[{"name":"S3-233633","title":"Add key issue for dynamic access control","source":"CMDI","contact":"BEI ZHAO","contact-id":68569,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes to key issue for dynamic access control, which is an important topic for zero trust principle and will be beneficial for 5GC security. Facing the complex network structure and varied attack methods, dynamic access control adjust","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":36330,"status":"withdrawn","reservation_date":"2023-05-08 09:10:22","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233673","title":"SBA Zero Trust Access Control via NRF and SCP\/NF","source":"MITRE Corporation, Lenovo","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"This zero trust access control approach complements the evaluation of the ZTS tenet #6 in clause 5.1.5; Specifically, it addresses how the data from security monitoring can be considered in access decisions.","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":90,"status":"noted","reservation_date":"2023-07-08 02:42:24","uploaded":"2023-08-07 02:53:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233673.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233776","title":"Addition of tenet 4 evaluation","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30,"status":"revised","reservation_date":"2023-07-08 06:21:08","uploaded":"2023-08-07 12:36:15","revisionof":"","revisedto":"S3-234202","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233776.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233777","title":"Completion of tenet 6 evaluation","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2023-07-08 06:21:08","uploaded":"2023-08-07 12:36:15","revisionof":"","revisedto":"S3-234203","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233777.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233778","title":"Completion of tenet 7 evaluation","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2023-07-08 06:21:08","uploaded":"2023-08-07 12:36:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233778.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233783","title":"Add Tenets to Tenet Evaluation Summary","source":"Johns Hopkins University APL, Lenovo","contact":"Cherita Corbett","contact-id":81947,"tdoctype":"pCR","for":"Approval","abstract":"Add Tenets to Tenet Evaluation Summary","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2023-07-08 06:28:38","uploaded":"2023-08-07 06:46:56","revisionof":"","revisedto":"S3-234224","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233783.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234000","title":"Data collection for Security Monitoring","source":"Lenovo, Charter Communications, US National Security Agency, Telefonica, Rakuten Mobile, Center for Internet Security, Cablelabs, Johns Hopkins University APL","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2023-07-08 10:59:33","uploaded":"2023-08-07 12:55:35","revisionof":"","revisedto":"S3-234200","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234000.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234002","title":"Conclusion to KI#1","source":"Lenovo, US National Security Agency, Telefonica, Nokia, Nokia Shanghai Bell, Rakuten Mobile","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2023-07-08 11:02:34","uploaded":"2023-08-07 12:55:35","revisionof":"","revisedto":"S3-234201","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234002.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234005","title":"TR 33.894 Cleanup","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"Editorial Clean-up","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2023-07-08 11:05:03","uploaded":"2023-08-07 12:55:35","revisionof":"","revisedto":"S3-234205","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234005.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234007","title":"Update to Tenet #7","source":"Lenovo, US National Security Agency, Telefonica","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2023-07-08 11:06:35","uploaded":"2023-08-07 12:55:35","revisionof":"","revisedto":"S3-234204","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234007.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234009","title":"Presentation of Specification\/Report to TSG: TR 33.894","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"TS or TR cover","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2023-07-08 11:08:12","uploaded":"2023-08-07 12:55:35","revisionof":"","revisedto":"S3-234348","release":"Rel-18","crspec":33.894,"crspecversion":"","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234009.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234015","title":"Add dynamic access control to 6.X","source":"China Moble","contact":"BEI ZHAO","contact-id":68569,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2023-07-08 11:16:43","uploaded":"2023-08-07 11:25:25","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234015.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234200","title":"Data collection for Security Monitoring","source":"Lenovo, Charter Communications, US National Security Agency, Telefonica, Rakuten Mobile, Center for Internet Security, Cablelabs, Johns Hopkins University APL","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":11,"status":"approved","reservation_date":"2023-08-18 15:08:48","uploaded":"2023-08-18 15:08:48","revisionof":"S3-234000","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234200.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234201","title":"Conclusion to KI#1","source":"Lenovo, US National Security Agency, Telefonica, Nokia, Nokia Shanghai Bell, Rakuten Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":21,"status":"approved","reservation_date":"2023-08-18 15:08:48","uploaded":"2023-08-18 15:08:48","revisionof":"S3-234002","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234201.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234202","title":"Addition of tenet 4 evaluation","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":31,"status":"approved","reservation_date":"2023-08-18 15:14:41","uploaded":"2023-08-18 15:14:41","revisionof":"S3-233776","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234202.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234203","title":"Completion of tenet 6 evaluation","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":41,"status":"approved","reservation_date":"2023-08-18 15:14:41","uploaded":"2023-08-18 15:14:41","revisionof":"S3-233777","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234203.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234204","title":"Update to Tenet #7","source":"Lenovo, US National Security Agency, Telefonica","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":51,"status":"approved","reservation_date":"2023-08-18 15:08:48","uploaded":"2023-08-18 15:08:48","revisionof":"S3-234007","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234204.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234205","title":"TR 33.894 Cleanup","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":101,"status":"approved","reservation_date":"2023-08-18 15:08:48","uploaded":"2023-08-18 15:08:48","revisionof":"S3-234005","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234205.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234224","title":"Add Tenets to Tenet Evaluation Summary","source":"Johns Hopkins University APL, Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":71,"status":"approved","reservation_date":"2023-08-18 16:16:53","uploaded":"2023-08-18 16:16:53","revisionof":"S3-233783","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234224.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234318","title":"Draft TR 33.894","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":431800,"status":"approved","reservation_date":"2023-08-31 16:53:45","uploaded":"2023-08-31 16:53:45","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"0.8.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234318.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234348","title":"Presentation of Specification\/Report to TSG: TR 33.894","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"TS or TR cover","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":111,"status":"approved","reservation_date":"2023-08-18 15:08:48","uploaded":"2023-08-18 15:08:48","revisionof":"S3-234009","revisedto":"","release":"Rel-18","crspec":33.894,"crspecversion":"","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234348.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]