[{"name":"S3-192665","title":"IAB-node: terminology change","source":"THALES, ORANGE","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"pCR","for":"Approval","abstract":"IAB-node: terminology change","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":26650,"status":"revised","reservation_date":"2019-08-19 08:49:43","uploaded":"2019-08-19 09:09:44","revisionof":"","revisedto":"S3-193148","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192665.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192825","title":"IAB: Assumptions related to key hierarchy in IAB architecture in 5G","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":28250,"status":"revised","reservation_date":"2019-08-19 10:27:21","uploaded":"2019-08-19 13:27:27","revisionof":"","revisedto":"S3-193150","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192825.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192826","title":"KI #2.3: security threats and potential requirements","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29170,"status":"revised","reservation_date":"2019-08-19 10:27:21","uploaded":"2019-08-19 13:27:27","revisionof":"","revisedto":"S3-193153","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192826.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192827","title":"New solution: secure recovery from backhaul-RLF","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29690,"status":"noted","reservation_date":"2019-08-19 10:27:21","uploaded":"2019-08-19 13:27:27","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192827.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192911","title":"Requirement on authorization of IAB Node","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":28270,"status":"revised","reservation_date":"2019-08-19 12:59:48","uploaded":"2019-08-19 13:52:59","revisionof":"","revisedto":"S3-193151","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192911.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192912","title":"Solution for authorization of IAB Node","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29110,"status":"revised","reservation_date":"2019-08-19 13:01:07","uploaded":"2019-08-19 13:52:59","revisionof":"","revisedto":"S3-193152","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192912.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192914","title":"Evaluation of solution #2.1","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29120,"status":"noted","reservation_date":"2019-08-19 13:02:22","uploaded":"2019-08-19 13:52:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192914.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192915","title":"Evaluation of solution #3.1","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29140,"status":"noted","reservation_date":"2019-08-19 13:03:43","uploaded":"2019-08-19 13:52:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192915.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192917","title":"Conclusion to Key Issue#2.1 on authentication and authorization of the IAB Node","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29150,"status":"noted","reservation_date":"2019-08-19 13:05:13","uploaded":"2019-08-19 13:53:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_LISE"},{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192917.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-192969","title":"Key issue on removal of USIM card in IAB node","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":28260,"status":"noted","reservation_date":"2019-08-20 02:41:49","uploaded":"2019-08-20 03:03:18","revisionof":"S3-192749","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-192969.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193148","title":"IAB-node: terminology change","source":"THALES, ORANGE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":26651,"status":"approved","reservation_date":"2019-08-30 15:51:07","uploaded":"2019-08-30 15:51:07","revisionof":"S3-192665","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193148.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193149","title":"Draft TR 33.824","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":314900,"status":"approved","reservation_date":"2019-09-05 16:41:12","uploaded":"2019-09-05 16:41:12","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.4.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193149.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193150","title":"IAB: Assumptions related to key hierarchy in IAB architecture in 5G","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":28251,"status":"approved","reservation_date":"2019-08-30 08:47:05","uploaded":"2019-08-30 08:47:05","revisionof":"S3-192825","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193150.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193151","title":"Requirement on authorization of IAB Node","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":28271,"status":"approved","reservation_date":"2019-08-30 15:51:07","uploaded":"2019-08-30 15:51:07","revisionof":"S3-192911","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193151.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193152","title":"Solution for authorization of IAB Node","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29111,"status":"approved","reservation_date":"2019-08-30 10:08:56","uploaded":"2019-08-30 10:08:56","revisionof":"S3-192912","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193152.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193153","title":"KI #2.3: security threats and potential requirements","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":71,"ainumber":"8.17","ainame":"Study on Security for NR Integrated Access and Backhaul (FS_NR_IAB_Sec)","tdoc_agenda_sort_order":29171,"status":"approved","reservation_date":"2019-08-30 10:08:56","uploaded":"2019-08-30 10:08:56","revisionof":"S3-192826","revisedto":"","release":"Rel-16","crspec":33.824,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NR_IAB_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_96_Wroclaw\/Docs\/S3-193153.zip","group":"S3","meeting":"S3-96","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]