[{"name":"S3-221567","title":"Skeleton for TR 33.892 FS_USIA","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":15670,"status":"revised","reservation_date":"2022-06-20 12:23:40","uploaded":"2022-06-20 13:33:41","revisionof":"","revisedto":"S3-221593","release":"Rel-18","crspec":33.892,"crspecversion":"0.0.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221567.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221568","title":"Scope for TR 33.892","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":15680,"status":"noted","reservation_date":"2022-06-20 12:25:07","uploaded":"2022-06-20 13:33:41","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.0.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221568.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221569","title":"KI on determination of additional information for application identification","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":15690,"status":"revised","reservation_date":"2022-06-20 12:26:42","uploaded":"2022-06-20 13:33:41","revisionof":"","revisedto":"S3-221594","release":"Rel-18","crspec":33.892,"crspecversion":"0.0.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221569.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221593","title":"Skeleton for TR 33.892 FS_USIA","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":15930,"status":"approved","reservation_date":"2022-07-01 12:56:43","uploaded":"2022-07-01 14:59:43","revisionof":"S3-221567","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.0.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221593.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221594","title":"KI on determination of additional information for application identification","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":15940,"status":"approved","reservation_date":"2022-07-01 13:47:17","uploaded":"2022-07-01 14:59:43","revisionof":"S3-221569","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.0.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221594.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221690","title":"Draft TR 33.892","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":16900,"status":"approved","reservation_date":"2022-07-04 09:30:02","uploaded":"2022-07-07 09:11:14","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.1.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221690.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]