[{"name":"S3-170051","title":"Open Questions Related to Key Issues 1.6 and 1.7","source":"Huawei & Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2830,"status":"revised","reservation_date":"2017-01-25 08:17:52","uploaded":"2017-01-29 14:45:39","revisionof":"","revisedto":"S3-170396","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170051.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170088","title":"TR 33.899: Solution for Key Issue 1.15: User plane security termination point","source":"KPN, Deutsche Telekom, Juniper Networks, BT","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for KI1.15: flexible user plane security termination point.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2970,"status":"revised","reservation_date":"2017-01-27 16:37:55","uploaded":"2017-01-27 16:47:55","revisionof":"","revisedto":"S3-170339","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170088.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170089","title":"TR 33.899: Questions and Interim Agreements on Key Issue 1.15: User plane security termination point","source":"KPN, Deutsche Telekom, Juniper Networks, BT","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes two questions and interim agreements for KI1.15, namely to introduce a UP security termination function with a flexible location.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":3370,"status":"revised","reservation_date":"2017-01-27 16:37:55","uploaded":"2017-01-27 16:47:55","revisionof":"","revisedto":"S3-170337","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170089.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170090","title":"TR 33.899: Discussion on KI 1.4, UP confidentiality between UE and Network","source":"KPN","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Discussion","abstract":"This contribution analyses KI1.4 on user plane confidentiality protection between the UE and the network.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":880,"status":"noted","reservation_date":"2017-01-27 16:37:55","uploaded":"2017-01-30 08:20:01","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170090.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170091","title":"TR 33.899: Removal of EN in KI 1.4, UP confidentiality between UE and Network","source":"KPN","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds questions related to KI1.4 based on the analysis in a companion contribution","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":890,"status":"revised","reservation_date":"2017-01-27 16:37:55","uploaded":"2017-01-30 08:20:01","revisionof":"","revisedto":"S3-170361","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170091.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170092","title":"TR 33.899: Adding Questions related to KI 1.4, UP confidentiality between UE and Network","source":"KPN","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Approval","abstract":"This contribution removes the Editor's Notes from KI1.4 based on the analysis in a companion contribution","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":900,"status":"revised","reservation_date":"2017-01-27 16:37:55","uploaded":"2017-01-30 08:20:01","revisionof":"","revisedto":"S3-170362","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170092.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170093","title":"TR 33.899: Adding Interim agreements related to KI 1.4, UP confidentiality between UE and Network","source":"KPN","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds interim agreements related to KI1.4 based on the analysis in a companion contribution","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":910,"status":"revised","reservation_date":"2017-01-27 16:37:55","uploaded":"2017-01-30 08:20:01","revisionof":"","revisedto":"S3-170363","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170093.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170119","title":"Modify KI1.11 to add service based architecture related requirement","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1610,"status":"approved","reservation_date":"2017-01-29 13:36:31","uploaded":"2017-01-29 14:45:39","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170119.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170124","title":"Protection of downlink NAS signallings before security activation","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2710,"status":"revised","reservation_date":"2017-01-29 14:23:15","uploaded":"2017-01-29 14:45:39","revisionof":"","revisedto":"S3-170394","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170124.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170125","title":"A solution for KDF negotiation","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1650,"status":"revised","reservation_date":"2017-01-29 14:26:39","uploaded":"2017-01-29 14:45:39","revisionof":"","revisedto":"S3-170382","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170125.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170126","title":"Clarification for flexible security policies negotiation in control plane","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1630,"status":"revised","reservation_date":"2017-01-29 14:32:22","uploaded":"2017-01-30 13:27:05","revisionof":"","revisedto":"S3-170381","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170126.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170133","title":"Consolidate untrusted n3gpp access solutions","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"Currently the n3pp access solutions in 3 different security areas, moves in to one area in architecture for easy reading and comparison.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1340,"status":"revised","reservation_date":"2017-01-29 21:23:05","uploaded":"2017-01-30 14:06:54","revisionof":"","revisedto":"S3-170377","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170133.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170134","title":"Comparison of 5G untrusted  n3gpp access solutions","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"Provides a comparison of the three untrusted n3gpp access solutions in the TR.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1370,"status":"revised","reservation_date":"2017-01-29 21:27:39","uploaded":"2017-01-30 14:06:54","revisionof":"","revisedto":"S3-170378","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170134.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170137","title":"Analysis on the use of IPSec transport for control and user plane of non 3GPP access","source":"BROADCOM CORPORATION","contact":"Florin Baboescu","contact-id":45772,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1570,"status":"endorsed","reservation_date":"2017-01-30 03:44:19","uploaded":"2017-01-30 19:46:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170137.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170157","title":"pCR to TR 33.899_Update solution #1.8 key hierarchy","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR updates solution #1.8 on key hierarchy in security area \u201cArchitectural aspects of NextGen security\u201c","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2730,"status":"revised","reservation_date":"2017-01-30 08:41:30","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"S3-170395","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170157.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170158","title":"pCR to TR 33.899: Authentication and Key Agreement for untrusted non-3GPP access","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes a proposal for Authentication and Key Agreement procedure between the UE and the NextGen core network via for non-3GPP access.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1580,"status":"approved","reservation_date":"2017-01-30 08:41:46","uploaded":"2017-01-30 08:44:15","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170158.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170159","title":"pCR to TR 33.899_Registration procedure for NextGen networks","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the registration procedure to   Security Area #1 \u201cArchitectural aspects of NextGen security","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1860,"status":"revised","reservation_date":"2017-01-30 08:42:55","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"S3-170383","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170159.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170160","title":"pCR to TR 33.899_Security procedure for NextGen networks","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the Security mode procedure as a solution to Security Area #1 \u201cArchitectural aspects of NextGen security area\u201c","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2150,"status":"revised","reservation_date":"2017-01-30 08:44:45","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"S3-170384","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170160.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170161","title":"pCR to TR 33.899_Security procedure for NextGen networks (with NAS_SM security procedure)","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes the Security mode procedure as a solution to Security Area #1 \u201cArchitectural aspects of NextGen security area including NAS_SM security","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2330,"status":"revised","reservation_date":"2017-01-30 08:47:07","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"S3-170385","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170161.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170163","title":"pCR to TR 33.899_Consolidated Key Hierarchy for NextGen Network","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes two consolidated key hierarchy options for NextGen networks.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2400,"status":"revised","reservation_date":"2017-01-30 08:48:45","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"S3-170386","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170163.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170165","title":"pCR to TR 33.899_Questionnaire on Key Issue # 1.7 to Annex","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes questions that need to be addressed for Key Issue #1.7 Key Hierarchy along with their interim agreements.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2890,"status":"noted","reservation_date":"2017-01-30 08:50:40","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170165.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170186","title":"pCR to 33.899 - addition of solution detailing enhanced USIM features for 5G","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2410,"status":"revised","reservation_date":"2017-01-30 09:54:42","uploaded":"2017-01-30 14:22:30","revisionof":"","revisedto":"S3-170387","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170186.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170215","title":"TR 33.899: Questions and Interim Agreements on Key Issue 1.3: User plane integrity between UE and network","source":"BT Group Plc","contact":"Colin Blanchard","contact-id":71421,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes two questions and one interim agreement for KI1.3 on the support of User plane integrity between UE and network and how should use of the feature be negotiated between UE and network","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":510,"status":"approved","reservation_date":"2017-01-30 11:32:32","uploaded":"2017-01-30 13:30:00","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170215.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170233","title":"Comments to \u201cSolution for User plane security termination point\u201d","source":"TELECOM ITALIA S.p.A.","contact":"Mauro Castagno","contact-id":17367,"tdoctype":"discussion","for":"Decision","abstract":"This contribution comments the solution for KI #1.15: \u201cflexible user plane security termination point\u201d proposed within the S3-170088.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":930,"status":"approved","reservation_date":"2017-01-30 11:56:27","uploaded":"2017-01-30 12:13:26","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170233.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170240","title":"Comments to \u201cQuestions and Interim Agreements on Key Issue #1.15: User plane security termination point, clause 5.1.3.15\u201d","source":"TELECOM ITALIA S.p.A.","contact":"Mauro Castagno","contact-id":17367,"tdoctype":"pCR","for":"Approval","abstract":"This contribution comments the two questions and interim agreements for KI#1.15 proposed by S3-170089.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1330,"status":"noted","reservation_date":"2017-01-30 12:01:19","uploaded":"2017-01-30 12:13:26","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170240.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170245","title":"pCR on solution for key issue 1.9 (AN-CN Control Plane)","source":"Nokia, Ericsson","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2450,"status":"revised","reservation_date":"2017-01-30 12:13:57","uploaded":"2017-01-30 14:37:23","revisionof":"","revisedto":"S3-170388","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170245.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170246","title":"pCR on solution for key issue 1.10 (AN-CN User Plane)","source":"Nokia, Ericsson","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2460,"status":"revised","reservation_date":"2017-01-30 12:18:03","uploaded":"2017-01-30 14:38:12","revisionof":"","revisedto":"S3-170389","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170246.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170248","title":"pCR on question for key issue 1.9 \u2018Security features for AN-CN Control Plane\u2019","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2900,"status":"revised","reservation_date":"2017-01-30 12:21:04","uploaded":"2017-01-30 14:38:12","revisionof":"","revisedto":"S3-170397","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170248.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170252","title":"pCR on question for key issue 1.10 \u2018Security features for AN-CN User Plane\u2019","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2920,"status":"revised","reservation_date":"2017-01-30 12:27:16","uploaded":"2017-01-30 14:38:12","revisionof":"","revisedto":"S3-170398","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170252.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170265","title":"Discussion on the termination point for user plane security","source":"Ericsson LM, Nokia","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1190,"status":"noted","reservation_date":"2017-01-30 13:27:15","uploaded":"2017-01-30 14:53:23","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170265.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170269","title":"pCR on terminating user plane security in the AN","source":"Ericsson LM, Nokia","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1240,"status":"approved","reservation_date":"2017-01-30 13:31:40","uploaded":"2017-01-30 14:53:23","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170269.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170273","title":"Discussion on the security anchor function","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2480,"status":"noted","reservation_date":"2017-01-30 13:39:16","uploaded":"2017-01-30 14:53:23","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170273.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170274","title":"Security context management during AMF change","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2520,"status":"approved","reservation_date":"2017-01-30 13:41:43","uploaded":"2017-01-30 14:53:23","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170274.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170277","title":"Solution for the security anchor function based on a primary AMF","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2650,"status":"revised","reservation_date":"2017-01-30 13:45:52","uploaded":"2017-01-30 14:53:23","revisionof":"","revisedto":"S3-170391","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170277.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170283","title":"pCR on untrusted access to the 5G core","source":"Nokia, Qualcomm Incorporated","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1590,"status":"revised","reservation_date":"2017-01-30 13:52:52","uploaded":"2017-01-30 14:41:20","revisionof":"","revisedto":"S3-170379","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170283.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170289","title":"Proposals for supported features in Phase 1 of 5G security","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2770,"status":"noted","reservation_date":"2017-01-30 14:03:31","uploaded":"2017-01-30 14:40:15","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170289.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170290","title":"A solution for securing the initial NAS messages","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2690,"status":"revised","reservation_date":"2017-01-30 14:03:31","uploaded":"2017-01-30 14:40:15","revisionof":"","revisedto":"S3-170393","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170290.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170292","title":"Adding a questions relating to a security anchor and key issue #1.2 to the TR","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2740,"status":"approved","reservation_date":"2017-01-30 14:03:31","uploaded":"2017-01-30 14:40:15","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170292.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170296","title":"Protocol stack options for the user-plane security terminating at a user-plane function","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1250,"status":"approved","reservation_date":"2017-01-30 14:03:31","uploaded":"2017-01-30 14:56:35","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170296.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170297","title":"pCR to update solution #1.6 to include the untrusted non-3GPP access for the roaming scenario","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1600,"status":"revised","reservation_date":"2017-01-30 14:03:31","uploaded":"2017-01-30 14:56:35","revisionof":"","revisedto":"S3-170380","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170297.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170337","title":"TR 33.899: Questions and Interim Agreements on Key Issue 1.15: User plane security termination point","source":"KPN, Deutsche Telekom, Juniper Networks, BT, NTT DoCoMo","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes two questions and interim agreements for KI1.15, namely to introduce a UP security termination function with a flexible location.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1260,"status":"revised","reservation_date":"2017-01-30 15:01:39","uploaded":"2017-01-30 15:32:19","revisionof":"S3-170089","revisedto":"S3-170428","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170337.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170338","title":"Questions on Key Issue #1.8: UEs with asymmetric keys","source":"NTT DOCOMO INC.","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"pCR","for":"","abstract":"This contribution proposes two questions and an interim agreement for KI1.8, namely to decide on usage of network public key in phase 1 and postpone a decision on UE private key to phase 2.","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":3400,"status":"revised","reservation_date":"2017-01-30 15:08:50","uploaded":"2017-01-30 15:18:23","revisionof":"","revisedto":"S3-170340","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170338.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170339","title":"TR 33.899: Solution for Key Issue 1.15: User plane security termination point","source":"KPN, Deutsche Telekom, Juniper Networks, BT, NTT DoCoMo","contact":"Sander De Kievit","contact-id":47139,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for KI1.15: flexible user plane security termination point. Revision adds NTT DoCoMo as a cosigner","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":920,"status":"approved","reservation_date":"2017-01-30 15:29:15","uploaded":"2017-01-30 15:32:19","revisionof":"S3-170088","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170339.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170340","title":"Questions on Key Issue #1.8: UEs with asymmetric keys","source":"NTT DOCOMO INC.","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"pCR","for":"","abstract":"This contribution proposes two questions and an interim agreement for KI1.8, namely to decide on usage of network public key in phase 1 and postpone a decision on UE private key to phase 2.\nThe difference to S3-170338 is \nX.1.#KI8#.y.1 Description of Ques","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2960,"status":"revised","reservation_date":"2017-01-30 17:08:18","uploaded":"2017-01-30 17:11:21","revisionof":"S3-170338","revisedto":"S3-170399","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170340.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170361","title":"TR 33.899: Removal of EN in KI 1.4, UP confidentiality between UE and Network","source":"KPN","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":891,"status":"approved","reservation_date":"2017-02-09 11:08:36","uploaded":"2017-02-09 11:08:36","revisionof":"S3-170091","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170361.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170362","title":"TR 33.899: Adding Questions related to KI 1.4, UP confidentiality between UE and Network","source":"KPN","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":901,"status":"approved","reservation_date":"2017-02-09 11:08:36","uploaded":"2017-02-09 11:08:36","revisionof":"S3-170092","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170362.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170363","title":"TR 33.899: Adding Interim agreements related to KI 1.4, UP confidentiality between UE and Network","source":"KPN","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":911,"status":"approved","reservation_date":"2017-02-07 15:30:10","uploaded":"2017-02-07 15:30:10","revisionof":"S3-170093","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170363.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170364","title":"Positions on UP security termination and slicing concepts","source":"Nokia, Ericsson, Samsung, Intel,Broadcom","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":36400,"status":"noted","reservation_date":"2017-02-06 14:38:57","uploaded":"2017-02-06 14:38:57","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170364.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170377","title":"Consolidate untrusted n3gpp access solutions","source":"Nokia Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1341,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170133","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170377.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170378","title":"Comparison of 5G untrusted  n3gpp access solutions","source":"Nokia Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1371,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170134","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170378.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170379","title":"pCR on untrusted access to the 5G core","source":"Nokia, Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1591,"status":"approved","reservation_date":"2017-02-06 16:16:56","uploaded":"2017-02-06 16:16:56","revisionof":"S3-170283","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170379.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170380","title":"pCR to update solution #1.6 to include the untrusted non-3GPP access for the roaming scenario","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1601,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170297","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170380.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170381","title":"Clarification for flexible security policies negotiation in control plane","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1631,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170126","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170381.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170382","title":"A solution for KDF negotiation","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1651,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170125","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170382.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170383","title":"pCR to TR 33.899_Registration procedure for NextGen networks","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1861,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170159","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170383.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170384","title":"pCR to TR 33.899_Security procedure for NextGen networks","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2151,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170160","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170384.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170385","title":"pCR to TR 33.899_Security procedure for NextGen networks (with NAS_SM security procedure)","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2331,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170161","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170385.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170386","title":"pCR to TR 33.899_Consolidated Key Hierarchy for NextGen Network","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2401,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170163","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170386.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170387","title":"pCR to 33.899 - addition of solution detailing enhanced USIM features for 5G","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2411,"status":"approved","reservation_date":"2017-02-06 19:01:44","uploaded":"2017-02-06 19:01:44","revisionof":"S3-170186","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170387.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170388","title":"pCR on solution for key issue 1.9 (AN-CN Control Plane)","source":"Nokia, Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2451,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170245","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170388.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170389","title":"pCR on solution for key issue 1.10 (AN-CN User Plane)","source":"Nokia, Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2461,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170246","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170389.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170391","title":"Solution for the security anchor function based on a primary AMF","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2651,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170277","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170391.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170393","title":"A solution for securing the initial NAS messages","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2691,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170290","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170393.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170394","title":"Protection of downlink NAS signallings before security activation","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2711,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170124","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170394.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170395","title":"pCR to TR 33.899_Update solution #1.8 key hierarchy","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2731,"status":"approved","reservation_date":"2017-02-08 16:42:35","uploaded":"2017-02-08 16:42:35","revisionof":"S3-170157","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170395.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170396","title":"Open Questions Related to Key Issues 1.6 and 1.7","source":"Huawei & Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2831,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170051","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170396.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170397","title":"pCR on question for key issue 1.9 \u2018Security features for AN-CN Control Plane\u2019","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2901,"status":"approved","reservation_date":"2017-02-08 08:32:06","uploaded":"2017-02-08 08:32:06","revisionof":"S3-170248","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170397.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170398","title":"pCR on question for key issue 1.10 \u2018Security features for AN-CN User Plane\u2019","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2921,"status":"approved","reservation_date":"2017-02-08 08:32:06","uploaded":"2017-02-08 08:32:06","revisionof":"S3-170252","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170398.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170399","title":"Questions on Key Issue #1.8: UEs with asymmetric keys","source":"NTT DOCOMO INC.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":2961,"status":"approved","reservation_date":"2017-02-09 11:08:37","uploaded":"2017-02-09 11:08:37","revisionof":"S3-170340","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170399.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170428","title":"TR 33.899: Questions and Interim Agreements on Key Issue 1.15: User plane security termination point","source":"KPN, Deutsche Telekom, Juniper Networks, BT, NTT DoCoMo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":1261,"status":"approved","reservation_date":"2017-02-09 11:08:37","uploaded":"2017-02-09 11:08:37","revisionof":"S3-170337","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170428.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170465","title":"Ls on Ipsec use for non 3GPP access","source":"Broadcom","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":47,"ainumber":"8.4.1","ainame":"Security architecture","tdoc_agenda_sort_order":46500,"status":"approved","reservation_date":"2017-02-10 11:40:15","uploaded":"2017-02-10 11:40:15","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2","Cc":"RAN3","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170465.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]