[{"name":"S3-160924","title":"pCR to 33.899 - update of the Introduction section","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9260,"status":"revised","reservation_date":"2016-07-06 15:20:43","uploaded":"2016-07-15 08:57:08","revisionof":"","revisedto":"S3-161184","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160924.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160925","title":"pCR to TR 33.899 - update of section 4.2 High level security requirements","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9270,"status":"revised","reservation_date":"2016-07-06 15:22:43","uploaded":"2016-07-18 13:41:32","revisionof":"","revisedto":"S3-161185","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160925.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160926","title":"pCR to 33.899 - update of 5.1.2 Security assumptions (Architectural aspects of 5G security)","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9450,"status":"withdrawn","reservation_date":"2016-07-06 15:25:20","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160927","title":"pCR to 33.899 - Reword section 5.2.3.2.2 and 5.2.3.3 as per editors notes","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9600,"status":"withdrawn","reservation_date":"2016-07-06 15:28:23","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160939","title":"Key issue #2.4: Device identifier authentication","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9650,"status":"revised","reservation_date":"2016-07-11 14:44:35","uploaded":"2016-07-17 14:01:14","revisionof":"","revisedto":"S3-161202","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160939.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160940","title":"Key issue #5.1: Secure storage and processing of credentials and identities","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key issue #5.1: Secure storage and processing of credentials and identities.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10680,"status":"postponed","reservation_date":"2016-07-11 18:00:11","uploaded":"2016-07-17 14:01:14","revisionof":"","revisedto":"S3-161305","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160940.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160941","title":"Key Issue #11.3: User control of security","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key Issue #11.3: User control of security","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11260,"status":"postponed","reservation_date":"2016-07-12 14:59:26","uploaded":"2016-07-17 14:01:14","revisionof":"","revisedto":"S3-161303","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160941.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160944","title":"Key Issue #11.4: On demand security framework","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key Issue #11.4: On demand security framework","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11270,"status":"postponed","reservation_date":"2016-07-12 17:01:12","uploaded":"2016-07-17 14:01:14","revisionof":"","revisedto":"S3-161302","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160944.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160945","title":"pCR to TR 33.899: Radio interface user plane integrity protection, Solution details","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"This contribution addresses an editor\u2019s note that appears in two places in the report, arguing that it can simply be removed.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9590,"status":"approved","reservation_date":"2016-07-13 09:03:34","uploaded":"2016-07-13 09:07:48","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160945.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160946","title":"pCR to TR 33.899: Authentication section introduction","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"Some editor\u2019s notes are addressed, and some typos corrected, in the introduction to the \u201cAuthentication\u201d security area.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9610,"status":"revised","reservation_date":"2016-07-13 09:13:38","uploaded":"2016-07-13 09:29:00","revisionof":"","revisedto":"S3-161198","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160946.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160947","title":"pCR to TR 33.899: Radio interface key exchange protocol","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"Some details are clarified, errors corrected and editor\u2019s notes addressed in \u201cSolution #2.2: Including a key exchange protocol into the derivation of the radio interface session keys\u201d.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10020,"status":"revised","reservation_date":"2016-07-13 09:17:00","uploaded":"2016-07-18 12:52:26","revisionof":"","revisedto":"S3-161268","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160947.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160948","title":"pCR to TR 33.899: interception of radio interface keys sent between operator entities","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"Key issue #3.1 needs its \u201cPotential security requirements\u201d section to be rewritten in requirements form.  And the key issue title has been mis-edited, and needs correction.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10040,"status":"revised","reservation_date":"2016-07-13 09:27:36","uploaded":"2016-07-13 09:29:00","revisionof":"","revisedto":"S3-161270","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160948.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160949","title":"pCR to TR 33.899: UE action if network does not update session keys","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"Key issue #3.2 is about the UE being able to trigger (or at least request) an update of the radio interface session keys.  An open editor\u2019s note is about what action the UE takes if the network does not update keys when the UE asks it to.  This contributi","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10050,"status":"revised","reservation_date":"2016-07-13 09:33:39","uploaded":"2016-07-13 10:10:25","revisionof":"","revisedto":"S3-161271","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160949.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160950","title":"Key Issue #8.1: Security isolation of network slices","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key Issue #8.1: Security isolation of network slices","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10900,"status":"merged","reservation_date":"2016-07-13 11:49:47","uploaded":"2016-07-17 14:01:14","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160950.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160951","title":"Key issue #6.y: Authorization decoupled from Authentication","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides content for the new Key issue #6.y: Authorization decoupled from Authentication","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10710,"status":"postponed","reservation_date":"2016-07-13 18:51:50","uploaded":"2016-07-17 14:01:14","revisionof":"","revisedto":"S3-161304","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160951.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160952","title":"pCR to TR 33.899: Proposal of key hierarchy for 5G security","source":"NEC","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9470,"status":"revised","reservation_date":"2016-07-14 04:49:46","uploaded":"2016-07-15 11:10:49","revisionof":"","revisedto":"S3-161192","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160952.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160953","title":"pCR to TR 33.899: Proposal of solution for key issue of network slicing security","source":"NEC","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11130,"status":"revised","reservation_date":"2016-07-14 04:53:54","uploaded":"2016-07-15 11:10:49","revisionof":"","revisedto":"S3-161265","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160953.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160956","title":"Split of key issue #7.1 on subscriber identifier privacy","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10740,"status":"noted","reservation_date":"2016-07-14 09:45:45","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160956.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160957","title":"Update of key issue #7.2 on refreshing of temporary subscriber identifier","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10750,"status":"approved","reservation_date":"2016-07-14 09:57:05","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160957.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160958","title":"New privacy key issue on concealing permanent or long-term subscriber identifier","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10760,"status":"revised","reservation_date":"2016-07-14 09:57:05","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"S3-161285","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160958.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160959","title":"New privacy key issue on concealing permanent or long-term device identifier","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10770,"status":"approved","reservation_date":"2016-07-14 09:57:05","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160959.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160960","title":"New privacy key issue on using effective temporary or short-term subscriber identifiers","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10780,"status":"approved","reservation_date":"2016-07-14 09:57:05","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160960.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160961","title":"New privacy key issue on transmitting permanent identifiers in secure interface","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10790,"status":"approved","reservation_date":"2016-07-14 09:57:05","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160961.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160962","title":"New privacy key issue on transmitting permanent subscriber identifiers only when needed","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10800,"status":"approved","reservation_date":"2016-07-14 09:57:05","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160962.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160963","title":"Deletion of key issue #7.1 on subscriber identifier privacy","source":"Ericsson, Nokia, Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10810,"status":"approved","reservation_date":"2016-07-14 09:57:05","uploaded":"2016-07-18 08:57:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160963.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160964","title":"An overview of NextGen security architecture","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"A proposal for overview of NextGen security architecture in TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9570,"status":"noted","reservation_date":"2016-07-14 11:35:27","uploaded":"2016-07-18 08:19:06","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160964.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160965","title":"Key hierarchy schems for network slicing","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose a key issue that how key derivation performed for network slicing, and provide a solution based on a recommended schem of key derivation.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11310,"status":"revised","reservation_date":"2016-07-14 11:41:08","uploaded":"2016-07-18 08:19:06","revisionof":"","revisedto":"S3-161140","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160965.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160966","title":"Security for serving functions not in physical protected place","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose a key issue to consider security for CN functions that are deployed in a place that is not well physical protected, e.g. close to AN, and provide a solution for this key issue","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9480,"status":"revised","reservation_date":"2016-07-14 11:44:12","uploaded":"2016-07-18 08:19:06","revisionof":"","revisedto":"S3-161193","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160966.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160974","title":"3.1 Definitions - Device","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides new definition for Section 3.1","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10650,"status":"postponed","reservation_date":"2016-07-14 16:39:08","uploaded":"2016-07-17 14:01:14","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160974.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160975","title":"pCR to TR 33.899: Authentication of the user","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"A new key issue for area #2 Authentication, based on a requirement from 3GPP TR 22.861.  This pCR also describes some security threats and potential security requirements, as well as some solutions which could meet the requirements","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9750,"status":"revised","reservation_date":"2016-07-15 09:50:27","uploaded":"2016-07-15 09:52:17","revisionof":"","revisedto":"S3-161260","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160975.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160976","title":"New privacy key issue on temporary device identifier","source":"Nokia, Ericsson, Telecom Italia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10820,"status":"approved","reservation_date":"2016-07-16 12:54:58","uploaded":"2016-07-18 13:18:03","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160976.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160977","title":"NSA Adding new security area on broadcast multicast","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9400,"status":"revised","reservation_date":"2016-07-16 13:23:02","uploaded":"2016-07-18 13:18:03","revisionof":"","revisedto":"S3-161186","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160977.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160978","title":"NSA new security area on interworking and migration","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9410,"status":"revised","reservation_date":"2016-07-16 13:25:35","uploaded":"2016-07-18 13:18:03","revisionof":"","revisedto":"S3-161188","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160978.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160979","title":"NSA - 5.3.3.3 - addressing ENs on bidding down attack and requirements reformulation","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10070,"status":"approved","reservation_date":"2016-07-16 13:29:16","uploaded":"2016-07-18 13:18:03","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160979.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160987","title":"Network Slice: EN in 5.8 intro and assumptions","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"addresses Editor Notes in 5.8 introduction and assumptions","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10860,"status":"merged","reservation_date":"2016-07-16 22:49:59","uploaded":"2016-07-18 12:28:16","revisionof":"","revisedto":"S3-161212","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160987.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160988","title":"Network Slice: 5.8.3.1 key issue isolation of slices","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"addresses EN in key issue isolation of network slices","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10910,"status":"merged","reservation_date":"2016-07-16 22:54:24","uploaded":"2016-07-18 12:28:16","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160988.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160989","title":"Network Slice: EN in 5.8.3.2 Slice differentiation","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"addresses EN in 5.8.3.2 Network Slice differentiation","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11010,"status":"revised","reservation_date":"2016-07-16 22:59:05","uploaded":"2016-07-18 12:28:16","revisionof":"","revisedto":"S3-161215","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160989.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160990","title":"Network slice: EN in 5.8.3.7 interslice communication","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"addresses EN in 5.8.3.7 inter slice communication","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11070,"status":"revised","reservation_date":"2016-07-16 23:01:53","uploaded":"2016-07-18 12:28:16","revisionof":"","revisedto":"S3-161264","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160990.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160991","title":"Security aspects of Connectionless RAN-CN interface","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"Introduces security aspects of connectionless RAN-CN interface","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9440,"status":"revised","reservation_date":"2016-07-16 23:06:10","uploaded":"2016-07-18 12:28:16","revisionof":"","revisedto":"S3-161189","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160991.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160992","title":"pCR to TR 33.899: Network public keys","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"Two already identified requirements \u2013 for subscriber identifier privacy on the radio interface, and for UEs even in idle mode to be protected from spoofed network signalling \u2013 naturally lend themselves to solutions based on network public keys.  This cont","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10470,"status":"revised","reservation_date":"2016-07-17 22:33:33","uploaded":"2016-07-17 22:35:17","revisionof":"","revisedto":"S3-161282","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160992.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160995","title":"Enhancing the concealment of permanent or long-term subscriber identifier","source":"Ericsson,Telecom Italia","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10840,"status":"revised","reservation_date":"2016-07-18 07:10:52","uploaded":"2016-07-18 13:57:21","revisionof":"","revisedto":"S3-161288","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160995.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160997","title":"Solution for Network Slicing Security","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes solutions for network slicing security key issue #8.3.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11140,"status":"revised","reservation_date":"2016-07-18 07:13:55","uploaded":"2016-07-18 08:08:52","revisionof":"","revisedto":"S3-161266","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160997.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160998","title":"Solution for NSA security context sharing","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for key issue #3.4 security context sharing of TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10170,"status":"noted","reservation_date":"2016-07-18 07:15:11","uploaded":"2016-07-18 08:08:52","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160998.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-160999","title":"Update of NSA security area #11 Security visibility and configurability","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"Introductory part of security area #11 is proposed, as well as clauses to resolve editor?s notes in key issue #11.2.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11250,"status":"postponed","reservation_date":"2016-07-18 07:16:34","uploaded":"2016-07-18 08:08:52","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-160999.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161000","title":"Secure Mechanism to Achieve Remote Credential Provisioning for IoT devices","source":"Huawei, HiSilicon, Deutsche Telekom AG","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11280,"status":"postponed","reservation_date":"2016-07-18 07:19:12","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161000.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161001","title":"Resolving Editor\u2019s notes in Key Issue #2.1 Authentication framwork","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes to resolve editor\u2019s notes in Key Issue #2.1 Authentication framework according to SA1 \u201cconnection support by service provider\u201d scenario in TR22.861","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9770,"status":"noted","reservation_date":"2016-07-18 07:22:09","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161001.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161002","title":"PCR of User Plane Security Protection","source":"Huawei, HiSilicon, Deutsche Telekom AG, Vodafone","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution proposes details on user plane security protection key issues and a potential solution to make 5G have the flexible solution for different service requirements.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9560,"status":"revised","reservation_date":"2016-07-18 07:28:21","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"S3-161197","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161002.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161003","title":"Key Issue of Security for Service Provider Connection","source":"Huawei, HiSilicon, Deutsche Telekom AG, KPN","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution mainly discusses security for service provider connection in next generation system.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9760,"status":"revised","reservation_date":"2016-07-18 07:30:49","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"S3-161203","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161003.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161004","title":"Remote Provisioning for IoT devices through a Companion UE","source":"Huawei, Hisilicon, China Mobile, Deutsche Telekom AG, KPN","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes using a cellular device with 3GPP credentials as a bridge to remotely provision IoT devices that have not been pre-provisioned with 3GPP credentials","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11290,"status":"postponed","reservation_date":"2016-07-18 07:33:41","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161004.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161005","title":"Security Context and Key Management","source":"Huawei, HiSilicon, Deutsche Telekom AG","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for the security context generation and management for heterogeneous access technology at UE side.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10180,"status":"revised","reservation_date":"2016-07-18 07:39:07","uploaded":"2016-07-18 10:01:27","revisionof":"","revisedto":"S3-161278","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161005.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161006","title":"Detailed Requirements for Security Mechanism Differentiation for Network Slices","source":"Huawei, HiSilicon,Deutsche Telekom AG","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"The 3GPP system should support security mechanism differentiation for network slices. The 3GPP should support the differentiation in credential type, authentication method, authentication function, subscriber repository, and security policy.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11020,"status":"revised","reservation_date":"2016-07-18 07:42:11","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"S3-161258","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161006.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161007","title":"Threats for Security Context Sharing","source":"Huawei, HiSilicon,Deutsche Telekom AG, China Mobile","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution proposes to add threats for security context sharing to the section 5.3.3.4\tKey Issue #3.4: Security context sharing of TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10090,"status":"revised","reservation_date":"2016-07-18 07:45:37","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"S3-161274","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161007.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161008","title":"The Authentication & Authorization Scenarios of UE Accessing into Network Slicing","source":"Huawei, HiSilicon, Deutsche Telekom AG","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"There are 6 potential authentication and authorization scenarios when a UE access into different slices. The next generation network and 5G UE shall suppor those scenarios for enabling diverse services in 5G network.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11040,"status":"merged","reservation_date":"2016-07-18 07:47:23","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"S3-161262","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161008.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161009","title":"The storage of security context","source":"Huawei; HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"The security context must be securely stored both at the UE side and the NexGen system side","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11350,"status":"revised","reservation_date":"2016-07-18 07:49:57","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"S3-161144","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161009.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161010","title":"Security context for connectionless mode","source":"Huawei; HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"Two types of ESP security context may be not sufficient in NextGen System when connectionless mode is implemented. A new security contest type may be introduced.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10140,"status":"revised","reservation_date":"2016-07-18 07:53:38","uploaded":"2016-07-18 10:01:06","revisionof":"","revisedto":"S3-161277","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161010.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161011","title":"pCR adding security assumptions in security area 5.4","source":"THALES","contact":"Renaud Moliere","contact-id":63048,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes to add the security assumptions into the security area #4: RAN security (section 5.4.2)","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10190,"status":"noted","reservation_date":"2016-07-18 08:04:18","uploaded":"2016-07-18 08:12:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161011.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161014","title":"Discussion on the necessity to reinforce the radio air interface for the next generation system","source":"THALES","contact":"Renaud Moliere","contact-id":63048,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11400,"status":"revised","reservation_date":"2016-07-18 08:15:07","uploaded":"2016-07-18 08:17:33","revisionof":"","revisedto":"S3-161019","release":"","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161014.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161017","title":"pCR adding key issue in security area 5.4","source":"THALES","contact":"Renaud Moliere","contact-id":63048,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes to add a key issue into the security area #4: RAN security (section 5.4.3.2)","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10340,"status":"noted","reservation_date":"2016-07-18 08:23:56","uploaded":"2016-07-18 08:26:15","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161017.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161018","title":"pCR to TR 33.899 New key issue - Secondary authentication by 3rd party service","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"Adds a new key issue on secondary authentication by 3rd party service","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9780,"status":"revised","reservation_date":"2016-07-18 08:29:16","uploaded":"2016-07-18 13:15:49","revisionof":"","revisedto":"S3-161204","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161018.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161019","title":"Discussion on the necessity to reinforce the radio air interface for the next generation system","source":"THALES","contact":"Renaud Moliere","contact-id":63048,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10200,"status":"noted","reservation_date":"2016-07-18 08:33:58","uploaded":"2016-07-18 08:36:01","revisionof":"S3-161014","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161019.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161020","title":"FS_NSA - Update to Key Issue #8.3 \u2013 Security on UE\u2019s access to slices","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"Update to Key Issue #8.3 \u2013 \"Security on UE\u2019s access to slices\", with text for \nUE access authentication to the slice.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11050,"status":"merged","reservation_date":"2016-07-18 08:34:16","uploaded":"2016-07-18 13:15:49","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161020.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161034","title":"LS on \"Next Generation\" Security Requirements","source":"S2-164263","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11440,"status":"revised","reservation_date":"2016-07-18 09:28:57","uploaded":"2016-07-18 09:46:38","revisionof":"","revisedto":"S3-161131","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161034.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161043","title":"pCR to TR 33.899: Enhancing DH session key derivation","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"An additional solution is proposed to Key Issues 2.2 and 3.1. It is an enhancement to existing Solution #2.2.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9880,"status":"approved","reservation_date":"2016-07-18 10:08:11","uploaded":"2016-07-18 10:10:16","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161043.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161044","title":"pCR to TR 33.899: UEs with Asymmetric Keys","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"A new key issue for area #1 Architectural aspects of Next Generation security. The requirements for several key issues suggest that 5G UEs will require public-private key pairs. If so, these should receive consistent treatment as part of the NextGen archi","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9490,"status":"revised","reservation_date":"2016-07-18 11:01:13","uploaded":"2016-07-18 11:05:04","revisionof":"","revisedto":"S3-161259","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161044.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161046","title":"LS to SA1 on factory automation requirements","source":"ORANGE","contact":"Todor Gamishev","contact-id":58178,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9250,"status":"revised","reservation_date":"2016-07-18 11:12:05","uploaded":"2016-07-18 13:31:28","revisionof":"","revisedto":"S3-161159","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161046.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161047","title":"Additional Security Requirements on credential storage","source":"ORANGE","contact":"Todor Gamishev","contact-id":58178,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10690,"status":"revised","reservation_date":"2016-07-18 11:14:23","uploaded":"2016-07-18 13:31:28","revisionof":"","revisedto":"S3-161160","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161047.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161054","title":"Potential requirements for credential storage","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10700,"status":"postponed","reservation_date":"2016-07-18 11:28:47","uploaded":"2016-07-18 13:17:49","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161054.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161065","title":"Key Issue #2.1: Authentication framework","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key Issue #2.1: Authentication framework","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9620,"status":"merged","reservation_date":"2016-07-18 11:43:24","uploaded":"2016-07-18 11:55:34","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161065.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161067","title":"pCR to TR 33.899 v0.3.0 \"Architecture - modifying key issue titles\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9500,"status":"approved","reservation_date":"2016-07-18 11:51:10","uploaded":"2016-07-18 13:22:12","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161067.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161068","title":"Key Issue #8.2 - Security mechanism differentiation for different network slices","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key Issue #8.2 - Security mechanism differentiation for different network slices","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11030,"status":"noted","reservation_date":"2016-07-18 11:51:13","uploaded":"2016-07-18 11:55:34","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161068.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161069","title":"pCR to TR 33.899 v0.3.0 \"Architecture - security features on AN-CN interfaces\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9510,"status":"approved","reservation_date":"2016-07-18 11:52:53","uploaded":"2016-07-18 13:22:29","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161069.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161070","title":"pCR to TR 33.899 v0.3.0 \"Architecture - security features on CN-CN interfaces\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9520,"status":"approved","reservation_date":"2016-07-18 11:54:52","uploaded":"2016-07-18 13:22:46","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161070.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161071","title":"New privacy key issue on protection of network slice identifier","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10830,"status":"revised","reservation_date":"2016-07-18 12:03:09","uploaded":"2016-07-18 13:18:03","revisionof":"","revisedto":"S3-161287","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161071.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161073","title":"pCR to add a solution 'back-off timer' for key issue 5.2.3.7","source":"TNO","contact":"Erwin Middelesch","contact-id":64807,"tdoctype":"pCR","for":"Approval","abstract":"This pCR adds a back-off timer solution as required in 5.3.2.7 (after acceptance of contribution of China Mobile and TNO).","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9870,"status":"revised","reservation_date":"2016-07-18 12:16:42","uploaded":"2016-07-18 12:45:20","revisionof":"","revisedto":"S3-161200","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161073.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161074","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - key issue\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9630,"status":"approved","reservation_date":"2016-07-18 12:19:32","uploaded":"2016-07-18 13:23:23","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161074.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161075","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - requirements\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9640,"status":"revised","reservation_date":"2016-07-18 12:21:10","uploaded":"2016-07-18 13:23:57","revisionof":"","revisedto":"S3-161201","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161075.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161076","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - candidate methods\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9890,"status":"approved","reservation_date":"2016-07-18 12:22:22","uploaded":"2016-07-18 13:24:32","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161076.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161077","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - transport considerations\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9900,"status":"revised","reservation_date":"2016-07-18 12:24:31","uploaded":"2016-07-18 13:25:16","revisionof":"","revisedto":"S3-161205","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161077.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161078","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - efficiency considerations\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9910,"status":"revised","reservation_date":"2016-07-18 12:26:43","uploaded":"2016-07-18 13:25:47","revisionof":"","revisedto":"S3-161206","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161078.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161079","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - general information flow\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9920,"status":"revised","reservation_date":"2016-07-18 12:28:11","uploaded":"2016-07-18 13:26:22","revisionof":"","revisedto":"S3-161207","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161079.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161080","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - alternatives\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9950,"status":"revised","reservation_date":"2016-07-18 12:29:29","uploaded":"2016-07-18 13:26:55","revisionof":"","revisedto":"S3-161208","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161080.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161081","title":"EAP Encapsulation Protocol","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9980,"status":"revised","reservation_date":"2016-07-18 12:30:44","uploaded":"2016-07-18 13:08:30","revisionof":"","revisedto":"S3-161210","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161081.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161082","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - initial evaluation\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9970,"status":"approved","reservation_date":"2016-07-18 12:31:06","uploaded":"2016-07-18 13:28:32","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161082.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161083","title":"Key issue Security requirements on gNB","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10430,"status":"revised","reservation_date":"2016-07-18 12:31:08","uploaded":"2016-07-18 13:09:56","revisionof":"","revisedto":"S3-161279","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161083.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161084","title":"New solution to security area #2: EAP authentication framework","source":"Ericsson","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9990,"status":"revised","reservation_date":"2016-07-18 12:31:21","uploaded":"2016-07-18 12:53:44","revisionof":"","revisedto":"S3-161209","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161084.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161085","title":"Key issue Security aspects of dual connectivity","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10440,"status":"revised","reservation_date":"2016-07-18 12:32:56","uploaded":"2016-07-18 12:54:28","revisionof":"","revisedto":"S3-161280","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161085.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161086","title":"pCR to TR 33.899 v0.3.0 \"Replacing solution 2.2 with reference to solution 3.1\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10010,"status":"revised","reservation_date":"2016-07-18 12:33:56","uploaded":"2016-07-18 13:29:09","revisionof":"","revisedto":"S3-161267","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161086.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161087","title":"pCR to TR 33.899 v0.3.0 \"Evaluation of Solution #3.1: Including a key exchange...\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10030,"status":"revised","reservation_date":"2016-07-18 12:35:54","uploaded":"2016-07-18 13:29:44","revisionof":"","revisedto":"S3-161269","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161087.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161089","title":"Verification of authenticity of the cell","source":"Samsung R&D Institute UK","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10540,"status":"revised","reservation_date":"2016-07-18 12:36:22","uploaded":"2016-07-18 13:08:30","revisionof":"","revisedto":"S3-161257","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161089.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161090","title":"pCR to TR 33.899 v0.3.0 \"Network Authorization\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10730,"status":"approved","reservation_date":"2016-07-18 12:37:17","uploaded":"2016-07-18 13:30:22","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161090.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161091","title":"Interconnection Security Key Issue","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11150,"status":"postponed","reservation_date":"2016-07-18 12:38:53","uploaded":"2016-07-18 13:31:00","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161091.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161093","title":"Interconnection Security - Circles of Trust","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11170,"status":"postponed","reservation_date":"2016-07-18 12:40:40","uploaded":"2016-07-18 13:31:39","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161093.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161100","title":"pCR on allowing non-radio interface keys to be refreshed in the existing key issue on Refreshing radio interface keys","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10060,"status":"revised","reservation_date":"2016-07-18 12:43:11","uploaded":"2016-07-18 13:56:49","revisionof":"","revisedto":"S3-161273","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161100.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161101","title":"pCR solution to Key # 1.2 on the need a security anchor","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9580,"status":"revised","reservation_date":"2016-07-18 12:43:11","uploaded":"2016-07-18 13:56:49","revisionof":"","revisedto":"S3-161191","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161101.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161102","title":"Adding requirements to the Key Issue # 5.1 and a new key issue on storage of device credentials","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10670,"status":"postponed","reservation_date":"2016-07-18 12:43:11","uploaded":"2016-07-18 13:56:49","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161102.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161103","title":"pCR on a proposed solution for IMSI privacy","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10850,"status":"revised","reservation_date":"2016-07-18 12:43:11","uploaded":"2016-07-18 13:56:49","revisionof":"","revisedto":"S3-161289","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161103.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161104","title":"pCR on New key issue on on-demand AS integrity protection in NextGen systems","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10460,"status":"revised","reservation_date":"2016-07-18 12:43:11","uploaded":"2016-07-18 13:56:49","revisionof":"","revisedto":"S3-161281","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161104.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161105","title":"Solution for Key issue #2.4: Device identifier authentication","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10000,"status":"revised","reservation_date":"2016-07-18 12:43:11","uploaded":"2016-07-18 14:00:31","revisionof":"","revisedto":"S3-161211","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161105.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161106","title":"Finalising Key issue #3.5: Unnecessary dependence of keys between security layers","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10100,"status":"revised","reservation_date":"2016-07-18 12:43:11","uploaded":"2016-07-18 13:56:49","revisionof":"","revisedto":"S3-161275","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161106.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161107","title":"pCR to TR 33.899 v0.3.0 \"Security visibility and configurability\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11230,"status":"postponed","reservation_date":"2016-07-18 12:43:32","uploaded":"2016-07-18 13:32:15","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161107.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161109","title":"Availability of the control plane in Next Gen","source":"TNO","contact":"Erwin Middelesch","contact-id":64807,"tdoctype":"pCR","for":"Approval","abstract":"In this contribution we propose a new key issue with respect to signalling overload in the network. We kindly ask SA3 to consider this key issue and discuss whether such a key issue may be part of the architecture","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9390,"status":"merged","reservation_date":"2016-07-18 12:47:30","uploaded":"2016-07-18 12:48:10","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161109.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161113","title":"pCR to 33.899 - Resolution of EN in 5.3.3.2.3","source":"TNO","contact":"Erwin Middelesch","contact-id":64807,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes new text to resolve Editor\u2019s Notes in 5.3.3.2.3 in TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10080,"status":"revised","reservation_date":"2016-07-18 13:04:52","uploaded":"2016-07-18 13:33:57","revisionof":"","revisedto":"S3-161272","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161113.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161114","title":"pCR revise the details of key issue# 8.1","source":"China Mobile Com. Corporation, China Unicom","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10930,"status":"revised","reservation_date":"2016-07-18 13:18:02","uploaded":"2016-07-18 14:23:39","revisionof":"","revisedto":"S3-161213","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161114.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161115","title":"pCR : merge the requirements of key issue #8.1","source":"China Mobile Com. Corporation, China Unicom, Huawei, Hisilicon","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11000,"status":"noted","reservation_date":"2016-07-18 13:23:06","uploaded":"2016-07-18 14:23:39","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161115.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161117","title":"pCR adding the definition of security anchor in the section 3.1","source":"China Mobile Com. Corporation, Huawei, Hisilicon","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9460,"status":"revised","reservation_date":"2016-07-18 13:26:40","uploaded":"2016-07-18 14:22:30","revisionof":"","revisedto":"S3-161150","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161117.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161123","title":"pCR adding the potential security requirements into the section 5.2.3.7","source":"China Mobile Com. Corporation, Huawei, Hisilicon","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9740,"status":"merged","reservation_date":"2016-07-18 13:31:09","uploaded":"2016-07-18 14:22:30","revisionof":"","revisedto":"S3-161199","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161123.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161125","title":"pCR choice of authentication methods","source":"China Mobile Com. Corporation, Huawei, Hisilicon","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9790,"status":"postponed","reservation_date":"2016-07-18 13:34:50","uploaded":"2016-07-18 14:13:09","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161125.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161126","title":"Resolution of the editor\u2019s notes under the introductory text for security area #8 on network slicing","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10890,"status":"merged","reservation_date":"2016-07-18 13:35:16","uploaded":"2016-07-18 13:57:53","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161126.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161127","title":"pCR  complete the section 5.2.3.6","source":"China Mobile Com. Corporation","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9660,"status":"noted","reservation_date":"2016-07-18 13:37:02","uploaded":"2016-07-18 14:13:09","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161127.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161128","title":"Clarification and resolution of the editor\u2019s notes in key issue of UE service authorization under the security area for network slicing","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11060,"status":"revised","reservation_date":"2016-07-18 13:39:33","uploaded":"2016-07-18 13:57:42","revisionof":"","revisedto":"S3-161261","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161128.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161129","title":"Discussion on the trust model in Next Generation systems in relation to the network slicing security area","source":"Ericsson","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10870,"status":"revised","reservation_date":"2016-07-18 13:41:48","uploaded":"2016-07-18 13:57:29","revisionof":"","revisedto":"S3-161214","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161129.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161131","title":"LS on \"Next Generation\" Security Requirements","source":"S2-164280","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9240,"status":"replied to","reservation_date":"2016-07-18 13:45:34","uploaded":"2016-07-18 14:07:18","revisionof":"S3-161034","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-161182, S3-161182","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161131.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161135","title":"pCR to TR 33.899: Security Implications of Low Latency","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"A new key issue for area #1 Architectural aspects of Next Generation security, based on requirements from 3GPP TR 22.862. This pCR describes negative security implications of ultra-low latency requirements for either user plane or control plane.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9530,"status":"revised","reservation_date":"2016-07-18 13:50:35","uploaded":"2016-07-18 13:55:50","revisionof":"","revisedto":"S3-161194","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161135.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161140","title":"Key hierarchy schems for network slicing","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose a key issue that how key derivation performed for network slicing, and provide a solution based on a recommended schem of key derivation.","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11090,"status":"noted","reservation_date":"2016-07-18 23:51:25","uploaded":"2016-07-19 08:15:30","revisionof":"S3-160965","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161140.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161144","title":"The storage of security context","source":"Huawei; HiSilicon; China Mobile","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"The security context must be securely stored both at the UE side and the NexGen system side","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10110,"status":"revised","reservation_date":"2016-07-19 06:17:26","uploaded":"2016-07-19 06:18:38","revisionof":"S3-161009","revisedto":"S3-161276","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161144.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161150","title":"pCR adding the definition of security anchor in the section 3.1","source":"China Mobile Com. Corporation, Huawei, Hisilicon","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11500,"status":"revised","reservation_date":"2016-07-22 10:35:01","uploaded":"2016-07-22 10:42:37","revisionof":"S3-161117","revisedto":"S3-161190","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161150.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161159","title":"LS to SA1 on factory automation requirements","source":"ORANGE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9251,"status":"approved","reservation_date":"2016-07-29 15:04:37","uploaded":"2016-07-29 15:04:37","revisionof":"S3-161046","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA1","Cc":"","lsoriginalls":"","lsreply":"S1-162190","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161159.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161160","title":"Additional Security Requirements on credential storage","source":"ORANGE, Telecom Italia, Gemalto, Deutsche Telekom, Oberthur, Giesecke&Devrient","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10691,"status":"postponed","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-161047","revisedto":"S3-161319","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161160.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161182","title":"Reply to: LS on \"Next Generation\" Security Requirements","source":"Vodafone","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9241,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-161131","lsto":"SA2","Cc":"SA,SA1","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161182.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161183","title":"Definitions for FS_NSA","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":118300,"status":"approved","reservation_date":"2016-07-29 15:04:37","uploaded":"2016-07-29 15:04:37","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161183.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161184","title":"pCR to 33.899 - update of the Introduction section","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9261,"status":"approved","reservation_date":"2016-07-27 08:35:27","uploaded":"2016-07-27 08:35:27","revisionof":"S3-160924","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161184.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161185","title":"pCR to TR 33.899 - update of section 4.2 High level security requirements","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9271,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-160925","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161185.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161186","title":"NSA Adding new security area on broadcast multicast","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9401,"status":"approved","reservation_date":"2016-07-27 08:35:27","uploaded":"2016-07-27 08:35:27","revisionof":"S3-160977","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161186.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161187","title":"Clause 4.1 details","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":118700,"status":"approved","reservation_date":"2016-07-29 12:43:58","uploaded":"2016-07-29 12:43:58","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161187.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161188","title":"NSA new security area on interworking and migration","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9411,"status":"approved","reservation_date":"2016-07-27 09:12:41","uploaded":"2016-07-27 09:12:41","revisionof":"S3-160978","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161188.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161189","title":"Security aspects of Connectionless RAN-CN interface","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9441,"status":"approved","reservation_date":"2016-07-28 12:52:46","uploaded":"2016-07-28 12:52:46","revisionof":"S3-160991","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161189.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161190","title":"pCR adding the definition of security anchor in the section 3.1","source":"China Mobile Com. Corporation, Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11501,"status":"approved","reservation_date":"2016-07-28 11:20:24","uploaded":"2016-07-28 11:20:24","revisionof":"S3-161150","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161190.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161191","title":"pCR solution to Key # 1.2 on the need a security anchor","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9581,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-161101","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161191.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161192","title":"pCR to TR 33.899: Proposal of key hierarchy for 5G security","source":"NEC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9471,"status":"approved","reservation_date":"2016-07-29 11:27:39","uploaded":"2016-07-29 11:27:39","revisionof":"S3-160952","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161192.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161193","title":"Security for serving functions not in physical protected place","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9481,"status":"approved","reservation_date":"2016-08-08 14:06:47","uploaded":"2016-08-08 14:06:47","revisionof":"S3-160966","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161193.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161194","title":"pCR to TR 33.899: Security Implications of Low Latency","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9531,"status":"approved","reservation_date":"2016-07-29 11:27:39","uploaded":"2016-07-29 11:27:39","revisionof":"S3-161135","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161194.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161197","title":"PCR of User Plane Security Protection","source":"Huawei, HiSilicon, Deutsche Telekom AG, Vodafone","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9561,"status":"approved","reservation_date":"2016-07-28 12:52:46","uploaded":"2016-07-28 12:52:46","revisionof":"S3-161002","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161197.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161198","title":"pCR to TR 33.899: Authentication section introduction","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9611,"status":"approved","reservation_date":"2016-07-26 16:07:05","uploaded":"2016-07-26 16:07:05","revisionof":"S3-160946","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161198.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161199","title":"pCR adding the potential security requirements into the section 5.2.3.7","source":"China Mobile Com. Corporation, Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9741,"status":"approved","reservation_date":"2016-07-28 11:20:24","uploaded":"2016-07-28 11:20:24","revisionof":"S3-161123","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161199.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161200","title":"pCR to add a solution 'back-off timer' for key issue 5.2.3.7","source":"TNO","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9871,"status":"approved","reservation_date":"2016-07-27 08:35:27","uploaded":"2016-07-27 08:35:27","revisionof":"S3-161073","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161200.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161201","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - requirements\"","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9641,"status":"approved","reservation_date":"2016-07-27 09:12:41","uploaded":"2016-07-27 09:12:41","revisionof":"S3-161075","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161201.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161202","title":"Key issue #2.4: Device identifier authentication","source":"INTERDIGITAL COMMUNICATIONS","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9651,"status":"approved","reservation_date":"2016-07-28 12:52:46","uploaded":"2016-07-28 12:52:46","revisionof":"S3-160939","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161202.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161203","title":"Key Issue of Security for Service Provider Connection","source":"Huawei, HiSilicon, Deutsche Telekom AG, KPN","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9761,"status":"approved","reservation_date":"2016-07-29 11:27:39","uploaded":"2016-07-29 11:27:39","revisionof":"S3-161003","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161203.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161204","title":"pCR to TR 33.899 New key issue - Secondary authentication by 3rd party service","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9781,"status":"approved","reservation_date":"2016-07-28 20:26:24","uploaded":"2016-07-28 20:26:24","revisionof":"S3-161018","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161204.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161205","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - transport considerations\"","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9901,"status":"approved","reservation_date":"2016-07-27 08:35:27","uploaded":"2016-07-27 08:35:27","revisionof":"S3-161077","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161205.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161206","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - efficiency considerations\"","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9911,"status":"approved","reservation_date":"2016-07-27 08:35:27","uploaded":"2016-07-27 08:35:27","revisionof":"S3-161078","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161206.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161207","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - general information flow\"","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9921,"status":"approved","reservation_date":"2016-07-27 09:12:41","uploaded":"2016-07-27 09:12:41","revisionof":"S3-161079","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161207.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161208","title":"pCR to TR 33.899 v0.3.0 \"Authentication framework - solution A - alternatives\"","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9951,"status":"approved","reservation_date":"2016-07-27 08:35:27","uploaded":"2016-07-27 08:35:27","revisionof":"S3-161080","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161208.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161209","title":"New solution to security area #2: EAP authentication framework","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9991,"status":"approved","reservation_date":"2016-07-27 09:12:41","uploaded":"2016-07-27 09:12:41","revisionof":"S3-161084","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161209.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161210","title":"EAP Encapsulation Protocol","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9981,"status":"approved","reservation_date":"2016-07-29 10:05:18","uploaded":"2016-07-29 10:05:18","revisionof":"S3-161081","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161210.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161211","title":"Solution for Key issue #2.4: Device identifier authentication","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10001,"status":"approved","reservation_date":"2016-07-29 13:48:26","uploaded":"2016-07-29 13:48:26","revisionof":"S3-161105","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161211.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161212","title":"Network Slice: EN in 5.8 intro and assumptions","source":"Nokia,Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10861,"status":"approved","reservation_date":"2016-07-29 10:05:18","uploaded":"2016-07-29 10:05:18","revisionof":"S3-160987","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161212.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161213","title":"pCR revise the details of key issue# 8.1","source":"China Mobile Com. Corporation, China Unicom","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10931,"status":"approved","reservation_date":"2016-07-28 12:52:46","uploaded":"2016-07-28 12:52:46","revisionof":"S3-161114","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161213.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161214","title":"Discussion on the trust model in Next Generation systems in relation to the network slicing security area","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10871,"status":"approved","reservation_date":"2016-07-29 10:05:18","uploaded":"2016-07-29 10:05:18","revisionof":"S3-161129","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161214.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161215","title":"Network Slice: EN in 5.8.3.2 Slice differentiation","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11011,"status":"approved","reservation_date":"2016-07-28 12:52:46","uploaded":"2016-07-28 12:52:46","revisionof":"S3-160989","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161215.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161257","title":"Verification of authenticity of the cell","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10541,"status":"approved","reservation_date":"2016-07-29 10:05:18","uploaded":"2016-07-29 10:05:18","revisionof":"S3-161089","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161257.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161258","title":"Detailed Requirements for Security Mechanism Differentiation for Network Slices","source":"Huawei, HiSilicon,Deutsche Telekom AG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11021,"status":"approved","reservation_date":"2016-07-29 13:57:28","uploaded":"2016-07-29 13:57:28","revisionof":"S3-161006","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161258.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161259","title":"pCR to TR 33.899: UEs with Asymmetric Keys","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9491,"status":"approved","reservation_date":"2016-07-29 11:27:39","uploaded":"2016-07-29 11:27:39","revisionof":"S3-161044","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161259.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161260","title":"pCR to TR 33.899: Authentication of the user","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":9751,"status":"approved","reservation_date":"2016-07-29 11:27:39","uploaded":"2016-07-29 11:27:39","revisionof":"S3-160975","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161260.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161261","title":"Clarification and resolution of the editor\u2019s notes in key issue of UE service authorization under the security area for network slicing","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11061,"status":"approved","reservation_date":"2016-08-08 14:06:47","uploaded":"2016-08-08 14:06:47","revisionof":"S3-161128","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161261.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161262","title":"The Authentication & Authorization Scenarios of UE Accessing into Network Slicing","source":"Huawei, HiSilicon, Deutsche Telekom AG,Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11041,"status":"approved","reservation_date":"2016-07-29 12:20:33","uploaded":"2016-07-29 12:20:33","revisionof":"S3-161008","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161262.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161263","title":"Editor's notes on definitions","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":126300,"status":"approved","reservation_date":"2016-07-29 12:20:33","uploaded":"2016-07-29 12:20:33","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161263.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161264","title":"Network slice: EN in 5.8.3.7 interslice communication","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11071,"status":"approved","reservation_date":"2016-07-29 12:20:33","uploaded":"2016-07-29 12:20:33","revisionof":"S3-160990","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161264.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161265","title":"pCR to TR 33.899: Proposal of solution for key issue of network slicing security","source":"NEC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11131,"status":"approved","reservation_date":"2016-07-29 12:43:58","uploaded":"2016-07-29 12:43:58","revisionof":"S3-160953","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161265.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161266","title":"Solution for Network Slicing Security","source":"LG Electronics France","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":11141,"status":"approved","reservation_date":"2016-07-29 12:20:33","uploaded":"2016-07-29 12:20:33","revisionof":"S3-160997","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161266.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161267","title":"pCR to TR 33.899 v0.3.0 \"Replacing solution 2.2 with reference to solution 3.1\"","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10011,"status":"approved","reservation_date":"2016-07-29 11:27:39","uploaded":"2016-07-29 11:27:39","revisionof":"S3-161086","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161267.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161268","title":"pCR to TR 33.899: Radio interface key exchange protocol","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10021,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-160947","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161268.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161269","title":"pCR to TR 33.899 v0.3.0 \"Evaluation of Solution #3.1: Including a key exchange...\"","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10031,"status":"approved","reservation_date":"2016-07-29 11:27:39","uploaded":"2016-07-29 11:27:39","revisionof":"S3-161087","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161269.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161270","title":"pCR to TR 33.899: interception of radio interface keys sent between operator entities","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10041,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-160948","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161270.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161271","title":"pCR to TR 33.899: UE action if network does not update session keys","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10051,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-160949","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161271.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161272","title":"pCR to 33.899 - Resolution of EN in 5.3.3.2.3","source":"TNO","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10081,"status":"approved","reservation_date":"2016-07-28 19:40:11","uploaded":"2016-07-28 19:40:11","revisionof":"S3-161113","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161272.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161273","title":"pCR on allowing non-radio interface keys to be refreshed in the existing key issue on Refreshing radio interface keys","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10061,"status":"approved","reservation_date":"2016-07-29 10:05:18","uploaded":"2016-07-29 10:05:18","revisionof":"S3-161100","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161273.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161274","title":"Threats for Security Context Sharing","source":"Huawei, HiSilicon,Deutsche Telekom AG, China Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10091,"status":"approved","reservation_date":"2016-07-29 13:55:01","uploaded":"2016-07-29 13:55:01","revisionof":"S3-161007","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161274.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161275","title":"Finalising Key issue #3.5: Unnecessary dependence of keys between security layers","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10101,"status":"approved","reservation_date":"2016-07-29 10:05:18","uploaded":"2016-07-29 10:05:18","revisionof":"S3-161106","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161275.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161276","title":"The storage of security context","source":"Huawei; HiSilicon; China Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10111,"status":"approved","reservation_date":"2016-07-28 20:26:24","uploaded":"2016-07-28 20:26:24","revisionof":"S3-161144","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161276.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161277","title":"Security context for connectionless mode","source":"Huawei; HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10141,"status":"approved","reservation_date":"2016-07-28 20:26:24","uploaded":"2016-07-28 20:26:24","revisionof":"S3-161010","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161277.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161278","title":"Security Context and Key Management","source":"Huawei, HiSilicon, Deutsche Telekom AG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10181,"status":"approved","reservation_date":"2016-07-29 13:55:01","uploaded":"2016-07-29 13:55:01","revisionof":"S3-161005","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161278.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161279","title":"Key issue Security requirements on gNB","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10431,"status":"approved","reservation_date":"2016-07-29 13:48:26","uploaded":"2016-07-29 13:48:26","revisionof":"S3-161083","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161279.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161280","title":"Key issue Security aspects of dual connectivity","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10441,"status":"approved","reservation_date":"2016-07-29 13:48:26","uploaded":"2016-07-29 13:48:26","revisionof":"S3-161085","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161280.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161281","title":"pCR on New key issue on on-demand AS integrity protection in NextGen systems","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10461,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-161104","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161281.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161282","title":"pCR to TR 33.899: Network public keys","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10471,"status":"approved","reservation_date":"2016-07-29 16:17:46","uploaded":"2016-07-29 16:17:46","revisionof":"S3-160992","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161282.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161285","title":"New privacy key issue on concealing permanent or long-term subscriber identifier","source":"Ericsson, Nokia, Telecom Italia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10761,"status":"approved","reservation_date":"2016-07-29 13:48:26","uploaded":"2016-07-29 13:48:26","revisionof":"S3-160958","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161285.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161287","title":"New privacy key issue on protection of network slice identifier","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10831,"status":"approved","reservation_date":"2016-07-29 15:04:37","uploaded":"2016-07-29 15:04:37","revisionof":"S3-161071","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161287.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161288","title":"Enhancing the concealment of permanent or long-term subscriber identifier","source":"Ericsson,Telecom Italia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10841,"status":"approved","reservation_date":"2016-07-29 15:04:37","uploaded":"2016-07-29 15:04:37","revisionof":"S3-160995","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161288.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161289","title":"pCR on a proposed solution for IMSI privacy","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":10851,"status":"approved","reservation_date":"2016-08-08 14:06:47","uploaded":"2016-08-08 14:06:47","revisionof":"S3-161103","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161289.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161290","title":"New draft R 33.899","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":45,"ainumber":"8.6","ainame":"Study on Architecture and Security for Next Generation System (FS_NSA)","tdoc_agenda_sort_order":129000,"status":"approved","reservation_date":"2016-08-09 14:30:01","uploaded":"2016-08-09 14:51:54","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.4.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84_Chennai\/Docs\/S3-161290.zip","group":"S3","meeting":"S3-84","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]