[{"name":"S3-221439","title":"new key issue Exposure of Network Capabilities","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":40,"status":"noted","reservation_date":"2022-06-20 06:53:50","uploaded":"2022-06-20 09:07:41","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221439.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221448","title":"Key Issue on secure storage and limited access to NF credentials","source":"Intel","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":90,"status":"noted","reservation_date":"2022-06-20 07:16:20","uploaded":"2022-06-20 07:27:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221448.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221449","title":"Key Issue on Secure Trust Evaluation","source":"Intel","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":50,"status":"noted","reservation_date":"2022-06-20 07:17:31","uploaded":"2022-06-20 07:27:39","revisionof":"","revisedto":"","release":"","crspec":33.894,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221449.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221499","title":"Key issue on misuse of OAuth 2.0 access token by anomalous Network functions","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2022-06-20 10:24:06","uploaded":"2022-06-20 13:01:26","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221499.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221500","title":"Key issue on determining and maintaining trust indication in 5G Core","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":60,"status":"noted","reservation_date":"2022-06-20 10:24:06","uploaded":"2022-06-20 13:01:26","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221500.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221520","title":"Proposal for TR 33.894 Skeleton","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"draft TR","for":"Approval","abstract":"This contribution presents the skeleton for FS_ZTS_SID","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":10,"status":"approved","reservation_date":"2022-06-20 11:42:58","uploaded":"2022-06-20 13:50:30","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221520.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221521","title":"Key Issue#1 on Need for continuous Trust evaluation","source":"Lenovo, Nokia, Nokia Shanghai Bell, Rakuten Mobile Inc., Interdigital, US NSA, Motorola Solutions, Johns Hopkins University APL, Intel, Center for Internet Security","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":70,"status":"noted","reservation_date":"2022-06-20 11:47:39","uploaded":"2022-06-20 13:50:30","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.1","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221521.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221522","title":"Security Assumptions","source":"Lenovo, Rakuten Mobile Inc., Interdigital, US NSA, Motorola Solutions, Johns Hopkins University APL, Intel, Center for Internet Security","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30,"status":"noted","reservation_date":"2022-06-20 11:54:03","uploaded":"2022-06-20 13:50:30","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.1","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221522.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221523","title":"Update of Scope","source":"Lenovo, Rakuten Mobile Inc, Interdigital, US NSA, Motorola Solutions, Johns Hopkins University APL, Intel, Center for Internet Security","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2022-06-20 11:56:20","uploaded":"2022-06-20 13:50:30","revisionof":"","revisedto":"S3-221588","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.1","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221523.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221588","title":"Update of Scope","source":"Lenovo, Rakuten Mobile Inc, Interdigital, US NSA, Motorola Solutions, Johns Hopkins University APL, Intel, Center for Internet Security","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":15880,"status":"approved","reservation_date":"2022-07-01 12:36:29","uploaded":"2022-07-01 12:43:43","revisionof":"S3-221523","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.0.1","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221588.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-221691","title":"Draft TR 33.894 for ZTS","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":24,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":16910,"status":"approved","reservation_date":"2022-07-04 09:59:27","uploaded":"2022-07-07 08:16:33","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.1.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_107e-AdHoc\/Docs\/S3-221691.zip","group":"S3","meeting":"S3-107-e-Ad Hoc","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]