[{"name":"S3-222564","title":"Assumption on actors and attacker model","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":25640,"status":"approved","reservation_date":"2022-09-30 14:22:49","uploaded":"2022-10-03 12:16:06","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222564.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222565","title":"Update of KI#1","source":"Lenovo, Nokia, Nokia Shanghai Bell","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":25650,"status":"revised","reservation_date":"2022-09-30 14:24:20","uploaded":"2022-10-03 12:16:06","revisionof":"","revisedto":"S3-222964","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222565.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222566","title":"Evaluation of solution #2","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":25660,"status":"revised","reservation_date":"2022-09-30 14:25:42","uploaded":"2022-10-03 12:16:06","revisionof":"","revisedto":"S3-222968","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222566.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222750","title":"Proposal for an evaluation to solution #2","source":"Nokia, Nokia Shanghai Bell","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":27500,"status":"revised","reservation_date":"2022-10-03 09:03:24","uploaded":"2022-10-03 10:00:20","revisionof":"","revisedto":"S3-223073","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222750.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222751","title":"Proposal for a KI on injection of authentication data","source":"Nokia, Nokia Shanghai Bell","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":27510,"status":"noted","reservation_date":"2022-10-03 09:03:24","uploaded":"2022-10-03 10:00:20","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222751.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222752","title":"Discussion paper on a way forward for LS on protection of the URSP rules from HPLM","source":"Nokia, Nokia Shanghai Bell","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":27520,"status":"noted","reservation_date":"2022-10-03 09:03:24","uploaded":"2022-10-03 10:00:20","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222752.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222964","title":"Update of KI#1","source":"Lenovo, Nokia, Nokia Shanghai Bell","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":29640,"status":"approved","reservation_date":"2022-10-14 15:18:15","uploaded":"2022-10-19 10:31:10","revisionof":"S3-222565","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222964.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222968","title":"Evaluation of solution #2","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":29680,"status":"approved","reservation_date":"2022-10-14 15:19:06","uploaded":"2022-10-19 10:31:10","revisionof":"S3-222566","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222968.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223073","title":"Proposal for an evaluation to solution #1","source":"Nokia, Nokia Shanghai Bell","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":30730,"status":"approved","reservation_date":"2022-10-16 19:55:07","uploaded":"2022-10-16 19:57:43","revisionof":"S3-222750","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223073.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223122","title":"Draft TR 33.892 V0.3.0","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":31220,"status":"approved","reservation_date":"2022-10-17 09:01:59","uploaded":"2022-10-21 14:05:53","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.892","crspecversion":"0.3.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223122.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]