[{"name":"S3-242745","title":"Cleanup of TR","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":240,"status":"approved","reservation_date":"2024-12-07 13:41:14","uploaded":"2024-08-12 15:05:26","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242745.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242746","title":"Initial Conclusion to KI#1","source":"Lenovo, US National Security Agency, MITRE-FFRDC","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":180,"status":"revised","reservation_date":"2024-12-07 13:41:46","uploaded":"2024-08-12 15:05:26","revisionof":"","revisedto":"S3-243505","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242746.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242747","title":"Solution to KI#2","source":"Lenovo, US National Security Agency","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2024-12-07 13:42:55","uploaded":"2024-08-12 15:05:26","revisionof":"","revisedto":"S3-243611","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242747.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242748","title":"Updates to Solution #2","source":"Lenovo, Johns Hopkins University APL, US National Security Agency","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-12-07 13:43:42","uploaded":"2024-08-12 15:05:26","revisionof":"","revisedto":"S3-243496","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242748.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242749","title":"Updates to Solution#1","source":"Lenovo, Johns Hopkins University APL, US National Security Agency","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":60,"status":"revised","reservation_date":"2024-12-07 13:44:23","uploaded":"2024-08-12 15:05:26","revisionof":"","revisedto":"S3-243497","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242749.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242815","title":"New Use case proposal for data exposure related to attacks on network slices","source":"IRT, Nokia, Nokia Shanghai Bell","contact":"Tanissia Djemai","contact-id":99501,"tdoctype":"pCR","for":"Approval","abstract":"This use case proposal is to study the possible data which would need to be exposed towards operator\u2019s security monitoring and evaluation systems to detect possible attacks on network slices.","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2024-09-08 10:24:31","uploaded":"2024-08-09 16:08:07","revisionof":"","revisedto":"S3-243493","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242815.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242833","title":"Solution for enhancement of SBA access control decision mechanisms","source":"Nokia","contact":"German Peinado","contact-id":93903,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":210,"status":"revised","reservation_date":"2024-09-08 18:23:56","uploaded":"2024-08-12 09:29:01","revisionof":"","revisedto":"S3-243613","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242833.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242838","title":"KI#1, Solution #3 Updates: Data Collection","source":"OTD_US, MITRE","contact":"Tyler Hawbaker","contact-id":100081,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides updates to KI#1 Solution #3. Multiple editor's notes are resolved, a method to provision data collection policy is added, procedures are cleaned up.","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2024-10-08 15:03:58","uploaded":"2024-08-11 22:05:06","revisionof":"","revisedto":"S3-243365","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242838.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242867","title":"New solution for KI#2: Dynamic Security Policy Enforcement Framework","source":"MITRE-FFRDC, Defense Information Systems Agency EM","contact":"David Gabay","contact-id":107201,"tdoctype":"pCR","for":"Approval","abstract":"This solution proposes a standard dynamic security policy enforcement framework","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":220,"status":"revised","reservation_date":"2024-12-08 01:54:29","uploaded":"2024-08-12 12:50:07","revisionof":"","revisedto":"S3-243614","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242867.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242868","title":"Conclusions for Data Collection","source":"MITRE-FFRDC, US National Security Agency","contact":"David Gabay","contact-id":107201,"tdoctype":"pCR","for":"Approval","abstract":"This conclusions document proposes a set of data for collection.","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":190,"status":"noted","reservation_date":"2024-12-08 02:03:04","uploaded":"2024-08-12 12:50:07","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242868.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242869","title":"New solution for KI #1 Data Collection using DCCF","source":"MITRE-FFRDC","contact":"David Gabay","contact-id":107201,"tdoctype":"pCR","for":"Approval","abstract":"This solution uses DCCF to collect security data from the SBA.","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":150,"status":"revised","reservation_date":"2024-12-08 02:08:32","uploaded":"2024-08-12 12:50:07","revisionof":"","revisedto":"S3-243502","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242869.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242899","title":"Addressing EN in Use Case 5","source":"U.S. National Security Agency, Johns Hopkins University APL, OTD_US, MITRE-FFRDC","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"The EN within TR 33.794, clause 5.1.5.2 states \u201cEditor\u2019s Note: It is FFS whether a NF can determine that something abnormal is happening using only its own collected information.\u201d The NF generating the data points is not meant to individually analyze thes","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":30,"status":"revised","reservation_date":"2024-12-08 02:31:17","uploaded":"2024-08-12 02:36:29","revisionof":"","revisedto":"S3-243495","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242899.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243001","title":"New solution for data collection related to API security risks","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2024-12-08 07:40:25","uploaded":"2024-08-12 11:27:01","revisionof":"","revisedto":"S3-243503","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243001.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243007","title":"EN removal for solution #4","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2024-12-08 07:50:49","uploaded":"2024-08-12 11:31:14","revisionof":"","revisedto":"S3-243499","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243007.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243008","title":"Evaluation for solution #4","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2024-12-08 07:52:35","uploaded":"2024-08-12 11:31:44","revisionof":"","revisedto":"S3-243500","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243008.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243084","title":"Evaluation for solution 3","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":90,"status":"merged","reservation_date":"2024-12-08 08:53:00","uploaded":"2024-08-12 12:51:41","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243084.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243085","title":"Evaluation for solution 5","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":140,"status":"merged","reservation_date":"2024-12-08 08:53:00","uploaded":"2024-08-12 12:51:41","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243085.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243087","title":"Evaluation to Use case 4","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2024-12-08 08:53:00","uploaded":"2024-08-12 12:51:41","revisionof":"","revisedto":"S3-243494","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243087.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243088","title":"Evaluation to Use case 5","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":40,"status":"merged","reservation_date":"2024-12-08 08:53:00","uploaded":"2024-08-12 12:51:41","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243088.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243308","title":"Update and evaluation for Solution #5 \"Security log events collection for evaluation and monitoring\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":130,"status":"revised","reservation_date":"2024-12-08 11:55:15","uploaded":"2024-08-12 13:55:39","revisionof":"","revisedto":"S3-243501","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243308.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243309","title":"New Solution to Key Issue #1: Using security log events, counters and protocol signaling monitoring","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":170,"status":"revised","reservation_date":"2024-12-08 11:55:15","uploaded":"2024-08-12 13:55:39","revisionof":"","revisedto":"S3-243504","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243309.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243310","title":"New Solution to Key Issue #2: Policy enforcement using NRF configuration and short access token lifetime","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":230,"status":"revised","reservation_date":"2024-12-08 11:55:15","uploaded":"2024-08-12 13:55:39","revisionof":"","revisedto":"S3-243615","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243310.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243311","title":"Security Log Management specifications in O-RAN Alliance","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"discussion","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":120,"status":"noted","reservation_date":"2024-12-08 11:55:15","uploaded":"2024-08-12 13:55:39","revisionof":"","revisedto":"","release":"Rel-19","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243311.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243365","title":"KI#1, Solution #3 Updates: Data Collection","source":"OTD_US, MITRE","contact":"Tyler Hawbaker","contact-id":100081,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides updates to KI#1 Solution #3. Multiple editor's notes are resolved, a method to provision data collection policy is added, procedures are cleaned up.","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":80,"status":"revised","reservation_date":"2024-12-08 12:53:47","uploaded":"2024-08-12 12:56:27","revisionof":"S3-242838","revisedto":"S3-243498","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/s3-243365.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243493","title":"New Use case proposal for data exposure related to attacks on network slices","source":"IRT, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":11,"status":"approved","reservation_date":"2024-08-27 15:27:36","uploaded":"2024-08-27 15:31:06","revisionof":"S3-242815","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243493.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243494","title":"Evaluation to Use case 4","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":21,"status":"approved","reservation_date":"2024-08-27 15:27:36","uploaded":"2024-08-27 15:31:06","revisionof":"S3-243087","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243494.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243495","title":"Addressing EN in Use Case 5","source":"U.S. National Security Agency, Johns Hopkins University APL, OTD_US, MITRE-FFRDC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":31,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-242899","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243495.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243496","title":"Updates to Solution #2","source":"Lenovo, Johns Hopkins University APL, US National Security Agency","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":51,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-242748","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243496.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243497","title":"Updates to Solution#1","source":"Lenovo, Johns Hopkins University APL, US National Security Agency","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":61,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-242749","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243497.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243498","title":"KI#1, Solution #3 Updates: Data Collection","source":"OTD_US, MITRE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":81,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-243365","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243498.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243499","title":"EN removal for solution #4","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":101,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-243007","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243499.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243500","title":"Evaluation for solution #4","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":111,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-243008","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243500.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243501","title":"Update and evaluation for Solution #5 \"Security log events collection for evaluation and monitoring\"","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":131,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-243308","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243501.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243502","title":"New solution for KI #1 Data Collection using DCCF","source":"MITRE-FFRDC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":151,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-242869","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243502.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243503","title":"New solution for data collection related to API security risks","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":161,"status":"approved","reservation_date":"2024-08-27 15:27:37","uploaded":"2024-08-27 15:31:06","revisionof":"S3-243001","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243503.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243504","title":"New Solution to Key Issue #1: Using security log events, counters and protocol signaling monitoring","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":171,"status":"approved","reservation_date":"2024-08-27 15:27:38","uploaded":"2024-08-27 15:31:06","revisionof":"S3-243309","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243504.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243505","title":"Initial Conclusion to KI#1","source":"Lenovo, US National Security Agency, MITRE-FFRDC, Nokia, Nokia Shanghai Bell, Ericsson, NTIA, Deutsche Telekom, T-Mobile US, BT, Charter Communications, Cablelabs, Peraton Labs, Intel, IRT Saint Exupery, Johns Hopkins University APL, Samsung, CISA ECD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":181,"status":"approved","reservation_date":"2024-08-27 15:27:38","uploaded":"2024-08-27 15:31:06","revisionof":"S3-242746","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243505.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243611","title":"Solution to KI#2","source":"Lenovo, US National Security Agency","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":201,"status":"approved","reservation_date":"2024-08-27 15:27:58","uploaded":"2024-08-27 15:31:07","revisionof":"S3-242747","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243611.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243612","title":"Draft TR 33.794","source":"Motorola Mobility","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":361200,"status":"approved","reservation_date":"2024-08-27 15:27:58","uploaded":"2024-08-30 08:41:07","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243612.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243613","title":"Solution for enhancement of SBA access control decision mechanisms","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":211,"status":"approved","reservation_date":"2024-08-27 15:27:59","uploaded":"2024-08-27 15:31:07","revisionof":"S3-242833","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243613.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243614","title":"New solution for KI#2: Dynamic Security Policy Enforcement Framework","source":"MITRE-FFRDC, Defense Information Systems Agency EM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":221,"status":"approved","reservation_date":"2024-08-27 15:27:59","uploaded":"2024-08-27 15:31:07","revisionof":"S3-242867","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243614.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243615","title":"New Solution to Key Issue #2: Policy enforcement using NRF configuration and short access token lifetime","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":32,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":231,"status":"approved","reservation_date":"2024-08-27 15:27:59","uploaded":"2024-08-27 15:31:07","revisionof":"S3-243310","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.3.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243615.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]