[{"name":"S3-194165","title":"New KI: Service access authorization for non-delegated subscribe-notify","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41940,"status":"revised","reservation_date":"2019-11-11 09:39:25","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194510","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194165.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194166","title":"eSBA: add conclusion on KI #5","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42600,"status":"noted","reservation_date":"2019-11-11 09:39:25","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194166.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194167","title":"eSBA: conclusion update on KI #22","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41650,"status":"noted","reservation_date":"2019-11-11 09:39:25","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194167.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194168","title":"eSBA: conclusion update on KI #29","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42550,"status":"revised","reservation_date":"2019-11-11 09:39:25","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194512","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194168.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194182","title":"New solution for authorization in the non-delegated \"Subscribe-Notify\" interaction scenarios","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42530,"status":"revised","reservation_date":"2019-11-11 09:39:27","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194511","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194182.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194183","title":"Update on solution#15 in TR 33.855","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":44250,"status":"revised","reservation_date":"2019-11-11 09:39:27","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194425","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194183.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194184","title":"Conclusion on authorization in the non-delegated Subscribe-Notify interaction scenarios","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42540,"status":"noted","reservation_date":"2019-11-11 09:39:27","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194184.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194185","title":"Conclusion on authorization in the delegated Subscribe-Notify interaction scenarios","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41920,"status":"noted","reservation_date":"2019-11-11 09:39:27","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194185.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194186","title":"Conclusion on service access authorization of a NF Set","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41850,"status":"revised","reservation_date":"2019-11-11 09:39:27","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194508","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194186.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194192","title":"Evaluation on service access authorization of a NF Set in non-roaming scenario","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41830,"status":"revised","reservation_date":"2019-11-11 09:39:28","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194506","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194192.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194193","title":"Evaluation on service access authorization of a NF Set in roaming scenario","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41840,"status":"revised","reservation_date":"2019-11-11 09:39:28","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194507","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194193.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194194","title":"Security requirement on Key Issue #24: service access authorization of a NF Set","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41820,"status":"revised","reservation_date":"2019-11-11 09:39:28","uploaded":"2019-11-11 10:33:39","revisionof":"","revisedto":"S3-194505","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194194.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194253","title":"Conclusion of Key Issue #28: Service access authorization in the delegated \"Subscribe-Notify\" scenarios","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41930,"status":"noted","reservation_date":"2019-11-11 11:18:37","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194253.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194254","title":"Conclusion for Key Issue #5 \"NF-NF Authorization\"","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":43800,"status":"revised","reservation_date":"2019-11-11 11:18:38","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"S3-194514","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194254.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194255","title":"Update to conclusion on Key issue #23: NF to NF authentication and authorization in Indirect communication","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41680,"status":"noted","reservation_date":"2019-11-11 11:18:38","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194255.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194257","title":"Removal of Editor's Notes for Security of indirect communication in roaming scenarios","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":43820,"status":"revised","reservation_date":"2019-11-11 11:18:41","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"S3-194515","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194257.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194258","title":"New Key issue on NF subtypes for authorization granularity","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42570,"status":"revised","reservation_date":"2019-11-11 11:18:41","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"S3-194513","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194258.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194259","title":"Update of Solution #32: OAuth 2.0 based resource level authorization of NF service consumers","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42580,"status":"noted","reservation_date":"2019-11-11 11:18:41","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194259.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194260","title":"Conclusion on NF subtypes for authorization granularity","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42590,"status":"noted","reservation_date":"2019-11-11 11:18:41","uploaded":"2019-11-11 14:48:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194260.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194380","title":"Discussion paper on authorization for Model D Indirect communications","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41660,"status":"noted","reservation_date":"2019-11-11 13:27:28","uploaded":"2019-11-11 14:22:51","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194380.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194382","title":"Update to conclusion on Key issue #22: Authorization of NF service access in indirect communication","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"Update to conclusion on Key issue #22: Authorization of NF service access in indirect communication","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41670,"status":"noted","reservation_date":"2019-11-11 13:30:51","uploaded":"2019-11-11 14:22:51","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194382.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194425","title":"Update on solution#15 in TR 33.855","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41860,"status":"revised","reservation_date":"2019-11-13 09:05:55","uploaded":"2019-11-13 10:34:56","revisionof":"S3-194183","revisedto":"S3-194509","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194425.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194503","title":"Notes from the eSBA break out session","source":"NTT-Docomo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":450300,"status":"noted","reservation_date":"2019-11-19 19:04:35","uploaded":"2019-11-19 19:04:35","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194503.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194504","title":"Update to conclusion on Key issue #23: NF to NF authentication and authorization in Indirect communication","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41681,"status":"withdrawn","reservation_date":"2019-12-04 13:09:03","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194505","title":"Security requirement on Key Issue #24: service access authorization of a NF Set","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41821,"status":"approved","reservation_date":"2019-11-22 11:49:10","uploaded":"2019-11-22 11:49:10","revisionof":"S3-194194","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194505.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194506","title":"Evaluation on service access authorization of a NF Set in non-roaming scenario","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41831,"status":"approved","reservation_date":"2019-11-22 12:07:29","uploaded":"2019-11-22 12:07:29","revisionof":"S3-194192","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194506.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194507","title":"Evaluation on service access authorization of a NF Set in roaming scenario","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41841,"status":"approved","reservation_date":"2019-11-22 12:07:29","uploaded":"2019-11-22 12:07:29","revisionof":"S3-194193","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194507.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194508","title":"Conclusion on service access authorization of a NF Set","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41851,"status":"approved","reservation_date":"2019-11-22 15:35:56","uploaded":"2019-11-22 15:35:56","revisionof":"S3-194186","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194508.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194509","title":"Update on solution#15 in TR 33.855","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41861,"status":"approved","reservation_date":"2019-11-22 15:35:56","uploaded":"2019-11-22 15:35:56","revisionof":"S3-194425","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194509.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194510","title":"New KI: Service access authorization for non-delegated subscribe-notify","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":41941,"status":"approved","reservation_date":"2019-11-22 15:35:56","uploaded":"2019-11-22 15:35:56","revisionof":"S3-194165","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194510.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194511","title":"New solution for authorization in the non-delegated \"Subscribe-Notify\" interaction scenarios","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42531,"status":"approved","reservation_date":"2019-11-22 15:35:56","uploaded":"2019-11-22 15:35:56","revisionof":"S3-194182","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194511.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194512","title":"eSBA: conclusion update on KI #29","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42551,"status":"noted","reservation_date":"2019-11-22 15:47:27","uploaded":"2019-11-22 15:47:27","revisionof":"S3-194168","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194512.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194513","title":"New Key issue on NF subtypes for authorization granularity","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":42571,"status":"noted","reservation_date":"2019-11-22 16:17:39","uploaded":"2019-11-22 16:17:39","revisionof":"S3-194258","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194513.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194514","title":"Conclusion for Key Issue #5 \"NF-NF Authorization\"","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":43801,"status":"noted","reservation_date":"2019-11-22 16:17:39","uploaded":"2019-11-22 16:17:39","revisionof":"S3-194254","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194514.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194515","title":"Removal of Editor's Notes for Security of indirect communication in roaming scenarios","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":43821,"status":"approved","reservation_date":"2019-11-22 16:05:38","uploaded":"2019-11-22 16:05:38","revisionof":"S3-194257","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.8.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194515.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194516","title":"Draft TR 33.855","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":53,"ainumber":"8.1","ainame":"Study on Security Aspects of the 5G Service Based Architecture","tdoc_agenda_sort_order":451600,"status":"approved","reservation_date":"2019-12-03 10:31:13","uploaded":"2019-12-03 10:31:13","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.9.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194516.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]