[{"name":"S3-193943","title":"Reply LS on eSBA NF Set","source":"S2-1910148","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":39430,"status":"noted","reservation_date":"2019-11-07 10:00:41","uploaded":"2019-11-07 15:30:29","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193943.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194187","title":"Service access authorization of a NF Set","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42610,"status":"noted","reservation_date":"2019-11-11 09:39:27","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194187.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194250","title":"Editorials and corrections to Security requirements for SeCoP","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":39490,"status":"revised","reservation_date":"2019-11-11 11:18:29","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"S3-194517","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194250.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194251","title":"Editorials and corrections to Protection of N9 interface","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":44300,"status":"approved","reservation_date":"2019-11-11 11:18:30","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194251.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194252","title":"Using Rel-15 token-based authorization in indirect communication scenarios","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42560,"status":"not pursued","reservation_date":"2019-11-11 11:18:30","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":674.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194252.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194256","title":"Security for roaming interfaces in indirect communication","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42500,"status":"revised","reservation_date":"2019-11-11 11:18:38","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"S3-194519","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":675.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194256.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194261","title":"Resource Level Authorization using Access Tokens","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":43650,"status":"not pursued","reservation_date":"2019-11-11 11:18:41","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":676.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194261.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194262","title":"Authorization using Access Tokens based on NF-Subtype","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":43700,"status":"not pursued","reservation_date":"2019-11-11 11:18:42","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":677.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194262.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194365","title":"Resource Level Authorization using Access Tokens","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"Resource Level Authorization using Access Tokens","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42620,"status":"merged","reservation_date":"2019-11-11 12:53:36","uploaded":"2019-11-11 14:22:51","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":695.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194365.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194367","title":"TLS between NF and SEPP based on custom HTTP header","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"TLS between NF and SEPP based on custom HTTP header","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":41870,"status":"revised","reservation_date":"2019-11-11 12:57:25","uploaded":"2019-11-11 14:22:51","revisionof":"","revisedto":"S3-194518","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":696.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194367.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194370","title":"Mutual authentication between Network Functions","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"Mutual authentication between Network Functions","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42510,"status":"not pursued","reservation_date":"2019-11-11 13:07:11","uploaded":"2019-11-11 14:22:51","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":697.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194370.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194372","title":"NF consumer authentication by the producer in direct communication scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"NF consumer authentication by the producer in direct communication scenarios","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42520,"status":"not pursued","reservation_date":"2019-11-11 13:10:06","uploaded":"2019-11-11 14:22:51","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":698.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194372.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194374","title":"TLS entity certificate profile for SBA","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"TLS entity certificate profile for SBA","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":43740,"status":"not pursued","reservation_date":"2019-11-11 13:14:20","uploaded":"2019-11-11 14:22:51","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":699.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194374.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194376","title":"SBA Network Function TLS certificate profile","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"SBA Network Function TLS entity certificate profile","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":43720,"status":"not pursued","reservation_date":"2019-11-11 13:18:26","uploaded":"2019-11-11 14:26:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":700.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194376.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194430","title":"Commenting contribution on S3-194261 \u2013 Resource Level Authorization using Access Tokens","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Information","abstract":"Commenting contribution on S3-194261 \u2013 Resource Level Authorization using Access Tokens","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":43670,"status":"noted","reservation_date":"2019-11-13 13:46:30","uploaded":"2019-11-13 13:50:24","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194430.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194517","title":"Editorials and corrections to Security requirements for SeCoP","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":39491,"status":"approved","reservation_date":"2019-11-22 15:35:56","uploaded":"2019-11-22 15:35:56","revisionof":"S3-194250","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194517.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194518","title":"TLS between NF and SEPP based on custom HTTP header","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":41871,"status":"agreed","reservation_date":"2019-11-22 12:07:29","uploaded":"2019-11-22 12:07:29","revisionof":"S3-194367","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":696.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-191131","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194518.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194519","title":"Security for roaming interfaces in indirect communication","source":"Ericsson,Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42501,"status":"agreed","reservation_date":"2019-11-22 16:22:10","uploaded":"2019-11-22 16:22:10","revisionof":"S3-194256","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":675.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-191131","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194519.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194520","title":"Mutual authentication between Network Functions","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42511,"status":"withdrawn","reservation_date":"2019-12-04 13:09:10","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":697.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194521","title":"NF consumer authentication by the producer in direct communication scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42521,"status":"withdrawn","reservation_date":"2019-12-04 13:09:10","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":698.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194522","title":"Using Rel-15 token-based authorization in indirect communication scenarios","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42561,"status":"approved","reservation_date":"2019-12-03 10:31:13","uploaded":"2019-12-03 10:31:13","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194522.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194523","title":"Service access authorization of a NF Set","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":42611,"status":"agreed","reservation_date":"2019-11-22 15:35:56","uploaded":"2019-11-22 15:35:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":710.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-191131","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194523.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194524","title":"SBA Network Function TLS certificate profile","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":43721,"status":"noted","reservation_date":"2019-11-22 13:37:48","uploaded":"2019-11-22 13:37:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194524.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194659","title":"Resource Level Authorization using Access Tokens","source":"Ericsson,Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":26,"ainumber":"7.9","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":43651,"status":"noted","reservation_date":"2019-12-03 10:31:13","uploaded":"2019-12-03 10:31:13","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.0.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194659.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]