[{"name":"S3-194002","title":"DTR 33848 KI1 \u2013 clause 5_2_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"Different trust domains require isolation.  The proposed potential security requirements explicitly identify the need to manage and support different trust domains and their security policies.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40020,"status":"revised","reservation_date":"2019-11-08 22:59:20","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194568","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194002.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194003","title":"DTR 33848 KI2 \u2013 clause 5_3_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This potential security requirement proposes that the network manages persmission controls on the exchange of information between NFs\/sub-NFs to ensure that sensitive information is not leaked for exposed.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40030,"status":"revised","reservation_date":"2019-11-08 23:01:56","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194569","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194003.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194004","title":"DTR 33848 KI3 \u2013 clause 5_4_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"The proposed potential security requirement identifies that the NFV Management and Orchestration Function may control the availability of virtulalized network resources for key\/required core network functions","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40040,"status":"revised","reservation_date":"2019-11-08 23:03:52","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194570","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194004.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194005","title":"DTR 33848 KI4 \u2013 clause 5_5_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution adds a potential security requirement for the Security Edge Protection Proxy (SEPP) to reduce the threat of cascading network failure and\/or software vulnerabilities.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40050,"status":"revised","reservation_date":"2019-11-08 23:05:40","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194571","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194005.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194006","title":"DTR 33848 KI5 \u2013 clause 5_6_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This proposed text explicitly identifies the need for clearing resources upon transfer\/termination and prior to re-use to increase the protection of sensitive information and prevent leakage across NFs.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40060,"status":"revised","reservation_date":"2019-11-08 23:07:28","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194572","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194006.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194007","title":"DTR 33848 KI6 \u2013 clause 5_7_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"Explicit potential requirements for reference point-based security and the use of encryption for data in transit are proposed to assist in isolating NFs.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40070,"status":"revised","reservation_date":"2019-11-08 23:08:52","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194573","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194007.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194008","title":"DTR 33848 KI7 \u2013 clause 5_8_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"Explicit potential requirements for the control of the hypervisor and for separation are proposed to protect memory.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40080,"status":"revised","reservation_date":"2019-11-08 23:10:12","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194574","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194008.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194009","title":"DTR 33848 KI8 \u2013 clause 5_9_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes explicit potential requirements for the security assurance testing in a virtualized environment to mitigate testing isolation and improve security of a virtualized 3GPP network.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40090,"status":"revised","reservation_date":"2019-11-08 23:11:24","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194575","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194009.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194010","title":"DTR 33848 KI9 \u2013 clause 5_10_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes explicit potential requirements for the 3GPP network to securely manage slice isolation and ensure that the security and trust domain policies are enforced.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40100,"status":"revised","reservation_date":"2019-11-08 23:12:42","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194576","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194010.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194011","title":"DTR 33848 KI11 \u2013 clause 5_12_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes an explicit potential requirement for the 3GPP network to manage key storage and confidential data access to protect against compromise.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40110,"status":"revised","reservation_date":"2019-11-08 23:13:53","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194578","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194011.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194012","title":"DTR 33848 KI12 \u2013 clause 5_13_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes an explicit potential requirement for the 3GPP network to be able to control the data center location and routing in order to provide security attestation, provide commensurate security needed for services, and meet legal\/regula","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40120,"status":"revised","reservation_date":"2019-11-08 23:14:54","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194579","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194012.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194013","title":"DTR 33848 KI13 \u2013 clause 5_14_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes explicit potential security requirements for the 3GPP network to be able to attest to the trustworthiness of VNFs or the NFVI.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40130,"status":"revised","reservation_date":"2019-11-08 23:15:58","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194580","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194013.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194014","title":"DTR 33848 KI14 \u2013 clause 5_15_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"\u2022\tThis contribution proposes an explicit potential requirement for the 3GPP network to prevent and detect unauthorized VNF host spanning.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40140,"status":"revised","reservation_date":"2019-11-08 23:17:17","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194581","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194014.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194015","title":"DTR 33848 KI15 \u2013 clause 5_16_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes explicit potential requirements for the 3GPP network to increase data protection by controlling the host(s) that can encrypt\/decrypt data and prevent\/detect unauthorized data access and manipulation.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40150,"status":"revised","reservation_date":"2019-11-08 23:18:40","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194584","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194015.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194016","title":"DTR 33848 KI16 \u2013 clause 5_17_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"In a mixed network deployment, the network\u2019s security policies for the PNFs and VNFs need to be coordinated and complementary.  This contribution proposes an explicit potential requirement to do this.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40160,"status":"revised","reservation_date":"2019-11-08 23:19:50","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194585","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194016.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194017","title":"DTR 33848 KI17 \u2013 clause 5_18_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes a potential security requirements for the 3GPP network to isolate and protect the software catalogue and associated image exposure in a secure environment.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40170,"status":"noted","reservation_date":"2019-11-08 23:21:03","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194017.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194018","title":"DTR 33848 KI18 \u2013 clause 5_19_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"There were no potential security requirements for this key issues, so this contribution proposes a potential requirement for the 3GPP network to protect any certification or information held in a sensive NF.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40180,"status":"noted","reservation_date":"2019-11-08 23:23:02","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194018.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194019","title":"DTR 33848 KI19 \u2013 clauses 5_20_2 and 3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes a security threat and a potential requirement to address the vulnerability of network timing in a virtualized environment.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40190,"status":"merged","reservation_date":"2019-11-08 23:24:23","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194019.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194020","title":"DTR 33848 KI20 \u2013 clause 5_21_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes explicit potential requirements for 3rd party hosting environments that provide increased subscriber security and enable the operator to meet legal\/regulatory requirements.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40200,"status":"revised","reservation_date":"2019-11-08 23:25:39","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194589","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194020.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194021","title":"DTR 33848 KI21 \u2013 clause 5_22_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes an explicit potential requirement for the network to prevent and detect attacks that tunnel through the virtualisation layer.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40210,"status":"revised","reservation_date":"2019-11-08 23:26:45","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194590","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194021.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194022","title":"DTR 33848 KI22 \u2013 clause 5_23_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes explicit potential requirements for to harden the 3GPP NFV MANO from single point of failures and attacks.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40220,"status":"revised","reservation_date":"2019-11-08 23:27:54","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194591","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194022.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194023","title":"DTR 33848 KI23 \u2013 clause 5_24_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"This contribution proposes a potential requirement for the 3GPP network to pass security policy to the hypervisor(s) to improve the security of NF resource selection.","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40230,"status":"revised","reservation_date":"2019-11-08 23:29:01","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194592","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194023.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194024","title":"DTR 33848 KI24 \u2013 clause 5_25_3","source":"T-Mobile USA Inc.","contact":"Jean Trakinat","contact-id":83194,"tdoctype":"other","for":"Approval","abstract":"Dynamic allocation of memory addresses mitigate against distributed monitoring attacks.  This contribution proposes the requirement for the hypervisor to dynamically assing VNF recsources to improve network security","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40240,"status":"revised","reservation_date":"2019-11-08 23:30:12","uploaded":"2019-11-09 00:17:37","revisionof":"","revisedto":"S3-194593","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194024.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194353","title":"TR 33.848 Solution \u2013 lock-down of infrastructure","source":"NCSC","contact":"James O'Driscoll","contact-id":83583,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":43530,"status":"revised","reservation_date":"2019-11-11 12:19:52","uploaded":"2019-11-11 12:24:58","revisionof":"","revisedto":"S3-194582","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194353.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194354","title":"TR 33.848 Solution \u2013 trust domains and separation","source":"NCSC","contact":"James O'Driscoll","contact-id":83583,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":43540,"status":"revised","reservation_date":"2019-11-11 12:22:49","uploaded":"2019-11-11 12:24:58","revisionof":"","revisedto":"S3-194583","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194354.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194398","title":"Requirements for KI#18 The Startup Paradox","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"pCR","for":"Approval","abstract":"potential security requirements for Key Issue 18, the startup paradox","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":43980,"status":"revised","reservation_date":"2019-11-11 14:17:11","uploaded":"2019-11-11 14:30:13","revisionof":"","revisedto":"S3-194587","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194398.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194432","title":"Comments to S3-194019 DTR 33.848, Key Issue #19 Clauses 5.20.2 and 5.20.3","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"pCR","for":"Approval","abstract":"Comments to S3-194019 DTR 33.848, Key Issue #19 Clauses 5.20.2 and 5.20.3","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":44320,"status":"revised","reservation_date":"2019-11-13 14:35:15","uploaded":"2019-11-13 14:46:00","revisionof":"","revisedto":"S3-194588","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194432.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194560","title":"Notes on the security impacts on the virtualization offline session","source":"NTT-Docomo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":456000,"status":"noted","reservation_date":"2019-11-20 17:25:36","uploaded":"2019-11-20 17:25:36","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194560.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194568","title":"DTR 33848 KI1 \u2013 clause 5_2_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40021,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194002","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194568.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194569","title":"DTR 33848 KI2 \u2013 clause 5_3_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40031,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194003","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194569.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194570","title":"DTR 33848 KI3 \u2013 clause 5_4_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40041,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194004","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194570.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194571","title":"DTR 33848 KI4 \u2013 clause 5_5_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40051,"status":"noted","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194005","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194571.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194572","title":"DTR 33848 KI5 \u2013 clause 5_6_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40061,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194006","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194572.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194573","title":"DTR 33848 KI6 \u2013 clause 5_7_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40071,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194007","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194573.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194574","title":"DTR 33848 KI7 \u2013 clause 5_8_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40081,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194008","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194574.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194575","title":"DTR 33848 KI8 \u2013 clause 5_9_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40091,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194009","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194575.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194576","title":"DTR 33848 KI9 \u2013 clause 5_10_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40101,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194010","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194576.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194578","title":"DTR 33848 KI11 \u2013 clause 5_12_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40111,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194011","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194578.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194579","title":"DTR 33848 KI12 \u2013 clause 5_13_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40121,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194012","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194579.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194580","title":"DTR 33848 KI13 \u2013 clause 5_14_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40131,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194013","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194580.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194581","title":"DTR 33848 KI14 \u2013 clause 5_15_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40141,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194014","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194581.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194582","title":"TR 33.848 Solution \u2013 lock-down of infrastructure","source":"NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":43531,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194353","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194582.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194583","title":"TR 33.848 Solution \u2013 trust domains and separation","source":"NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":43541,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194354","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194583.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194584","title":"DTR 33848 KI15 \u2013 clause 5_16_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40151,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194015","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194584.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194585","title":"DTR 33848 KI16 \u2013 clause 5_17_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40161,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194016","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194585.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194587","title":"Requirements for KI#18 The Startup Paradox","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":43981,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194398","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194587.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194588","title":"Comments to S3-194019 DTR 33.848, Key Issue #19 Clauses 5.20.2 and 5.20.3","source":"Ericsson,T-Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":44321,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194432","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.4.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194588.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194589","title":"DTR 33848 KI20 \u2013 clause 5_21_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40201,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194020","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194589.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194590","title":"DTR 33848 KI21 \u2013 clause 5_22_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40211,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194021","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194590.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194591","title":"DTR 33848 KI22 \u2013 clause 5_23_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40221,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194022","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194591.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194592","title":"DTR 33848 KI23 \u2013 clause 5_24_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40231,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194023","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194592.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194593","title":"DTR 33848 KI24 \u2013 clause 5_25_3","source":"T-Mobile USA Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":40241,"status":"approved","reservation_date":"2019-11-21 17:13:16","uploaded":"2019-11-21 17:13:16","revisionof":"S3-194024","revisedto":"","release":"","crspec":33.848,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194593.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194624","title":"Draft TR 33.848","source":"BT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":62,"ainumber":"8.","ainame":"Study on Security Impacts of Virtualisation","tdoc_agenda_sort_order":462400,"status":"approved","reservation_date":"2019-11-22 11:36:12","uploaded":"2019-11-22 11:36:12","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.5.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194624.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]