[{"name":"S3-190049","title":"[33.179] R13 Annex D.3.4.2 XSD correction","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"The keys EncUserDecryptKey, EncUserSigningKeySSK and EncUserPubTokenPVT need to resolve to EncryptedKey in the xenc shema.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":490,"status":"agreed","reservation_date":"2019-01-17 23:34:37","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"13.7.0","workitem":[{"winame":"MCPTT"}],"crnumber":97.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-190100","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190049.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190050","title":"[33.180] R14 Annex D.3.5.2 XSD correction (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) The keys EncUserDecryptKey, EncUserSigningKeySSK and EncUserPubTokenPVT need to resolve to EncryptedKey in the xenc shema.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":500,"status":"revised","reservation_date":"2019-01-17 23:34:44","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"S3-190444","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":96.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190050.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190051","title":"[33.180] R15 Annex D.3.5.2 XSD correction (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) The keys EncUserDecryptKey, EncUserSigningKeySSK and EncUserPubTokenPVT need to resolve to EncryptedKey in the xenc shema.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":510,"status":"revised","reservation_date":"2019-01-17 23:34:45","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"S3-190445","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"eMCSec"}],"crnumber":97.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190051.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190052","title":"[33.179] R13 IdMS interface security","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Define IdMS interface security","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":520,"status":"agreed","reservation_date":"2019-01-17 23:34:45","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"13.7.0","workitem":[{"winame":"MCPTT"}],"crnumber":98.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-190100","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190052.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190053","title":"[33.180] R14 IdMS interface security (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) Define IdMS interface security","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":530,"status":"revised","reservation_date":"2019-01-17 23:34:46","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"S3-190446","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":98.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190053.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190054","title":"[33.180] R15 IdMS interface security (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) Define IdMS interface security","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":540,"status":"revised","reservation_date":"2019-01-17 23:34:47","uploaded":"2019-01-21 12:06:18","revisionof":"","revisedto":"S3-190447","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"MCSec"}],"crnumber":99.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190054.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190055","title":"[33.179] R13 user service authorisation","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Per results from ETSI MCPTT Plugtest, the currently defined method of initial user service authorization using the SIP REGISTER message is unusable.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":550,"status":"not pursued","reservation_date":"2019-01-17 23:34:48","uploaded":"2019-01-21 12:06:18","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"13.7.0","workitem":[{"winame":"MCPTT"}],"crnumber":99.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190055.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190056","title":"[33.180] R14 user service authorisation (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) Per results from ETSI MCPTT Plugtest, the currently defined method of initial user service authorization using the SIP REGISTER message is unusable.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":560,"status":"not pursued","reservation_date":"2019-01-17 23:34:49","uploaded":"2019-01-21 12:06:18","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":100.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190056.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190057","title":"[33.180] R15 user service authorisation (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) Per results from ETSI MCPTT Plugtest, the currently defined method of initial user service authorization using the SIP REGISTER message is unusable.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":570,"status":"not pursued","reservation_date":"2019-01-17 23:34:50","uploaded":"2019-01-21 12:06:18","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"eMCSec"}],"crnumber":101.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190057.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190058","title":"[33.180] R14 InK clarifications","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Clarify that an InK may be provisioned using the KMSInit Response or KMSKeyProv Response messages.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":580,"status":"revised","reservation_date":"2019-01-17 23:34:50","uploaded":"2019-01-21 12:06:18","revisionof":"","revisedto":"S3-190448","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":102.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190058.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190059","title":"[33.180] R15 InK clarifications (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) Clarify that an InK may be provisioned using the KMSInit Response or KMSKeyProv Response messages.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":590,"status":"revised","reservation_date":"2019-01-17 23:34:51","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"S3-190449","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"MCSec"}],"crnumber":103.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190059.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190060","title":"[33.180] R14 MCX identity clarifications","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Identity management credentials (MC ID) may be mistakenly used for the mission critical identity of the user (MCX ID), exposing the set of login credentials.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":600,"status":"revised","reservation_date":"2019-01-17 23:34:52","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"S3-190450","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":104.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190060.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190061","title":"[33.180] R15 MCX identity clarifications (mirror)","source":"Motorola Solutions Germany","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"(mirror) Identity management credentials (MC ID) may be mistakenly used for the mission critical identity of the user (MCX ID), exposing the set of login credentials.","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":610,"status":"revised","reservation_date":"2019-01-17 23:34:53","uploaded":"2019-01-21 12:06:17","revisionof":"","revisedto":"S3-190451","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"MCSec"}],"crnumber":105.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190061.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190444","title":"[33.180] R14 Annex D.3.5.2 XSD correction (mirror)","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":501,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190050","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":96.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190444.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190445","title":"[33.180] R15 Annex D.3.5.2 XSD correction (mirror)","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":511,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190051","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"MCSec"}],"crnumber":97.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190445.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190446","title":"[33.180] R14 IdMS interface security (mirror)","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":531,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190053","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":98.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190446.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190447","title":"[33.180] R15 IdMS interface security (mirror)","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":541,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190054","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"MCSec"}],"crnumber":99.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190447.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190448","title":"[33.180] R14 InK clarifications","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":581,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190058","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":102.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190448.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190449","title":"[33.180] R15 InK clarifications (mirror)","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":591,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190059","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"MCSec"}],"crnumber":103.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190449.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190450","title":"[33.180] R14 MCX identity clarifications","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":601,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190060","revisedto":"","release":"Rel-14","crspec":33.18,"crspecversion":"14.5.0","workitem":[{"winame":"MCSec"}],"crnumber":104.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190450.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190451","title":"[33.180] R15 MCX identity clarifications (mirror)","source":"Motorola Solutions Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"7.5.8","ainame":"Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)","tdoc_agenda_sort_order":611,"status":"agreed","reservation_date":"2019-01-29 12:40:13","uploaded":"2019-01-29 12:40:13","revisionof":"S3-190061","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.3.0","workitem":[{"winame":"MCSec"}],"crnumber":105.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-190101","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190451.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]