[{"name":"S3-171007","title":"Middlebox security protocol","source":"ETSI TC CYBER","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"6.9","ainame":"TC-CYBER","tdoc_agenda_sort_order":10070,"status":"replied to","reservation_date":"2017-04-28 13:52:42","uploaded":"2017-05-04 12:54:26","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"S3-171449","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_87_Ljubljana\/Docs\/S3-171007.zip","group":"S3","meeting":"S3-87","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171015","title":"Liaison statement to ETSI 3GPP SA3","source":"ETSI TC CYBER QSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"6.9","ainame":"TC-CYBER","tdoc_agenda_sort_order":13310,"status":"noted","reservation_date":"2017-04-28 13:52:43","uploaded":"2017-05-04 12:54:26","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_87_Ljubljana\/Docs\/S3-171015.zip","group":"S3","meeting":"S3-87","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171062","title":"Reply LS on Middlebox Security Protocol","source":"S3i170166","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"6.9","ainame":"TC-CYBER","tdoc_agenda_sort_order":10150,"status":"noted","reservation_date":"2017-05-02 09:03:26","uploaded":"2017-05-04 12:54:26","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_87_Ljubljana\/Docs\/S3-171062.zip","group":"S3","meeting":"S3-87","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171317","title":"Background to proposed SA3 handling of LS from TC CYBER","source":"Home Office, BT, Telefonica","contact":"Mark Canterbury","contact-id":51446,"tdoctype":"discussion","for":"Discussion","abstract":"TC CYBER has written an LS to SA3 regarding the Middlebox Security Protocol. \nThis contribution provides a summary and background, and a proposed set of actions resulting from the LS","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"6.9","ainame":"TC-CYBER","tdoc_agenda_sort_order":13160,"status":"noted","reservation_date":"2017-05-09 15:09:10","uploaded":"2017-05-09 15:25:00","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_87_Ljubljana\/Docs\/S3-171317.zip","group":"S3","meeting":"S3-87","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171342","title":"Draft reply to LS from TC CYBER on middlebox security","source":"Home Office, BT, Telefonica","contact":"Mark Canterbury","contact-id":51446,"tdoctype":"LS out","for":"Approval","abstract":"Draft reply to LS from TC CYBER on middlebox security","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"6.9","ainame":"TC-CYBER","tdoc_agenda_sort_order":10620,"status":"revised","reservation_date":"2017-05-09 15:14:57","uploaded":"2017-05-09 15:25:00","revisionof":"","revisedto":"S3-171449","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-171007","lsto":"ETSI TC CYBER","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_87_Ljubljana\/Docs\/S3-171342.zip","group":"S3","meeting":"S3-87","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171449","title":"Reply to LS from TC CYBER on middlebox security","source":"Home Office","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"6.9","ainame":"TC-CYBER","tdoc_agenda_sort_order":10621,"status":"approved","reservation_date":"2017-05-19 10:05:24","uploaded":"2017-05-19 10:05:24","revisionof":"S3-171342","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-171007","lsto":"ETSI TC CYBER","Cc":"SA3-LI","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_87_Ljubljana\/Docs\/S3-171449.zip","group":"S3","meeting":"S3-87","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]