[{"name":"S3-170057","title":"Updates to Solution #8.9 Security mechanism differentiation for network slices","source":"Huawei, Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":1320,"status":"revised","reservation_date":"2017-01-26 05:35:47","uploaded":"2017-01-27 06:39:09","revisionof":"","revisedto":"S3-170502","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170057.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170058","title":"Call flow for slice-specific NAS key derivation and distribution","source":"Huawei, Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":1310,"status":"revised","reservation_date":"2017-01-26 05:38:19","uploaded":"2017-01-27 06:39:09","revisionof":"","revisedto":"S3-170501","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170058.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170059","title":"Removal of ENs for KI 8 2","source":"Huawei, Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":590,"status":"approved","reservation_date":"2017-01-26 05:41:30","uploaded":"2017-01-26 07:45:22","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170059.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170060","title":"Removal of ENs in Security Area #8 (subclause 5.8.2)","source":"Huawei, Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":580,"status":"noted","reservation_date":"2017-01-26 05:45:00","uploaded":"2017-01-27 06:39:09","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170060.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170061","title":"Slice-specific NAS keys","source":"Huawei, Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":3210,"status":"available","reservation_date":"2017-01-26 05:48:49","uploaded":"2017-01-27 06:39:09","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170061.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170073","title":"Modification of solution 8.5","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"This pCR modifies the solution 8.5 for UE access network and slices, to make it clearer","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":3260,"status":"available","reservation_date":"2017-01-27 10:16:50","uploaded":"2017-02-01 03:49:06","revisionof":"","revisedto":"S3-170609","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170073.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170115","title":"Evaluation for Network Slicing Security Solution","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":1680,"status":"noted","reservation_date":"2017-01-29 04:52:26","uploaded":"2017-01-29 05:31:22","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170115.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170130","title":"Definition of network slice isolation","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"proposes a definition of network slice isolation","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":570,"status":"noted","reservation_date":"2017-01-29 21:09:01","uploaded":"2017-01-30 14:06:54","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170130.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170131","title":"Modification of key issue network slice isolation","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"Adds clarification and modification to key issue#8.1 on security isolation of network slices","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":610,"status":"revised","reservation_date":"2017-01-29 21:14:42","uploaded":"2017-01-30 14:06:54","revisionof":"","revisedto":"S3-170500","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170131.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170132","title":"Addressing ENs in Slicing solution 8.6","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"addresses two ENs in solution 8.6","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":2670,"status":"available","reservation_date":"2017-01-29 21:18:24","uploaded":"2017-01-30 14:06:54","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170132.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170168","title":"pCR toTR 33.899_Removal of Editor\u2019s Notes of Solution 8.1","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR clarifies the editor\u2019s notes of Solution #8.1: Security isolation of network slices, Security mechanism differentiation of TR 33.899","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":2820,"status":"available","reservation_date":"2017-01-30 08:55:25","uploaded":"2017-01-30 13:06:09","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170168.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170267","title":"FS_NSA: slice isolation","source":"Gemalto N.V.","contact":"Mireille Pauliac","contact-id":23516,"tdoctype":"pCR","for":"Approval","abstract":"Requirements for slice isolation","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":730,"status":"noted","reservation_date":"2017-01-30 13:29:49","uploaded":"2017-01-30 14:26:50","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170267.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170282","title":"New Potential Security Requirements for Key Issue #8.6","source":"Deutsche Telekom AG","contact":"Sven Lachmund","contact-id":62366,"tdoctype":"pCR","for":"Approval","abstract":"New proposed security requirements for FS_NSA Key Issue #8.6 on Network Slising, third party API access","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":1150,"status":"withdrawn","reservation_date":"2017-01-30 13:51:31","uploaded":"2017-01-30 13:59:20","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170282.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170321","title":"FS_NSA: virtualization security requirements","source":"Gemalto N.V.","contact":"Mireille Pauliac","contact-id":23516,"tdoctype":"pCR","for":"Approval","abstract":"Addition of security requirements for virtualization","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":1300,"status":"noted","reservation_date":"2017-01-30 14:28:42","uploaded":"2017-01-30 14:56:22","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170321.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170326","title":"Clarification of key issue #8.1 Network slice isolation","source":"LG Electronics","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":600,"status":"merged","reservation_date":"2017-01-30 14:50:54","uploaded":"2017-01-30 14:58:37","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170326.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170500","title":"Modification of key issue network slice isolation","source":"Nokia Germany","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":611,"status":"approved","reservation_date":"2017-02-14 16:24:19","uploaded":"2017-02-20 10:07:25","revisionof":"S3-170131","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170500.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170501","title":"Call flow for slice-specific NAS key derivation and distribution","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":1311,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170058","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170501.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170502","title":"Updates to Solution #8.9 Security mechanism differentiation for network slices","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":54,"ainumber":"8.4.8","ainame":"Network slicing security","tdoc_agenda_sort_order":1321,"status":"approved","reservation_date":"2017-02-13 15:45:14","uploaded":"2017-02-13 15:45:14","revisionof":"S3-170057","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.6.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170502.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]