[{"name":"S3-221811","title":"A solution for KI#1 - Provide additional authentication information to enhance URSP policy enforcement","source":"Nokia, Nokia Shanghai Bell, Lenovo","contact":"Bo Holm Bjerrum","contact-id":80370,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":18110,"status":"approved","reservation_date":"2022-08-15 11:12:33","uploaded":"2022-08-15 11:17:19","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.1.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e\/Docs\/S3-221811.zip","group":"S3","meeting":"S3-108-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221901","title":"Solution on enhancing the URSP rule with certificate fingerprint","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"This solution is targeting KI#1.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":19010,"status":"revised","reservation_date":"2022-08-15 11:32:58","uploaded":"2022-08-15 13:18:05","revisionof":"","revisedto":"S3-222425","release":"Rel-18","crspec":33.892,"crspecversion":"0.1.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e\/Docs\/S3-221901.zip","group":"S3","meeting":"S3-108-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221902","title":"Scope for TR 33.892","source":"Lenovo, Nokia, Nokia Shanghai Bell","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"The document introduces the scope for the new TR 33.892.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":19020,"status":"approved","reservation_date":"2022-08-15 11:34:27","uploaded":"2022-08-15 13:18:05","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.1.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e\/Docs\/S3-221902.zip","group":"S3","meeting":"S3-108-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221903","title":"Update of KI#1","source":"Lenovo, Nokia, Nokia Shanghai Bell","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"This document is updating KI#1.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":19030,"status":"noted","reservation_date":"2022-08-15 11:35:49","uploaded":"2022-08-15 13:18:05","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.1.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e\/Docs\/S3-221903.zip","group":"S3","meeting":"S3-108-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221905","title":"Assumption on actors and attacker model","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"This is updating the assumptions of the study.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":19050,"status":"noted","reservation_date":"2022-08-15 11:37:06","uploaded":"2022-08-15 13:18:05","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.1.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e\/Docs\/S3-221905.zip","group":"S3","meeting":"S3-108-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222424","title":"Draft TR 33.892 v0.2.0","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":24240,"status":"available","reservation_date":"2022-08-29 13:15:09","uploaded":"2022-09-02 08:11:22","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.2.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e\/Docs\/S3-222424.zip","group":"S3","meeting":"S3-108-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222425","title":"Solution on enhancing the URSP rule with certificate fingerprint","source":"Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"Approval","abstract":"This solution is targeting KI#1.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.18","ainame":"Study to enable URSP rules to securely identify Applications","tdoc_agenda_sort_order":24250,"status":"approved","reservation_date":"2022-08-29 13:24:43","uploaded":"2022-08-30 09:11:21","revisionof":"S3-221901","revisedto":"","release":"Rel-18","crspec":33.892,"crspecversion":"0.1.0","workitem":[{"winame":"FS_USIA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e\/Docs\/S3-222425.zip","group":"S3","meeting":"S3-108-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]