[{"name":"S3-243811","title":"Draft TR 33.794","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":38110,"status":"approved","reservation_date":"2024-09-30 09:56:59","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.5.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243829","title":"Draft TR 33.700-32","source":"Interdigital","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":38290,"status":"approved","reservation_date":"2024-09-30 09:56:59","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.4.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243844","title":"KI#1 Conclusion Alignment to SA Plenary Agreements","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":30,"status":"approved","reservation_date":"2024-09-30 10:23:01","uploaded":"2024-10-07 13:52:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243844.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243845","title":"KI#1 Conclusion Update","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":40,"status":"merged","reservation_date":"2024-09-30 10:23:39","uploaded":"2024-10-07 13:52:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243845.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243846","title":"Solution#1 assumptions clarification","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":100,"status":"approved","reservation_date":"2024-09-30 10:24:07","uploaded":"2024-10-07 13:52:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243846.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243847","title":"Solution#9 Update","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":170,"status":"revised","reservation_date":"2024-09-30 10:24:34","uploaded":"2024-10-07 13:52:11","revisionof":"","revisedto":"S3-244332","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243847.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243848","title":"KI#2 Initial Conclusion","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":210,"status":"merged","reservation_date":"2024-09-30 10:25:04","uploaded":"2024-10-07 13:52:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243848.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243859","title":"Sol#5 update to address EN","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":120,"status":"approved","reservation_date":"2024-01-10 02:38:33","uploaded":"2024-10-07 12:38:07","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243859.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243860","title":"Additional conclusions for KI#3","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2024-01-10 02:38:33","uploaded":"2024-10-07 12:38:07","revisionof":"","revisedto":"S3-244407","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243860.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243861","title":"conclusions for KI#1","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":40,"status":"merged","reservation_date":"2024-01-10 02:38:33","uploaded":"2024-10-07 12:38:07","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243861.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243862","title":"conclusions for KI#2","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":50,"status":"merged","reservation_date":"2024-01-10 02:38:33","uploaded":"2024-10-07 12:38:07","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243862.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243872","title":"EN resolution in KI#1 Solution #3 \"New Data Collection NFs\"","source":"OTD_US","contact":"Tyler Hawbaker","contact-id":100081,"tdoctype":"pCR","for":"Approval","abstract":"During last meeting (SA3 #117), an incorrect baseline resulted in an EN in clause 7.3.3.2 being carried over to the new baseline. This EN was resolved in the additional\/modified text in the approved CR (S3-243498). This EN is no longer needed..","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":110,"status":"approved","reservation_date":"2024-01-10 12:14:35","uploaded":"2024-10-02 16:18:01","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243872.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243873","title":"eZTS conclusion for security event data records","source":"Johns Hopkins University APL","contact":"Gino Scribano","contact-id":103072,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2024-01-10 12:58:10","uploaded":"2024-10-04 13:21:51","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243873.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243929","title":"Solution #6 Update","source":"MITRE-FFRDC","contact":"Adrian Buckley","contact-id":106464,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":120,"status":"revised","reservation_date":"2024-04-10 16:11:51","uploaded":"2024-10-06 17:23:19","revisionof":"","revisedto":"S3-244328","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243929.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243930","title":"eZTS Sol 11 Evaluation","source":"MITRE-FFRDC","contact":"Adrian Buckley","contact-id":106464,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":180,"status":"revised","reservation_date":"2024-04-10 16:13:22","uploaded":"2024-10-06 17:23:19","revisionof":"","revisedto":"S3-244333","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243930.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243931","title":"eZTS KI 1 Conclusions","source":"MITRE-FFRDC","contact":"Adrian Buckley","contact-id":106464,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-04-10 16:14:42","uploaded":"2024-10-06 17:23:19","revisionof":"","revisedto":"S3-244327","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243931.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243932","title":"eZTS KI 2 Conclusions","source":"MITRE-FFRDC, OTD_US","contact":"Adrian Buckley","contact-id":106464,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":220,"status":"merged","reservation_date":"2024-04-10 16:15:57","uploaded":"2024-10-06 17:23:19","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243932.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243996","title":"Evaluation on sol#23","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":130,"status":"approved","reservation_date":"2024-06-10 03:53:16","uploaded":"2024-10-07 13:15:21","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.4.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243996.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243997","title":"Evaluation on sol#25","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":140,"status":"approved","reservation_date":"2024-06-10 03:53:16","uploaded":"2024-10-07 13:15:21","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.4.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243997.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243998","title":"Way forward for eZTS study","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2024-06-10 03:53:16","uploaded":"2024-10-07 13:15:21","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243998.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243999","title":"Conclusion updates","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":70,"status":"merged","reservation_date":"2024-06-10 03:53:16","uploaded":"2024-10-07 13:15:21","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-243999.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244000","title":"Solution #5 updates","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":130,"status":"revised","reservation_date":"2024-06-10 03:53:16","uploaded":"2024-10-07 13:15:21","revisionof":"","revisedto":"S3-244329","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244000.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244017","title":"TR 33.700-32 Conclusion for Key Issue#1 and Key Issue#2","source":"InterDigital Communications","contact":"Samir Ferdi","contact-id":72165,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2024-06-10 18:25:59","uploaded":"2024-10-07 11:52:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244017.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244018","title":"TR 33.700-32 Conclusion for Key Issue#3","source":"InterDigital Communications","contact":"Samir Ferdi","contact-id":72165,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2024-06-10 18:26:52","uploaded":"2024-10-07 11:52:11","revisionof":"","revisedto":"S3-244408","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244018.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244033","title":"Concluding KI1 and KI2 in UIA","source":"DOCOMO Communications Lab.","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"pCR","for":"Approval","abstract":"Implementing SA plenary decision","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2024-06-10 22:21:31","uploaded":"2024-10-07 11:39:52","revisionof":"","revisedto":"S3-244409","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244033.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244048","title":"add conclusion to KI1","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":80,"status":"merged","reservation_date":"2024-07-10 03:53:25","uploaded":"2024-10-07 06:44:17","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244048.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244049","title":"add conclusion to KI2","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":90,"status":"merged","reservation_date":"2024-07-10 03:53:25","uploaded":"2024-10-07 06:44:17","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244049.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244072","title":"Conclusion of KI#3 in TR 33.700-32","source":"China Telecom","contact":"JingPeng Bai","contact-id":103306,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":30,"status":"merged","reservation_date":"2024-07-10 05:04:18","uploaded":"2024-10-07 05:10:21","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244072.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244075","title":"Evaluation of solution #10","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":190,"status":"revised","reservation_date":"2024-07-10 05:21:03","uploaded":"2024-10-07 11:44:45","revisionof":"","revisedto":"S3-244334","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244075.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244080","title":"Solution 4 evaluation updates","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":140,"status":"revised","reservation_date":"2024-07-10 06:12:50","uploaded":"2024-10-07 07:24:25","revisionof":"","revisedto":"S3-244330","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244080.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244081","title":"Solution 7 evaluation updates","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":150,"status":"revised","reservation_date":"2024-07-10 06:14:37","uploaded":"2024-10-07 07:26:17","revisionof":"","revisedto":"S3-244331","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244081.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244090","title":"Update and evaluation on solution 24","source":"Huawei, HiSilicon","contact":"Hongyi Pu","contact-id":97938,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":150,"status":"approved","reservation_date":"2024-07-10 07:07:47","uploaded":"2024-10-07 07:51:33","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244090.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244105","title":"33.700-32: Evaluation of Solution 26 and Conclusion on KI#1","source":"Xiaomi EV Technology","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2024-07-10 07:32:51","uploaded":"2024-10-07 12:19:12","revisionof":"","revisedto":"S3-244410","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244105.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244106","title":"33.700-32: Evaluation of Solution 27 and Conclusion on KI#2","source":"Xiaomi EV Technology","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2024-07-10 07:32:51","uploaded":"2024-10-07 12:19:12","revisionof":"","revisedto":"S3-244411","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244106.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244173","title":"Discussion and way forward for zero trust study","source":"China Mobile Com. Corporation","contact":"hua song","contact-id":91953,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":20,"status":"noted","reservation_date":"2024-07-10 09:14:19","uploaded":"2024-10-07 09:18:05","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244173.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244190","title":"Data collection for security monitoring","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2024-07-10 09:43:45","uploaded":"2024-10-07 13:19:54","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.501","crspecversion":"19.0.0","workitem":[{"winame":"DUMMY"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244190.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244191","title":"Updated conclusion for Key Issue #1 \"Data exposure for security evaluation and monitoring\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":90,"status":"merged","reservation_date":"2024-07-10 09:43:45","uploaded":"2024-10-07 13:19:54","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244191.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244192","title":"Update Solution #12 \"Policy enforcement using NRF configuration and short access token lifetime\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":200,"status":"approved","reservation_date":"2024-07-10 09:43:45","uploaded":"2024-10-07 13:19:54","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244192.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244193","title":"Conclusion for Key Issue #2 \"Security mechanisms for policy enforcement at the 5G SBA\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":230,"status":"revised","reservation_date":"2024-07-10 09:43:45","uploaded":"2024-10-07 13:19:54","revisionof":"","revisedto":"S3-244335","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244193.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244251","title":"New WID on enablers for Zero Trust Security","source":"Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":160,"status":"noted","reservation_date":"2024-07-10 11:52:21","uploaded":"2024-10-07 13:52:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244251.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244252","title":"Key Issue and Solution Mapping","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":240,"status":"approved","reservation_date":"2024-07-10 11:57:33","uploaded":"2024-10-07 13:52:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244252.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244327","title":"eZTS KI 1 Conclusions","source":"MITRE-FFRDC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":51,"status":"approved","reservation_date":"2024-10-22 13:42:34","uploaded":"2024-10-22 13:51:08","revisionof":"S3-243931","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244327.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244328","title":"Solution #6 Update","source":"MITRE-FFRDC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":121,"status":"approved","reservation_date":"2024-10-22 13:42:34","uploaded":"2024-10-22 13:51:08","revisionof":"S3-243929","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244328.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244329","title":"Solution #5 updates","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":131,"status":"approved","reservation_date":"2024-10-22 13:42:34","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244000","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244329.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244330","title":"Solution 4 evaluation updates","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":141,"status":"approved","reservation_date":"2024-10-22 13:42:34","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244080","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244330.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244331","title":"Solution 7 evaluation updates","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":151,"status":"approved","reservation_date":"2024-10-22 13:42:34","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244081","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244331.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244332","title":"Solution#9 Update","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":171,"status":"approved","reservation_date":"2024-10-22 13:42:34","uploaded":"2024-10-22 13:51:08","revisionof":"S3-243847","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244332.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244333","title":"eZTS Sol 11 Evaluation","source":"MITRE-FFRDC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":181,"status":"approved","reservation_date":"2024-10-22 13:42:34","uploaded":"2024-10-22 13:51:08","revisionof":"S3-243930","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244333.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244334","title":"Evaluation of solution #10","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":191,"status":"approved","reservation_date":"2024-10-22 13:42:35","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244075","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244334.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244335","title":"Conclusion for Key Issue #2 \"Security mechanisms for policy enforcement at the 5G SBA\"","source":"Ericsson, Lenovo, MITRE-FFRDC, OTD_US","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":231,"status":"approved","reservation_date":"2024-10-22 13:42:35","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244193","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.4.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244335.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244407","title":"Additional conclusions for KI#3","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":11,"status":"noted","reservation_date":"2024-10-22 13:42:42","uploaded":"2024-10-22 13:51:08","revisionof":"S3-243860","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244407.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244408","title":"TR 33.700-32 Conclusion for Key Issue#3","source":"InterDigital Communications","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":21,"status":"noted","reservation_date":"2024-10-22 13:42:42","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244018","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244408.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244409","title":"Concluding KI1 and KI2 in UIA","source":"DOCOMO Communications Lab.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":71,"status":"approved","reservation_date":"2024-10-22 13:42:42","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244033","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244409.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244410","title":"33.700-32: Evaluation of Solution 26 and Conclusion on KI#1","source":"Xiaomi EV Technology","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":101,"status":"approved","reservation_date":"2024-10-22 13:42:42","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244105","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244410.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-244411","title":"33.700-32: Evaluation of Solution 27 and Conclusion on KI#2","source":"Xiaomi EV Technology","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.1","ainame":"Study on security aspects of Usage of User Identities","tdoc_agenda_sort_order":111,"status":"approved","reservation_date":"2024-10-22 13:42:42","uploaded":"2024-10-22 13:51:08","revisionof":"S3-244106","revisedto":"","release":"Rel-19","crspec":"33.700-32","crspecversion":"0.3.0","workitem":[{"winame":"FS_UIA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_118_Hyderabad\/Docs\/S3-244411.zip","group":"S3","meeting":"S3-118","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]