[{"name":"S3-152217","title":"Reply LS to SA3 for Clarification on SA6 Architecture","source":"S6-151313","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22170,"status":"noted","reservation_date":"2015-10-23 14:15:54","uploaded":"2015-10-23 14:59:23","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152217.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152218","title":"LS to SA3 on potential need for CSC-6 Interface","source":"S6-151321","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22180,"status":"replied to","reservation_date":"2015-10-23 14:15:54","uploaded":"2015-10-23 14:59:23","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-152600","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152218.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152221","title":"pCR to add a KMS access token","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the addition of a KMS access token for key management authorization and key distribution.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22640,"status":"revised","reservation_date":"2015-10-26 17:20:28","uploaded":"2015-11-02 04:23:48","revisionof":"","revisedto":"S3-152515","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/s3-152221.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152222","title":"Resolution of editor\u2019s note in section 7.2 of 33.879","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Approval","abstract":"This contribution addresses the Editor\u2019s Note in Section 7.2 by providing a comparative analysis of Solution #2 \u201cMCPTT User Authentication and Registration based on OpenID Connect\u201d against other SSO solutions identified in TR 33.895, TS 33.924, and TS 33.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23160,"status":"revised","reservation_date":"2015-10-26 17:23:42","uploaded":"2015-11-02 04:23:48","revisionof":"","revisedto":"S3-152519","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/s3-152222.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152223","title":"Resolution of editor\u2019s note in section 6.19.3 of 33.879","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Approval","abstract":"This pCR addresses the editor\u2019s note in section 6.19.3 of 33.879.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22240,"status":"revised","reservation_date":"2015-10-26 17:26:47","uploaded":"2015-11-02 04:23:48","revisionof":"","revisedto":"S3-152509","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/s3-152223.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152224","title":"Specification of MCPTT User Authentication in 33.179","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes adding Solution #2: \u201cMCPTT User Authentication and Registration based on OpenID Connect\u201d to the TS as the MCPTT User Authentication solution.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24080,"status":"noted","reservation_date":"2015-10-26 17:30:52","uploaded":"2015-11-02 04:23:49","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152224.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152225","title":"pCR to add requirements to 33.179","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR adds derived requirements from TR 33.879 to the Technical Specification 33.179 \u201cSecurity of Mission Critical Push-To-Talk (MCPTT)","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24010,"status":"revised","reservation_date":"2015-10-26 17:34:12","uploaded":"2015-11-02 04:23:49","revisionof":"","revisedto":"S3-152524","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152225.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152226","title":"Resolution of editor\u2019s note in section 7.2.1.1 of 33.879","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR addresses the editor\u2019s note in section 7.2.1.1 of TR 33.879 \u201cEditor\u2019s note:  It is FFS whether an authorization code interception attack is applicable to MCPTT.\u201d","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22260,"status":"approved","reservation_date":"2015-10-27 21:48:09","uploaded":"2015-11-02 04:23:49","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152226.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152230","title":"pCR to add KMS managed Content Encryption Key (CEK) for S\/MIME","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR proposes using the MCPTT KMS to establish the Content Encryption Key (CEK) used for S\/MIME protection of SIP.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22620,"status":"revised","reservation_date":"2015-10-29 16:59:45","uploaded":"2015-11-02 04:23:49","revisionof":"","revisedto":"S3-152513","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152230.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152231","title":"pCR to add IBE managed Content Encryption Key (CEK) for S\/MIME","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR proposes using the Identity Based Encryption (IBE) to establish the Content Encryption Key (CEK) used for S\/MIME protection of SIP.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22630,"status":"revised","reservation_date":"2015-10-29 17:02:51","uploaded":"2015-11-02 04:23:49","revisionof":"","revisedto":"S3-152514","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152231.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152238","title":"Resolution of editor\u2019s note in section 7.2.2 of 33.879","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR addresses the editor\u2019s note in section 7.2.2 of 33.879.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22300,"status":"revised","reservation_date":"2015-10-30 17:58:29","uploaded":"2015-11-02 04:23:50","revisionof":"","revisedto":"S3-152594","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152238.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152239","title":"SIP core and MCPTT user authentication","source":"Motorola Solutions UK Ltd.","contact":"David Chater-Lea","contact-id":5018,"tdoctype":"pCR","for":"Agreement","abstract":"This contribution proposes a standardised means of authentication of MCPTT client to SIP core where the deployment scenario prevents the use of an ISIM approach","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22310,"status":"noted","reservation_date":"2015-10-30 18:05:39","uploaded":"2015-11-02 08:44:57","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152239.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152243","title":"pCR to add a KMS access token to 33.179","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR proposes adding a KMS access token for key management authorization and key distribution to TS 33.179.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24110,"status":"noted","reservation_date":"2015-10-31 22:28:13","uploaded":"2015-11-02 04:23:50","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152243.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152244","title":"pCR to add KMS managed Content Encryption Key (CEK) for S\/MIME to 33.179","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR adds S\/MIME CEK management to 33.179 based on the KMS proposal.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24120,"status":"noted","reservation_date":"2015-10-31 23:03:05","uploaded":"2015-11-02 04:23:50","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152244.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152245","title":"pCR to add IBC managed Content Encryption Key (CEK) for S\/MIME to 33.179","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR adds S\/MIME CEK management to 33.179 based on the Identity Based Cryptography (IBC) approach.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24130,"status":"noted","reservation_date":"2015-10-31 23:05:03","uploaded":"2015-11-02 04:23:48","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152245.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152262","title":"pCR Evaluation of S\/MIME CEK management solutions","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"This contribution evaluates the KMS method versus the IBC method for management of the S\/MIME Content Encryption Key.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23520,"status":"revised","reservation_date":"2015-11-02 04:34:29","uploaded":"2015-11-02 13:19:43","revisionof":"","revisedto":"S3-152520","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152262.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152263","title":"Discussion paper - Protecting MCPTT Information in SIP message using S\/MIME","source":"Alcatel-Lucent","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Decision","abstract":"This contribution discusses a mechanism to protect MCPTT information in SIP messages using S\/MIME","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22430,"status":"noted","reservation_date":"2015-11-02 07:04:17","uploaded":"2015-11-02 07:32:14","revisionof":"S3-151866","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152263.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152264","title":"pCR - Protecting MCPTT Information in SIP message with S\/MIME","source":"Alcatel-Lucent, Motorola Solutions, Inc","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR contribution proposes a mechanism to protect MCPTT information in SIP messages using S\/MIME.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22440,"status":"revised","reservation_date":"2015-11-02 07:09:42","uploaded":"2015-11-02 07:32:14","revisionof":"S3-151867","revisedto":"S3-152512","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152264.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152273","title":"Evaluation of 3GPP SSO solutions for MCPTT User authentication","source":"Alcatel-Lucent","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Agreement","abstract":"This contribution provides a comparative analysis of Solution #2 \u201cMCPTT User Authentication and Registration based on OpenID Connect\u201d against existing 3GPP SSO solutions identified in TR 33.895, TS 33.924, and TS 33.980","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23140,"status":"noted","reservation_date":"2015-11-02 07:42:18","uploaded":"2015-11-02 07:44:33","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152273.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152274","title":"Specification of S\/MIME based solution for protecting MCPTT Application Information in SIP messages","source":"Alcatel-Lucent, Motorola Solutions, Inc","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Agreement","abstract":"This pCR proposes adding S\/MIME based protection of MCPTT Application information in SIP messages to TS 33.179 based on pCR  S3-152264 to TR 33.879","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24100,"status":"noted","reservation_date":"2015-11-02 08:04:18","uploaded":"2015-11-02 11:41:43","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152274.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152282","title":"Key issue 6 \u2013 On-Network Operation: impersonation","source":"BlackBerry UK Limited","contact":"Andrew Allen","contact-id":21705,"tdoctype":"discussion","for":"Discussion","abstract":"Discuses the approach to identity management and authentication of the MCPTT User.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22380,"status":"noted","reservation_date":"2015-11-02 08:37:59","uploaded":"2015-11-02 09:32:40","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152282.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152283","title":"Evaluation of signalling protection","source":"Motorola Solutions UK Ltd.","contact":"David Chater-Lea","contact-id":5018,"tdoctype":"pCR","for":"Approval","abstract":"Proposes a revision to the evaluation of signalling protection mechanisms","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23550,"status":"noted","reservation_date":"2015-11-02 08:39:53","uploaded":"2015-11-02 08:44:57","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152283.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152285","title":"SIP core and MCPTT user authentication","source":"Motorola Solutions UK Ltd.","contact":"David Chater-Lea","contact-id":5018,"tdoctype":"pCR","for":"Approval","abstract":"Proposes text for TS 33.179 which incorporates solutions for SIP authentication and signalling protection.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24070,"status":"noted","reservation_date":"2015-11-02 08:41:57","uploaded":"2015-11-02 08:44:57","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"0.1.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152285.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152287","title":"Authentication of an MCPTT user","source":"BlackBerry UK Limited","contact":"Andrew Allen","contact-id":21705,"tdoctype":"pCR","for":"Approval","abstract":"Proposes a solution for authentication of the MCPTT User","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22390,"status":"revised","reservation_date":"2015-11-02 08:44:27","uploaded":"2015-11-02 09:48:52","revisionof":"","revisedto":"S3-152511","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152287.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152289","title":"Alignment of MCPTT architecture with latest version of TS 23.179","source":"BlackBerry UK Limited","contact":"Andrew Allen","contact-id":21705,"tdoctype":"pCR","for":"Approval","abstract":"This contribution updates the architecture overview in clause 4 to be aligned with the current version of TS 23.179","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24420,"status":"withdrawn","reservation_date":"2015-11-02 09:29:19","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152311","title":"Clarification on generation of SRTP session key and salt in media stream protection in Solution#7","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution clarifies the generation of SRTP session key and salt in media stream protection in Solution#7","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23120,"status":"revised","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:15","revisionof":"","revisedto":"S3-152517","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152311.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152312","title":"Feasibility analysis of SDES and KMS mechanism","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution gives a feasibility analysis of SDES and KMS mechanisms.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23610,"status":"revised","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:15","revisionof":"","revisedto":"S3-152521","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152312.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152313","title":"Group key distribution through MCPTT Group creation procedure","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution proposes to distribute the MCPTT Group key to affiliated users during group creation procedure","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23130,"status":"revised","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:15","revisionof":"","revisedto":"S3-152518","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152313.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152314","title":"Modification on section 4.2.2 and 4.2.3","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"This contribution modifies the Figure 4.2.2-1 The MCPTT application plane, Figure 4.2.3-1 The MCPTT signalling plane and their related descriptions in 33.879.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22210,"status":"approved","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:15","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152314.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152315","title":"Optimisation of GMK provisioning of solution 4","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes to clarify a misleading word and add a method to obtain GMK for the protection of media as well as a different GMK for the protection of floor control signalling in one procedure","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23110,"status":"approved","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:15","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152315.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152316","title":"Protection for sensitive information of application layer in SIP signallings","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution clarifies the necessity to protect sensitive information of application layer in SIP signallings and proposes to use S\/MIME protocol.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22450,"status":"revised","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:16","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152316.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152352","title":"HTTP-1 interface protection","source":"Samsung, Nokia Networks","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22730,"status":"revised","reservation_date":"2015-11-02 12:31:49","uploaded":"2015-11-02 13:25:32","revisionof":"","revisedto":"S3-152516","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152352.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152355","title":"Inter\/Intra domain protection for MCPTT service","source":"Samsung, Nokia Networks","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22740,"status":"approved","reservation_date":"2015-11-02 12:36:24","uploaded":"2015-11-02 13:25:33","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152355.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152357","title":"SIP Core Authentication Procedure","source":"Samsung, Nokia Networks","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22250,"status":"revised","reservation_date":"2015-11-02 12:38:39","uploaded":"2015-11-02 13:25:33","revisionof":"","revisedto":"S3-152510","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152357.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152361","title":"Authentication procedures for MCPTT service","source":"Samsung, Nokia Networks","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24060,"status":"revised","reservation_date":"2015-11-02 12:40:44","uploaded":"2015-11-02 13:25:33","revisionof":"","revisedto":"S3-152528","release":"Rel-13","crspec":33.179,"crspecversion":"0.1.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152361.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152363","title":"Signalling plane protection for MCPTT service","source":"Samsung, Nokia Networks","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24090,"status":"revised","reservation_date":"2015-11-02 12:44:02","uploaded":"2015-11-02 13:25:33","revisionof":"","revisedto":"S3-152529","release":"Rel-13","crspec":33.179,"crspecversion":"0.1.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152363.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152392","title":"Additional Security Threats in Key Issue #1","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22230,"status":"revised","reservation_date":"2015-11-02 13:44:19","uploaded":"2015-11-02 14:22:44","revisionof":"","revisedto":"S3-152508","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152392.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152395","title":"Clarification of Mapping between MCPTT1 and GC1","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22220,"status":"approved","reservation_date":"2015-11-02 14:00:43","uploaded":"2015-11-02 14:22:30","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152395.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152401","title":"MCPTT TR: Alignment of Solution#3 with SA6 TS","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution cleans up solution #3 based on changes within SA6's TS.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22820,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:12","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152401.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152402","title":"MCPTT TR: Update to Solution#3 to resolve KMS editor's note","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution updates Solution #3 to resolve an editor's note relating to the relationship between the MCPTT KMS and the KMS from TS 33.328.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22830,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:10","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152402.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152403","title":"MCPTT TR: Resolution of Solution #3's Editor's note on KMS security","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution updates Solution #3 to resolve an editor's note relating to KMS connection security.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22850,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:10","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152403.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152404","title":"MCPTT TR: Definition of key material types for Solution #3","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution updates Solution #3 to include the types of key material required to support Solution #4 and #5.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22870,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:10","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152404.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152405","title":"MCPTT TR: Addition to Solution #4 on revocation","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution clarifies how group security contexts may be revoked within Solution #4.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22890,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:11","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152405.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152406","title":"MCPTT TR: Evaluation of Private Call Key Distribution Mechanisms","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"Addition of an evaluation of MCPTT private call key distribution mechanisms to the MCPTT TR.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23570,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:11","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152406.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152407","title":"MCPTT TR: Evaluation of Group Call Key Distribution Mechanisms","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"Evaluation of MCPTT Group Call Key Distribution Mechanisms","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23630,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:11","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152407.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152408","title":"MCPTT TR: Evaluation of Media and Floor Protection","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"Evaluation of Media and Floor Protection Mechanisms","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23920,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:11","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152408.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152409","title":"MCPTT TS: Scope","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides a scope for the MCPTT TS","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23950,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:11","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152409.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152410","title":"MCPTT TS: Addition of overview and KMS to support end-to-end communication security","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds a section to the MCPTT TS which describes the MCPTT KMS and procedures to request key material from the MCPTT KMS.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24020,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 15:05:39","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152410.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152411","title":"MCPTT TS: Addition of Private Call Key Distribution","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds the MCPTT private call key distribution procedures to the MCPTT TS.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24030,"status":"approved","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:11","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152411.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152412","title":"MCPTT TS: Addition of Group Call Key Distribution","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds the group call key distribution solution to the MCPTT TS.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24040,"status":"revised","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:12","revisionof":"","revisedto":"S3-152526","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152412.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152413","title":"MCPTT TS: Addition of media and floor control protection","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds the MCPTT media and floor control protection mechanisms to the MCPTT TS.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24050,"status":"revised","reservation_date":"2015-11-02 14:05:04","uploaded":"2015-11-02 14:46:12","revisionof":"","revisedto":"S3-152527","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152413.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152425","title":"LS to SA6 on addition of MCPTT KMS to MCPTT common services core","source":"CESG","contact":"Peter Haigh","contact-id":70254,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24250,"status":"revised","reservation_date":"2015-11-02 14:14:56","uploaded":"2015-11-02 14:46:12","revisionof":"","revisedto":"S3-152530","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA6","Cc":"CT1","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152425.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152442","title":"Comments to S3-152273, Evaluation of existing 3GPP SSO solutions for usage in MCPTT User authentication","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"response","for":"Agreement","abstract":"This contribution provides comments to S3-152273, a comparative analysis of Solution #2 \u201cMCPTT User Authentication and Registration based on OpenID Connect\u201d against existing 3GPP SSO solutions identified in TR 33.895, TS 33.924, and TS 33.980.","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23150,"status":"noted","reservation_date":"2015-11-04 12:36:15","uploaded":"2015-11-04 12:48:43","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152442.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152508","title":"Additional Security Threats in Key Issue #1","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22231,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152392","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152508.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152509","title":"Resolution of editor\u2019s note in section 6.19.3 of 33.879","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22241,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152223","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152509.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152510","title":"SIP Core Authentication Procedure","source":"Samsung, Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22251,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152357","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152510.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152511","title":"Authentication of an MCPTT user","source":"BlackBerry UK Limited","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22391,"status":"postponed","reservation_date":"2015-11-23 14:05:49","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152287","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152511.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152512","title":"pCR - Protecting MCPTT Information in SIP message with S\/MIME","source":"Alcatel-Lucent, Motorola Solutions, Inc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22441,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152264","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152512.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152513","title":"pCR to add KMS managed Content Encryption Key (CEK) for S\/MIME","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22621,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152230","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152513.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152514","title":"pCR to add IBE managed Content Encryption Key (CEK) for S\/MIME","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22631,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152231","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152514.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152515","title":"pCR to add a KMS access token","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22641,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152221","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152515.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152516","title":"HTTP-1 interface protection","source":"Samsung, Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22731,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152352","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"0.3.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152516.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152517","title":"Clarification on generation of SRTP session key and salt in media stream protection in Solution#7","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23121,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152311","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152517.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152518","title":"Group key distribution through MCPTT Group creation procedure","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23131,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152313","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152518.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152519","title":"Resolution of editor\u2019s note in section 7.2 of 33.879","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23161,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152222","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152519.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152520","title":"pCR Evaluation of S\/MIME CEK management solutions","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23521,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152262","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152520.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152521","title":"Feasibility analysis of SDES and KMS mechanism","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":23611,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152312","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152521.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152522","title":"TR 33.879 MCPTT","source":"Rapporteur","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":252200,"status":"approved","reservation_date":"2015-11-23 14:05:22","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152522.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152523","title":"TS 33.179 MCPTT","source":"Rapporteur","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TS","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":252300,"status":"approved","reservation_date":"2015-11-23 14:05:23","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152523.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152524","title":"pCR to add requirements to 33.179","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24011,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152225","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152524.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152526","title":"MCPTT TS: Addition of Group Call Key Distribution","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24041,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152412","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152526.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152527","title":"MCPTT TS: Addition of media and floor control protection","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24051,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152413","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152527.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152528","title":"Authentication procedures for MCPTT service","source":"Samsung, Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24061,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152361","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"0.1.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152528.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152529","title":"Signalling plane protection for MCPTT service","source":"Samsung, Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24081,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152363","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152529.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152530","title":"LS to SA6 on addition of MCPTT KMS to MCPTT common services core","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":24251,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152425","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA6","Cc":"CT1","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152530.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152558","title":"Minutes MCPTT offline session","source":"BT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"report","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":255800,"status":"endorsed","reservation_date":"2015-11-23 14:05:22","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152558.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152561","title":"Generic authentication and authorization for MCPTT","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":256100,"status":"approved","reservation_date":"2015-11-23 14:05:20","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152561.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152562","title":"MCPTT user authentication framework","source":"Motorola Solutions","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":256200,"status":"approved","reservation_date":"2015-11-23 14:05:20","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152562.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152563","title":"MCPTT user authentication requirements","source":"Motorola Solutions","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":256300,"status":"approved","reservation_date":"2015-11-23 14:05:20","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152563.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152583","title":"OIDC user authentication with user name\/password example","source":"Motorola Solutions","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":258300,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152583.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152585","title":"Exception sheet MCPTT","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WI exception request","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":258500,"status":"agreed","reservation_date":"2015-11-23 14:05:07","uploaded":"2016-10-27 10:32:55","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152585.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152586","title":"MCPTT evening sessions minutes","source":"BT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"report","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":258600,"status":"revised","reservation_date":"2015-11-23 14:06:40","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"S3-152593","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152586.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152593","title":"MCPTT evening sessions minutes","source":"BT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"report","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":258601,"status":"endorsed","reservation_date":"2015-11-23 14:05:22","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152586","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152593.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152594","title":"Resolution of editor\u2019s note in section 7.2.2 of 33.879","source":"Motorola Solutions Danmark A\/S","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22301,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152238","revisedto":"","release":"Rel-13","crspec":33.879,"crspecversion":"","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152594.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152600","title":"Reply to: LS to SA3 on potential need for CSC-6 Interface","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":22181,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-152218","lsto":"SA6","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152600.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152603","title":"cover sheet TR 33.879","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"TS or TR cover","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":260300,"status":"approved","reservation_date":"2015-11-23 14:05:23","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152603.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152604","title":"cover sheet TS 33.179","source":"CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"TS or TR cover","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":40,"ainumber":"7.12","ainame":"Mission Critical Push to Talk over LTE","tdoc_agenda_sort_order":260400,"status":"approved","reservation_date":"2015-11-23 14:05:23","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152604.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]