[{"name":"S3-190045","title":"LS On Slice-Specific Secondary Authentication","source":"S2-1813359","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":450,"status":"postponed","reservation_date":"2019-01-16 13:59:53","uploaded":"2019-01-18 13:22:03","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190045.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190132","title":"Discussion on SA2 LS on Slice Specific Authentication S2-1813359","source":"Nokia, Nokia Shanghai-Bell","contact":"Suresh Nair","contact-id":70166,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":1320,"status":"noted","reservation_date":"2019-01-21 05:41:19","uploaded":"2019-01-21 09:27:54","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190132.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190133","title":"Solution for Slice Specific secondary authentication","source":"Nokia, Nokia Shangahi Bell","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":1330,"status":"revised","reservation_date":"2019-01-21 05:45:09","uploaded":"2019-01-21 09:27:54","revisionof":"","revisedto":"S3-190533","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190133.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190156","title":"Solution on registration for mutual exclusive slices","source":"ZTE Corporation","contact":"Zhenhua Xie","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2020,"status":"noted","reservation_date":"2019-01-21 06:38:11","uploaded":"2019-01-21 09:51:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190156.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190202","title":"A solution to slice authentication","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":1560,"status":"revised","reservation_date":"2019-01-21 07:44:57","uploaded":"2019-01-21 13:47:50","revisionof":"","revisedto":"S3-190534","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190202.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190203","title":"A new KI on NSSAI protection","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2720,"status":"revised","reservation_date":"2019-01-21 07:44:57","uploaded":"2019-01-21 13:47:50","revisionof":"","revisedto":"S3-190477","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190203.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190204","title":"Solutions to AMF key separation","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2050,"status":"noted","reservation_date":"2019-01-21 07:44:57","uploaded":"2019-01-21 13:47:50","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190204.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190205","title":"A solution to security features for NSaaS","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2060,"status":"revised","reservation_date":"2019-01-21 07:44:57","uploaded":"2019-01-21 13:47:50","revisionof":"","revisedto":"S3-190537","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190205.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190206","title":"Security threats and requirement for KI #4","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2031,"status":"revised","reservation_date":"2019-01-21 07:44:57","uploaded":"2019-01-21 13:47:50","revisionof":"","revisedto":"S3-190535","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190206.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190230","title":"A key issue: Slice-specific Security in roaming","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2300,"status":"noted","reservation_date":"2019-01-21 09:47:06","uploaded":"2019-01-21 09:57:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190230.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190237","title":"New KI: SUPI privacy protection across different security domains","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2370,"status":"noted","reservation_date":"2019-01-21 09:57:16","uploaded":"2019-01-21 10:54:46","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190237.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190239","title":"New KI: Access token handling between network slices","source":"Huawei Technologies Sweden AB","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":3180,"status":"revised","reservation_date":"2019-01-21 09:59:44","uploaded":"2019-01-21 10:54:46","revisionof":"","revisedto":"S3-190318","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190239.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190272","title":"Solution for key separation based on slice authentication keys","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2030,"status":"noted","reservation_date":"2019-01-21 10:10:37","uploaded":"2019-01-21 14:37:03","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190272.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190318","title":"New KI: Access token handling between network slices","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2390,"status":"revised","reservation_date":"2019-01-21 10:58:31","uploaded":"2019-01-21 11:01:16","revisionof":"S3-190239","revisedto":"S3-190538","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190318.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190477","title":"A new KI on NSSAI protection","source":"Huawei, HiSilicon,NEC,Interdigital","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2040,"status":"revised","reservation_date":"2019-02-01 14:43:43","uploaded":"2019-02-01 14:43:43","revisionof":"S3-190203","revisedto":"S3-190536","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190477.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190533","title":"Solution for Slice Specific secondary authentication","source":"Nokia, Nokia Shangahi Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":1331,"status":"approved","reservation_date":"2019-02-01 15:06:56","uploaded":"2019-02-01 15:06:56","revisionof":"S3-190133","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190533.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190534","title":"A solution to slice authentication","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":1561,"status":"approved","reservation_date":"2019-02-01 14:43:43","uploaded":"2019-02-01 14:43:43","revisionof":"S3-190202","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190534.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190535","title":"Security threats and requirement for KI #4","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2032,"status":"approved","reservation_date":"2019-02-01 14:43:43","uploaded":"2019-02-01 14:43:43","revisionof":"S3-190206","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190535.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190536","title":"A new KI on NSSAI protection","source":"Huawei, HiSilicon,NEC,Interdigital","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2041,"status":"approved","reservation_date":"2019-02-01 14:43:43","uploaded":"2019-02-01 14:43:43","revisionof":"S3-190477","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190536.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190537","title":"A solution to security features for NSaaS","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2061,"status":"approved","reservation_date":"2019-02-01 14:43:43","uploaded":"2019-02-01 14:43:43","revisionof":"S3-190205","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190537.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190538","title":"New KI: Access token handling between network slices","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":2391,"status":"approved","reservation_date":"2019-02-01 10:33:52","uploaded":"2019-02-01 10:33:52","revisionof":"S3-190318","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190538.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190539","title":"Draft TR 33.813","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":74,"ainumber":"8.11","ainame":"Study on Security aspects of Enhancement of Network Slicing","tdoc_agenda_sort_order":53900,"status":"approved","reservation_date":"2019-02-01 15:02:38","uploaded":"2019-02-01 15:02:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.813,"crspecversion":"0.2.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190539.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]