[{"name":"S3-260401","title":"Resolution for EN for RFC 9700","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":10,"status":"merged","reservation_date":"2026-02-02 07:42:01","uploaded":"2026-02-02 12:30:17","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260401.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260402","title":"Resolution for EN for RFC 8725","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2026-02-02 07:42:01","uploaded":"2026-02-02 12:30:17","revisionof":"","revisedto":"S3-260842","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260402.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260403","title":"Conclusion for BSP4SBA","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":180,"status":"noted","reservation_date":"2026-02-02 07:42:01","uploaded":"2026-02-02 12:30:17","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260403.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260404","title":"Offline CC Minutes of Meeting","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":190,"status":"noted","reservation_date":"2026-02-02 07:42:01","uploaded":"2026-02-02 12:30:17","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260404.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260669","title":"Pseudo-CR on Resolving editor's notes for RFC 8725 best practices","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":50,"status":"merged","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:23:40","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260669.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260670","title":"Pseudo-CR on Resolving editor's notes for RFC 9700 best practices","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":30,"status":"revised","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:25:02","revisionof":"","revisedto":"S3-260839","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260670.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260671","title":"Pseudo-CR on Best security practice on using UTF-8","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":70,"status":"approved","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:26:00","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260671.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260672","title":"Pseudo-CR on Best security practice on using end-to-end TLS between the client and the resource server","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:27:02","revisionof":"","revisedto":"S3-260845","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260672.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260673","title":"Pseudo-CR on Best security practice on transmission of authorization responses","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":110,"status":"noted","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:28:18","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260673.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260674","title":"Pseudo-CR on Best security practice on configuration of client_id","source":"Ericsson,Nokia","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":120,"status":"approved","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:29:31","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260674.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260675","title":"Pseudo-CR on Best security practice on sender-constrained access tokens","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":130,"status":"revised","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:30:48","revisionof":"","revisedto":"S3-260847","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260675.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260676","title":"Pseudo-CR on Best security practice on performing algorithm verification","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":80,"status":"approved","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:31:13","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260676.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260677","title":"Pseudo-CR on Best security practice on validating all cryptographic operations","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2026-02-02 11:36:22","uploaded":"2026-02-02 12:31:13","revisionof":"","revisedto":"S3-261002","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260677.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260739","title":"Replay prevention","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2026-02-02 14:13:38","uploaded":"2026-02-02 14:38:25","revisionof":"","revisedto":"S3-260841","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260739.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260741","title":"Additional suggestion to the resolution for EN for RFC 8725","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2026-02-02 14:15:27","uploaded":"2026-02-02 14:38:25","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260741.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260742","title":"Editorial updates","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":140,"status":"approved","reservation_date":"2026-02-02 14:18:32","uploaded":"2026-02-02 14:38:25","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260742.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260743","title":"References","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":170,"status":"approved","reservation_date":"2026-02-02 14:22:04","uploaded":"2026-02-02 14:38:25","revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260743.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260744","title":"Scope","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":150,"status":"revised","reservation_date":"2026-02-02 14:24:37","uploaded":"2026-02-02 14:38:25","revisionof":"","revisedto":"S3-260848","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260744.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260746","title":"Overview","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2026-02-02 14:26:33","uploaded":"2026-02-02 14:38:25","revisionof":"","revisedto":"S3-260849","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"GROUPE"},{"winame":" FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260746.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260839","title":"Pseudo-CR on Resolving editor's notes for RFC 9700 best practices","source":"Ericsson,Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":31,"status":"approved","reservation_date":"2026-02-18 16:10:47","uploaded":"2026-02-18 16:11:09","revisionof":"S3-260670","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260839.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260840","title":"Draft TR 33.755","source":"Huawei","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":84000,"status":"approved","reservation_date":"2026-02-18 16:10:47","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.3.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260841","title":"Replay prevention","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":21,"status":"approved","reservation_date":"2026-02-18 16:10:51","uploaded":"2026-02-18 16:11:09","revisionof":"S3-260739","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260841.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260842","title":"Resolution for EN for RFC 8725","source":"Huawei, HiSilicon,Ericsson,Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":41,"status":"approved","reservation_date":"2026-02-18 16:10:51","uploaded":"2026-02-18 16:11:09","revisionof":"S3-260402","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260842.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260845","title":"Pseudo-CR on Best security practice on using end-to-end TLS between the client and the resource server","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":101,"status":"approved","reservation_date":"2026-02-18 16:10:51","uploaded":"2026-02-18 16:11:09","revisionof":"S3-260672","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260845.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260846","title":"Pseudo-CR on Best security practice on transmission of authorization responses","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":111,"status":"withdrawn","reservation_date":"2026-02-18 16:10:52","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260847","title":"Pseudo-CR on Best security practice on sender-constrained access tokens","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":131,"status":"noted","reservation_date":"2026-02-18 16:10:52","uploaded":"2026-02-18 16:11:09","revisionof":"S3-260675","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260847.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260848","title":"Scope","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":151,"status":"approved","reservation_date":"2026-02-18 16:10:52","uploaded":"2026-02-18 16:11:09","revisionof":"S3-260744","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260848.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-260849","title":"Overview","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":161,"status":"approved","reservation_date":"2026-02-18 16:10:52","uploaded":"2026-02-18 16:11:09","revisionof":"S3-260746","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"GROUPE"},{"winame":" FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-260849.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-261002","title":"Pseudo-CR on Best security practice on validating all cryptographic operations","source":"Ericsson,Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":25,"ainumber":"5.2.12","ainame":"New Study on best security practices for SBA","tdoc_agenda_sort_order":91,"status":"approved","reservation_date":"2026-02-18 16:13:53","uploaded":"2026-02-18 16:21:12","revisionof":"S3-260677","revisedto":"","release":"Rel-20","crspec":"33.755","crspecversion":"0.2.0","workitem":[{"winame":"FS_BSP4SBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG3_Security\/TSGS3_126_Goa\/Docs\/S3-261002.zip","group":"S3","meeting":"S3-126","year":2026,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]