[{"name":"S3-171769","title":"Questions and interim agreements for KI #8.3-Slice Authentication","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17690,"status":"noted","reservation_date":"2017-07-28 09:15:28","uploaded":"2017-07-30 03:15:01","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.899,"crspecversion":"1.2.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171769.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171770","title":"Questions and interim agreements for KI #8.3-NSSAI Security","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17700,"status":"noted","reservation_date":"2017-07-28 09:18:28","uploaded":"2017-07-30 03:15:01","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.899,"crspecversion":"1.2.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171770.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171771","title":"Questions and interim agreements for KI #8.2-Security Differentiation","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17710,"status":"approved","reservation_date":"2017-07-28 09:20:18","uploaded":"2017-07-30 03:15:01","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.899,"crspecversion":"1.2.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171771.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171772","title":"Evaluation for Network Slicing Security Solution #8.14","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17720,"status":"noted","reservation_date":"2017-07-28 09:21:58","uploaded":"2017-07-30 03:15:01","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.899,"crspecversion":"1.2.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171772.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171808","title":"Discussion paper on slice authentication","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":18080,"status":"noted","reservation_date":"2017-07-30 16:55:25","uploaded":"2017-07-31 03:16:40","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171808.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171809","title":"Interim agreements for KI8.3","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":18090,"status":"noted","reservation_date":"2017-07-30 16:55:25","uploaded":"2017-07-31 03:16:40","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.899,"crspecversion":"1.2.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171809.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171810","title":"Interim agreement for KI8.2","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":18100,"status":"noted","reservation_date":"2017-07-30 16:55:25","uploaded":"2017-07-31 03:16:40","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.899,"crspecversion":"1.2.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171810.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-171916","title":"Questions and interim agreements for KI #8.3","source":"China Mobile, China Unicom","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.3.8","ainame":"Network slicing security","tdoc_agenda_sort_order":19160,"status":"noted","reservation_date":"2017-07-31 10:35:32","uploaded":"2017-07-31 11:07:38","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.899,"crspecversion":"1.2.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88_Dali\/Docs\/S3-171916.zip","group":"S3","meeting":"S3-88","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]