[{"name":"S3-241713","title":"Resolve EN in Use case 1","source":"Lenovo, Motorola Mobility, Johns Hopkins University APL","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2024-03-05 08:30:59","uploaded":"2024-05-13 14:51:52","revisionof":"","revisedto":"S3-242418","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241713.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241714","title":"Resolve EN in Use case 2","source":"Lenovo, Motorola Mobility, Johns Hopkins University APL","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":30,"status":"merged","reservation_date":"2024-03-05 08:31:36","uploaded":"2024-05-13 14:51:52","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241714.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241715","title":"Solution to KI#1 Network assisted data collection","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":120,"status":"revised","reservation_date":"2024-03-05 08:32:24","uploaded":"2024-05-13 14:51:53","revisionof":"","revisedto":"S3-242424","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241715.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241716","title":"Solution to KI#1_Direct data collection","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":130,"status":"revised","reservation_date":"2024-03-05 08:32:52","uploaded":"2024-05-13 14:51:53","revisionof":"","revisedto":"S3-242425","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241716.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241717","title":"Update to KI#2","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":80,"status":"merged","reservation_date":"2024-03-05 08:33:20","uploaded":"2024-05-13 14:51:53","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241717.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241718","title":"Initial Conclusion to KI#1","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":170,"status":"noted","reservation_date":"2024-03-05 08:34:55","uploaded":"2024-05-13 14:51:53","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241718.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241792","title":"New use case for security evaluation and monitoring: Common Vulnerabilities and Exposures (CVE) attacks","source":"ISSDU, NYCU, III","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":60,"status":"noted","reservation_date":"2024-10-05 09:51:24","uploaded":"2024-05-11 10:16:40","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241792.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241850","title":"New solution for KI#1: New Data Collection NFs","source":"MITRE Corporation, Johns Hopkins University APL, OTD_US, US National Security Agency","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes an architecture that can be used to facilitate the transfer of data from an NF to the operator\u2019s security function.","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":140,"status":"revised","reservation_date":"2024-12-05 15:10:10","uploaded":"2024-05-13 00:26:43","revisionof":"","revisedto":"S3-242426","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241850.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241851","title":"New use case for security evaluation and monitoring: API security risks","source":"MITRE Corporation, Dell Technologies, Defense Information Systems Agency EM, US National Security Agency, Nokia, Nokia Shanghai Bell, Johns Hopkins University APL, AT&T","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes to add a new use case for data collection related to detection and exposure of data related to API security risks","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2024-12-05 15:14:46","uploaded":"2024-05-13 00:26:43","revisionof":"","revisedto":"S3-242422","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241851.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241852","title":"Updates to eZTS Key Issue 2","source":"MITRE Corporation, Johns Hopkins University APL, OTD_US, US National Security Agency, Nokia, Nokia Shanghai Bell","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"The contribution proposes to update KI 2 with additional context on policy enforcement and add security requirements","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2024-12-05 15:23:54","uploaded":"2024-05-13 00:26:43","revisionof":"","revisedto":"S3-242423","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241852.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241853","title":"New solution for KI#2: Security Policy Enforcement via NRF and SCP\/NF","source":"MITRE Corporation, Johns Hopkins University APL, US National Security Agency","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"This solution addresses KI#2 (Key Issue #2: Security mechanisms for policy enforcement at the 5G SBA); Specifically, it addresses Security policy enforcement Use Case #1: Access control decision enhancement (i.e., how the data from security monitoring can","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":180,"status":"revised","reservation_date":"2024-12-05 15:27:10","uploaded":"2024-05-13 00:26:43","revisionof":"","revisedto":"S3-242429","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241853.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241867","title":"Addressing ENs in Use Case 5","source":"US National Security Agency, MITRE Corporation, Johns Hopkins University APL","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"Remove Editor\u2019s Notes within clauses 5.1.5.2 and 5.1.5.3","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-12-05 17:21:50","uploaded":"2024-05-12 17:27:01","revisionof":"","revisedto":"S3-242421","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241867.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241869","title":"Discussion on ZTS Assumptions","source":"Johns Hopkins University APL, MITRE Corporation, National Security Agency","contact":"Candace Carducci","contact-id":90728,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":210,"status":"noted","reservation_date":"2024-12-05 21:18:59","uploaded":"2024-05-12 22:26:02","revisionof":"","revisedto":"","release":"Rel-19","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241869.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241924","title":"pCR on Solution for NRF reporting","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":190,"status":"noted","reservation_date":"2024-05-13 05:45:36","uploaded":"2024-05-13 10:42:54","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241924.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241929","title":"New Key Issue on data exposure relevant for network level attacks","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":110,"status":"noted","reservation_date":"2024-05-13 06:04:56","uploaded":"2024-05-13 10:46:36","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241929.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241930","title":"New Solution for Key Issue 1","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":150,"status":"revised","reservation_date":"2024-05-13 06:07:08","uploaded":"2024-05-13 10:47:09","revisionof":"","revisedto":"S3-242427","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-241930.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242034","title":"Updates to evaluation on malformed messages use case","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":20,"status":"merged","reservation_date":"2024-05-13 07:24:59","uploaded":"2024-05-13 13:15:34","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242034.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242035","title":"Updates to evaluation on massive number of calls use case","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2024-05-13 07:24:59","uploaded":"2024-05-13 13:15:34","revisionof":"","revisedto":"S3-242420","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242035.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242296","title":"Adding requirements to KI#2 \"Security mechanisms for policy enforcement at the 5G SBA\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":100,"status":"merged","reservation_date":"2024-05-13 12:25:23","uploaded":"2024-05-13 13:33:05","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242296.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242297","title":"Adding solution to KI#1 \"Data exposure for security evaluation and monitoring\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2024-05-13 12:25:23","uploaded":"2024-05-13 13:33:05","revisionof":"","revisedto":"S3-242428","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242297.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242357","title":"TR 33.794 Cleanup","source":"Lenovo, Motorola Mobility, Johns Hopkins University APL","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2024-05-13 14:29:36","uploaded":"2024-05-13 14:51:52","revisionof":"","revisedto":"S3-242430","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242357.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242418","title":"Resolve EN in Use case 1","source":"Lenovo, Motorola Mobility, Johns Hopkins University APL","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":11,"status":"approved","reservation_date":"2024-05-28 13:55:49","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241713","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242418.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242419","title":"Draft TR 33.794","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":241900,"status":"approved","reservation_date":"2024-05-28 13:55:49","uploaded":"2024-05-31 07:31:09","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242419.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242420","title":"Updates to evaluation on massive number of calls use case","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":41,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-242035","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242420.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242421","title":"Addressing ENs in Use Case 5","source":"US National Security Agency, MITRE Corporation, Johns Hopkins University APL","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":51,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241867","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242421.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242422","title":"New use case for security evaluation and monitoring: API security risks","source":"MITRE Corporation, Dell Technologies, Defense Information Systems Agency EM, US National Security Agency, Nokia, Nokia Shanghai Bell, Johns Hopkins University APL, AT&T","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":71,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241851","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242422.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242423","title":"Updates to eZTS Key Issue 2","source":"MITRE Corporation, Johns Hopkins University APL, OTD_US, US National Security Agency, Nokia, Nokia Shanghai Bell,Lenovo, Motorola Mobility,Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":91,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241852","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242423.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242424","title":"Solution to KI#1 Network assisted data collection","source":"Lenovo, Motorola Mobility","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":121,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241715","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242424.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242425","title":"Solution to KI#1_Direct data collection","source":"Lenovo, Motorola Mobility","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":131,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241716","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242425.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242426","title":"New solution for KI#1: New Data Collection NFs","source":"MITRE Corporation, Johns Hopkins University APL, OTD_US, US National Security Agency","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":141,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241850","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242426.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242427","title":"New Solution for Key Issue 1","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":151,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241930","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242427.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242428","title":"Adding solution to KI#1 \"Data exposure for security evaluation and monitoring\"","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":161,"status":"approved","reservation_date":"2024-05-28 13:55:51","uploaded":"2024-05-28 14:01:07","revisionof":"S3-242297","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242428.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242429","title":"New solution for KI#2: Security Policy Enforcement via NRF and SCP\/NF","source":"MITRE Corporation, Johns Hopkins University APL, US National Security Agency","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":181,"status":"noted","reservation_date":"2024-05-28 13:55:52","uploaded":"2024-05-28 14:01:07","revisionof":"S3-241853","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242429.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242430","title":"TR 33.794 Cleanup","source":"Lenovo, Motorola Mobility, Johns Hopkins University APL","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":29,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":201,"status":"approved","reservation_date":"2024-05-28 13:55:52","uploaded":"2024-05-28 14:01:07","revisionof":"S3-242357","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_116_Jeju\/Docs\/S3-242430.zip","group":"S3","meeting":"S3-116","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]