[{"name":"S3-161623","title":"pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17450,"status":"withdrawn","reservation_date":"2016-10-28 09:39:33","uploaded":null,"revisionof":"","revisedto":"S3-161632","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161624","title":"pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17470,"status":"withdrawn","reservation_date":"2016-10-28 09:43:29","uploaded":null,"revisionof":"","revisedto":"S3-161630, S3-161631","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161625","title":"pCR to TR 33 899 Initial attach procedure for NextGen","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17480,"status":"withdrawn","reservation_date":"2016-10-28 09:46:12","uploaded":null,"revisionof":"","revisedto":"S3-161633","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161626","title":"pCR to TR 33.899 Security Mode procedure for NextGen","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17280,"status":"noted","reservation_date":"2016-10-28 09:48:29","uploaded":"2016-10-31 13:20:09","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161626.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161630","title":"pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17500,"status":"withdrawn","reservation_date":"2016-10-28 10:04:51","uploaded":null,"revisionof":"S3-161624","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161631","title":"pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17000,"status":"revised","reservation_date":"2016-10-28 10:12:34","uploaded":"2016-10-31 09:27:18","revisionof":"S3-161624","revisedto":"S3-161980","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161631.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161632","title":"pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16750,"status":"revised","reservation_date":"2016-10-28 10:16:13","uploaded":"2016-10-31 13:20:09","revisionof":"S3-161623","revisedto":"S3-161977","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161632.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161633","title":"pCR to TR 33 899 Attach procedure for NextGen","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17110,"status":"noted","reservation_date":"2016-10-28 10:18:05","uploaded":"2016-10-31 13:20:09","revisionof":"S3-161625","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161633.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161667","title":"Clarification on Solution#1.1 and #1.3","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"Add ENs to solution #1.1 and solution #1.3 and clarify devices.","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16670,"status":"revised","reservation_date":"2016-10-31 06:15:57","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"S3-161975","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161667.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161674","title":"Security of NAS signallings before security activation","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"The document proposes a solution to key issue #1.5, which focuses on protection for the first attach\/TAU request.","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17020,"status":"approved","reservation_date":"2016-10-31 06:31:37","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161674.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161675","title":"Add details, threads and requirements to key issue #1.5 on security of NAS signallings before security activation","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution proposed to add details, theats and requirements to key issue #1.5, which exposes the security issue of NAS signallings before security activation.","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16250,"status":"approved","reservation_date":"2016-10-31 06:33:33","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161675.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161678","title":"Flexible security policies negotiation in control plane","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16310,"status":"revised","reservation_date":"2016-10-31 06:42:12","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"S3-161973","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161678.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161679","title":"A solution for KDF negotiation between UE and ARPF","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"The document addresses new key issue in S3-161678, which proposes a solution to negotiate KDF between UE and ARPF","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17090,"status":"noted","reservation_date":"2016-10-31 06:45:29","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161679.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161700","title":"Terminologies update and modification on key hierarchy in solution #1.9","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This document modifies the Terminologies of solution #1.9 \u201cKey hierarchy and the related procedure\u201d, according to the common security functions, and also adds an architecture for the authentication framework.","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17610,"status":"withdrawn","reservation_date":"2016-10-31 08:36:41","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161701","title":"Terminologies update and modification on key hierarchy in solution #1.9","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This document modifies the Terminologies of solution #1.9 \u201cKey hierarchy and the related procedure\u201d, according to the common security functions, and also adds an architecture for the authentication framework.","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17680,"status":"withdrawn","reservation_date":"2016-10-31 08:39:07","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161702","title":"Terminologies update and modification on key hierarchy in solution #1.9","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17010,"status":"revised","reservation_date":"2016-10-31 08:39:57","uploaded":"2016-10-31 09:01:44","revisionof":"","revisedto":"S3-161981","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161702.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161703","title":"Terminologies update and modification on key hierarchy in solution #1.9","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17690,"status":"withdrawn","reservation_date":"2016-10-31 08:40:19","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161706","title":"Resolving ENs in key issue #1.15 Termination point of UP security","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16260,"status":"revised","reservation_date":"2016-10-31 08:47:55","uploaded":"2016-10-31 09:01:44","revisionof":"","revisedto":"S3-161971","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161706.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161708","title":"Resolving ENs in key issue #1.15 Termination point of UP security","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17780,"status":"withdrawn","reservation_date":"2016-10-31 08:48:31","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161709","title":"Resolving the Editor\u2019s notes in Key Issue#1.16","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16300,"status":"revised","reservation_date":"2016-10-31 08:52:04","uploaded":"2016-10-31 09:01:44","revisionof":"","revisedto":"S3-161972","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161709.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161711","title":"Resolving the Editor\u2019s notes in Key Issue#1.16","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":18260,"status":"withdrawn","reservation_date":"2016-10-31 08:52:33","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161728","title":"Alternative architecture for storage of a key in the HMPLN when the NG-UE is roaming","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16780,"status":"revised","reservation_date":"2016-10-31 09:37:06","uploaded":"2016-10-31 14:42:31","revisionof":"","revisedto":"S3-161978","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161728.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161735","title":"pCR update of solution # 1.6 to include more details on the roaming scenario","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16790,"status":"revised","reservation_date":"2016-10-31 09:37:06","uploaded":"2016-10-31 14:42:31","revisionof":"","revisedto":"S3-161979","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161735.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161747","title":"pCR to TR 33.899, radio interface user plane integrity, evaluation","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16320,"status":"revised","reservation_date":"2016-10-31 10:05:02","uploaded":"2016-10-31 14:40:06","revisionof":"","revisedto":"S3-161974","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161747.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161748","title":"pCR to TR 33.899, periodic local authentication and packet count check, evaluation","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16740,"status":"revised","reservation_date":"2016-10-31 10:07:30","uploaded":"2016-10-31 14:40:06","revisionof":"","revisedto":"S3-161976","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161748.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161750","title":"pCR to TR 33.899, radio interface user plane encryption, evaluation","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16330,"status":"approved","reservation_date":"2016-10-31 10:09:20","uploaded":"2016-10-31 14:40:06","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161750.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161761","title":"pCR to TR33.899, Use of a Non removable USIM for all UE security","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17080,"status":"revised","reservation_date":"2016-10-31 10:21:03","uploaded":"2016-10-31 15:01:26","revisionof":"","revisedto":"S3-161984","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161761.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161768","title":"pCR to TR 33.899: Evaluation of Solution #1.2, Periodic local authentication and packet count check","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":18730,"status":"withdrawn","reservation_date":"2016-10-31 10:29:56","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161769","title":"pCR to TR33.899 - Solutions for Low Latency Security Issues","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17060,"status":"revised","reservation_date":"2016-10-31 10:32:11","uploaded":"2016-10-31 14:57:08","revisionof":"","revisedto":"S3-161983","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161769.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161826","title":"Termination point for user plane security","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16240,"status":"revised","reservation_date":"2016-10-31 12:09:32","uploaded":"2016-10-31 12:20:19","revisionof":"","revisedto":"S3-161970","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161826.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161870","title":"Single termination point for NAS security","source":"Nokia","contact":"Guenther Horn","contact-id":13803,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17030,"status":"revised","reservation_date":"2016-10-31 13:20:32","uploaded":"2016-10-31 14:32:29","revisionof":"","revisedto":"S3-161982","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161870.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161873","title":"SA3 decisions on security architecture needed by SA2","source":"Nokia","contact":"Guenther Horn","contact-id":13803,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16230,"status":"revised","reservation_date":"2016-10-31 13:23:20","uploaded":"2016-10-31 14:32:29","revisionof":"","revisedto":"S3-162047","release":"","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161873.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161968","title":"LS on state of SA3 discussions on NG security architecture","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":196800,"status":"approved","reservation_date":"2016-11-11 12:24:27","uploaded":"2016-11-11 12:24:27","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161968.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161970","title":"Termination point for user plane security","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16241,"status":"noted","reservation_date":"2016-11-11 16:00:23","uploaded":"2016-11-11 16:00:23","revisionof":"S3-161826","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161970.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161971","title":"Resolving ENs in key issue #1.15 Termination point of UP security","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16261,"status":"approved","reservation_date":"2016-11-11 11:30:50","uploaded":"2016-11-11 11:30:50","revisionof":"S3-161706","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161971.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161972","title":"Resolving the Editor\u2019s notes in Key Issue#1.16","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16301,"status":"approved","reservation_date":"2016-11-10 09:53:48","uploaded":"2016-11-10 09:53:48","revisionof":"S3-161709","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161972.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161973","title":"Flexible security policies negotiation in control plane","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16311,"status":"approved","reservation_date":"2016-11-10 09:14:16","uploaded":"2016-11-10 09:14:16","revisionof":"S3-161678","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161973.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161974","title":"pCR to TR 33.899, radio interface user plane integrity, evaluation","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16321,"status":"approved","reservation_date":"2016-11-11 12:48:27","uploaded":"2016-11-11 12:48:27","revisionof":"S3-161747","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161974.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161975","title":"Clarification on Solution#1.1 and #1.3","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16671,"status":"approved","reservation_date":"2016-11-11 11:30:50","uploaded":"2016-11-11 11:30:50","revisionof":"S3-161667","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161975.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161976","title":"pCR to TR 33.899, periodic local authentication and packet count check, evaluation","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16741,"status":"approved","reservation_date":"2016-11-11 12:48:27","uploaded":"2016-11-11 12:48:27","revisionof":"S3-161748","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161976.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161977","title":"pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16751,"status":"approved","reservation_date":"2016-11-11 10:17:58","uploaded":"2016-11-11 10:17:58","revisionof":"S3-161632","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161977.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161978","title":"Alternative architecture for storage of a key in the HMPLN when the NG-UE is roaming","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16781,"status":"approved","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161728","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161978.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161979","title":"pCR update of solution # 1.6 to include more details on the roaming scenario","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16791,"status":"approved","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161735","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161979.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161980","title":"pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17001,"status":"approved","reservation_date":"2016-11-11 10:17:58","uploaded":"2016-11-11 10:17:58","revisionof":"S3-161631","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161980.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161981","title":"Terminologies update and modification on key hierarchy in solution #1.9","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17011,"status":"approved","reservation_date":"2016-11-10 09:53:48","uploaded":"2016-11-10 09:53:48","revisionof":"S3-161702","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161981.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161982","title":"Single termination point for NAS security","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17031,"status":"approved","reservation_date":"2016-11-09 19:54:16","uploaded":"2016-11-09 19:54:16","revisionof":"S3-161870","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161982.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161983","title":"pCR to TR33.899 - Solutions for Low Latency Security Issues","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17061,"status":"approved","reservation_date":"2016-11-11 12:48:27","uploaded":"2016-11-11 12:48:27","revisionof":"S3-161769","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161983.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161984","title":"pCR to TR33.899, Use of a Non removable USIM for all UE security","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":17081,"status":"approved","reservation_date":"2016-11-11 12:48:27","uploaded":"2016-11-11 12:48:27","revisionof":"S3-161761","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161984.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162047","title":"SA3 decisions on security architecture needed by SA2","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":49,"ainumber":"8.6.1","ainame":"Security architecture","tdoc_agenda_sort_order":16231,"status":"noted","reservation_date":"2016-11-14 18:12:38","uploaded":"2016-11-14 18:12:38","revisionof":"S3-161873","revisedto":"","release":"","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162047.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]