[{"name":"S3-161729","title":"Isolation of slices using UP security terminating in the network","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17400,"status":"revised","reservation_date":"2016-10-31 09:37:06","uploaded":"2016-10-31 14:42:31","revisionof":"","revisedto":"S3-162110","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161729.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161740","title":"Solution for Security Mechanism Differentiation for Network Slices","source":"HUAWEI TECHNOLOGIES Co. Ltd.","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17410,"status":"revised","reservation_date":"2016-10-31 09:37:49","uploaded":"2016-10-31 09:42:49","revisionof":"","revisedto":"S3-162111","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161740.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161741","title":"Network authentication supporting network slices","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17880,"status":"revised","reservation_date":"2016-10-31 09:39:48","uploaded":"2016-10-31 09:42:49","revisionof":"","revisedto":"S3-162112","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161741.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161745","title":"Security Architecture for Network Slicing","source":"CATT, CATR","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17350,"status":"revised","reservation_date":"2016-10-31 10:03:11","uploaded":"2016-10-31 12:53:40","revisionof":"","revisedto":"S3-162114","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161745.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161788","title":"Clarifications on the Solutions for Network Slicing Security","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds texts and updates figures to clarify the solutions 8.2 & 8.3 for network slicing security key issue #8.3.","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17290,"status":"approved","reservation_date":"2016-10-31 11:00:40","uploaded":"2016-10-31 11:25:37","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161788.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161789","title":"Slice authentication","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17890,"status":"revised","reservation_date":"2016-10-31 11:01:20","uploaded":"2016-10-31 11:07:28","revisionof":"","revisedto":"S3-162113","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161789.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161903","title":"PCO based User Authentication and authorization for Slice access","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"Protocol Configuration Options (PCO) based authentication for slice access","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":19610,"status":"approved","reservation_date":"2016-10-31 14:18:06","uploaded":"2016-10-31 14:20:35","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161903.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161961","title":"Comments on contribution S3-161789","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Approval","abstract":"S3-161789 proposes secondary authentication in the slice as the only means of authenticating UE\u2019s access to a network slice.  In this discussion paper we analyze latest SA2 agreements and propose to move secondary authentication to phase 2.","secretary_remarks":"-","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":19030,"status":"noted","reservation_date":"2016-11-02 14:33:29","uploaded":"2016-11-02 14:44:31","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161961.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162110","title":"Isolation of slices using UP security terminating in the network","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17401,"status":"approved","reservation_date":"2016-11-11 14:26:38","uploaded":"2016-11-11 14:26:38","revisionof":"S3-161729","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162110.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162111","title":"Solution for Security Mechanism Differentiation for Network Slices","source":"HUAWEI TECHNOLOGIES Co. Ltd.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17411,"status":"approved","reservation_date":"2016-11-11 13:22:07","uploaded":"2016-11-11 13:22:07","revisionof":"S3-161740","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162111.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162112","title":"Network authentication supporting network slices","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17881,"status":"approved","reservation_date":"2016-11-11 13:22:07","uploaded":"2016-11-11 13:22:07","revisionof":"S3-161741","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162112.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162113","title":"Slice authentication","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17891,"status":"approved","reservation_date":"2016-11-11 13:22:07","uploaded":"2016-11-11 13:22:07","revisionof":"S3-161789","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162113.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162114","title":"Security Architecture for Network Slicing","source":"CATT, CATR","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":56,"ainumber":"8.6.8","ainame":"Network slicing security","tdoc_agenda_sort_order":17351,"status":"approved","reservation_date":"2016-11-11 13:22:07","uploaded":"2016-11-11 13:22:07","revisionof":"S3-161745","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162114.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]