","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15700,"status":"approved","reservation_date":"2024-04-19 14:41:53","uploaded":"2024-04-19 15:05:55","revisionof":"S3-241139","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241570.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241604","title":"Abnormal SBI Call Flow","source":"US National Security Agency, MITRE Corporation, OTD_US","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":16040,"status":"approved","reservation_date":"2024-04-21 02:38:34","uploaded":"2024-04-21 02:47:29","revisionof":"S3-241156","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241604.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241638","title":"Draft TR 33.794","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":16380,"status":"approved","reservation_date":"2024-04-22 08:36:18","uploaded":"2024-04-25 14:23:46","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241638.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]