[{"name":"S3-192541","title":"TR 33.848 Annex - Administration of Virtualisation","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25440,"status":"revised","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"S3-193088","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192541.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192542","title":"TR 33.848 Annex - Virtualisation Security Questions","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25450,"status":"revised","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"S3-193089","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192542.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192543","title":"TR 33.848 Clarifications for Section 4","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25460,"status":"noted","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192543.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192544","title":"TR 33.848 Security Threats and Requirements for Key Issue 1","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25470,"status":"revised","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"S3-193090","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192544.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192545","title":"TR 33.848 Security Requirements for Key Issue 3","source":"NCSC,Nokia","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25490,"status":"merged","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192545.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192546","title":"TR 33.848 Security Threats and Requirements for Key Issue 4","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25510,"status":"revised","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"S3-193093","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192546.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192547","title":"TR 33.848 Security Threats and Requirements for Key Issue 5","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25530,"status":"merged","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192547.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192548","title":"TR 33.848 Security Threats and Requirements for Key Issue 6","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25550,"status":"noted","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192548.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192549","title":"TR 33.848 Security Threats and Requirements for Key Issue 7","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25560,"status":"noted","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192549.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192550","title":"TR 33.848 Security Threats and Requirements for Key Issue 8","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25570,"status":"noted","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192550.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192551","title":"TR 33.848 Security Threats and Requirements for Key Issue 9","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25590,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192551.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192552","title":"TR 33.848 Security Threats and Requirements for Key Issue 10","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25600,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192552.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192553","title":"TR 33.848 Security Threats and Requirements for Key Issue 11","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25610,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192553.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192554","title":"TR 33.848 Security Threats and Requirements for Key Issue 12","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25620,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192554.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192555","title":"TR 33.848 Security Threats and Requirements for Key Issue 13","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":28900,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192555.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192556","title":"TR 33.848 Security Threats and Requirements for Key Issue 14","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":28920,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192556.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192557","title":"TR 33.848 Security Threats and Requirements for Key Issue 15","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":28990,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192557.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192558","title":"TR 33.848 Security Threats and Requirements for Key Issue 16","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29000,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192558.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192559","title":"TR 33.848 Security Requirements for Key Issue 17","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29010,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192559.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192560","title":"TR 33.848 Security Requirements for Key Issue 18","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29060,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192560.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192561","title":"TR 33.848 Security Requirements for Key Issue 19","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29100,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192561.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192562","title":"TR 33.848 Security Threats and Requirements for Key Issue 21","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29730,"status":"not treated","reservation_date":"2019-08-15 14:17:56","uploaded":"2019-08-19 09:19:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192562.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192890","title":"Threats and Requirements for Key Issue #2","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes some updates to the threats and the requirements for key issue #2 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25480,"status":"revised","reservation_date":"2019-08-19 12:41:50","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"S3-193091","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192890.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192891","title":"Threats and Requirements for Key Issue #3","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes some updates to the threats and the requirements for key issue #3 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25500,"status":"revised","reservation_date":"2019-08-19 12:43:59","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"S3-193092","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192891.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192892","title":"Threats and Requirements for Key Issue #4","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #4 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25520,"status":"merged","reservation_date":"2019-08-19 12:46:31","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192892.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192899","title":"Threats and Requirements for Key Issue #5","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #5 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25540,"status":"revised","reservation_date":"2019-08-19 12:48:12","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"S3-193094","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192899.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192900","title":"Threats and Requirements for Key Issue #8","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #8 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25580,"status":"not treated","reservation_date":"2019-08-19 12:50:35","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192900.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192901","title":"Threats and Requirements for Key Issue #13","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #13 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":28910,"status":"not treated","reservation_date":"2019-08-19 12:52:40","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192901.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192904","title":"Threats and Requirements for Key Issue #17","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #17 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29040,"status":"not treated","reservation_date":"2019-08-19 12:54:19","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192904.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192906","title":"Threats and Requirements for Key Issue #18","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #18 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29080,"status":"not treated","reservation_date":"2019-08-19 12:55:50","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192906.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192908","title":"Threats and Requirements for Key Issue #20","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #20 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29580,"status":"not treated","reservation_date":"2019-08-19 12:57:57","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192908.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192910","title":"Threats and Requirements for Key Issue #21","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the threats and the requirements for key issue #21 in TR 33.848.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29740,"status":"not treated","reservation_date":"2019-08-19 12:59:32","uploaded":"2019-08-19 13:21:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192910.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192958","title":"Categorization of the Key Issues","source":"Nokia, Nokia Shanghai Bell","contact":"Wei Lu","contact-id":79335,"tdoctype":"discussion","for":"Endorsement","abstract":"This papers intends to discuss how to categorize the current 21 key issues in TR 33.848 with a proposal.","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":29750,"status":"not treated","reservation_date":"2019-08-19 13:29:28","uploaded":"2019-08-20 07:47:10","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192958.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192973","title":"Virtualisation Study Key Issue 22 was S3-191857","source":"BT plc","contact":"Alex Leadbeater","contact-id":71428,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25410,"status":"not treated","reservation_date":"2019-08-20 09:18:28","uploaded":"2019-08-20 14:24:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192973.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192974","title":"Virtualisation Study Key Issue 23 was S3-191858","source":"BT plc","contact":"Alex Leadbeater","contact-id":71428,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25420,"status":"not treated","reservation_date":"2019-08-20 09:19:45","uploaded":"2019-08-20 14:24:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192974.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192975","title":"Virtualisation Study Key Issue 24 was S3-191859","source":"BT plc","contact":"Alex Leadbeater","contact-id":71428,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25430,"status":"not treated","reservation_date":"2019-08-20 09:21:57","uploaded":"2019-08-20 14:24:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192975.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193063","title":"Notes on the evening session on SIV","source":"BT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":306300,"status":"noted","reservation_date":"2019-08-28 14:13:22","uploaded":"2019-08-28 14:13:22","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193063.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193088","title":"TR 33.848 Annex - Administration of Virtualisation","source":"NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25441,"status":"noted","reservation_date":"2019-08-30 10:08:56","uploaded":"2019-08-30 10:08:56","revisionof":"S3-192541","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193088.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193089","title":"TR 33.848 Annex - Virtualisation Security Questions","source":"NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25451,"status":"noted","reservation_date":"2019-08-30 10:08:56","uploaded":"2019-08-30 10:08:56","revisionof":"S3-192542","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193089.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193090","title":"TR 33.848 Security Threats and Requirements for Key Issue 1","source":"NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25471,"status":"noted","reservation_date":"2019-08-30 10:08:56","uploaded":"2019-08-30 10:08:56","revisionof":"S3-192544","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193090.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193091","title":"Threats and Requirements for Key Issue #2","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25481,"status":"approved","reservation_date":"2019-09-02 14:28:59","uploaded":"2019-09-02 14:28:59","revisionof":"S3-192890","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193091.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193092","title":"Threats and Requirements for Key Issue #3","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25501,"status":"noted","reservation_date":"2019-09-02 14:30:53","uploaded":"2019-09-02 14:30:53","revisionof":"S3-192891","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193092.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193093","title":"TR 33.848 Security Threats and Requirements for Key Issue 5","source":"NCSC,Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25531,"status":"noted","reservation_date":"2019-08-30 10:08:56","uploaded":"2019-08-30 10:08:56","revisionof":"S3-192546","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193093.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193094","title":"Threats and Requirements for Key Issue #5","source":"Nokia, Nokia Shanghai Bell,NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":25541,"status":"noted","reservation_date":"2019-09-02 14:30:53","uploaded":"2019-09-02 14:30:53","revisionof":"S3-192899","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.2.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193094.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193185","title":"Draft TR 33.848","source":"BT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":69,"ainumber":"8.15","ainame":"Study on Security Impacts of Virtualisation (FS_SIV) (Rel-16)","tdoc_agenda_sort_order":318500,"status":"approved","reservation_date":"2019-08-30 14:05:11","uploaded":"2019-08-30 14:05:11","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.848,"crspecversion":"0.3.0","workitem":[{"winame":"FS_SIV"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193185.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]