[{"name":"S3-161300","title":"Agenda","source":"WG Chairman","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"agenda","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":1,"ainumber":"2","ainame":"Approval of agenda and meeting objectives","tdoc_agenda_sort_order":13000,"status":"approved","reservation_date":"2016-08-09 12:57:01","uploaded":"2016-08-09 12:57:51","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161300.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161301","title":"TCG progress report","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"report","for":"Information","abstract":"This contribution provides a brief summary of the progress in TCG Working Groups as of September 12, 2015. It also provides a URL to additional resources regarding TCG NetEq WG.","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13010,"status":"noted","reservation_date":"2016-09-14 12:51:58","uploaded":"2016-09-20 12:29:48","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161301.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161302","title":"Key Issue #11.4: On demand security framework","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Decision","abstract":"This PCR provides changes for Key Issue #11.4: On demand security framework. Authors incorporated comments from one of the SA3 NextGen calls received for the original contribution in S3-160944.","secretary_remarks":"-","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":13020,"status":"revised","reservation_date":"2016-09-14 13:21:35","uploaded":"2016-09-20 12:29:48","revisionof":"S3-160944","revisedto":"S3-161517","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161302.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161303","title":"Key Issue #11.3: User control of security","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key Issue #11.3: User control of security. Authors incorporated comments from one of the SA3 NextGen calls received for the original contribution in S3-160941.","secretary_remarks":"-","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":13030,"status":"approved","reservation_date":"2016-09-14 13:36:31","uploaded":"2016-09-20 12:29:48","revisionof":"S3-160941","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161303.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161304","title":"Key issue #6.y: Authorization decoupled from Authentication","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides content for the new Key issue #6.y: Authorization decoupled from Authentication. Authors incorporated comments SA3#84 and one of the SA3 NextGen calls received for the original contribution in S3-160951.","secretary_remarks":"-","agenda_item_sort_order":9,"ainumber":"4.7","ainame":"Authorization","tdoc_agenda_sort_order":13040,"status":"revised","reservation_date":"2016-09-14 14:18:37","uploaded":"2016-09-20 12:29:48","revisionof":"S3-160951","revisedto":"S3-161514","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161304.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161305","title":"Key issue #5.1: Secure storage and processing of credentials and identities","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides changes for Key issue #5.1: Secure storage and processing of credentials and identities. Authors incorporated changes in terminology and comments from one of the SA3 NextGen calls received for the original contribution in S3-160940.","secretary_remarks":"-","agenda_item_sort_order":8,"ainumber":"4.6","ainame":"Security within NG-UE","tdoc_agenda_sort_order":13050,"status":"noted","reservation_date":"2016-09-14 15:06:33","uploaded":"2016-09-20 12:29:48","revisionof":"S3-160940","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161305.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161306","title":"Discussion on NextGen Security Architecture","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"discussion","for":"Discussion","abstract":"This presentation aims to start a discussion about the need of target NextGen security architecture to be flexible, allowing on-demand association between Core Network (CN) and RAN, and replacing transfer of root key with key derivation.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13060,"status":"noted","reservation_date":"2016-09-15 16:33:46","uploaded":"2016-09-20 12:29:48","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161306.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161307","title":"Key Issue 1.3 User plane integrity between UE and network","source":"BlackBerry UK Limited","contact":"Nicholas Alfano","contact-id":16849,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes to allow the option for a UE to connect to a network without user plane integrity protection (encryption) operating at the radio interface. This option would only be invoked if all user data was encrypted at a higher layer.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13070,"status":"withdrawn","reservation_date":"2016-09-15 19:13:53","uploaded":"2016-09-15 19:24:39","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161307.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161308","title":"Identity Management","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"","abstract":"This contribution raises the issue of identity management in the security framework of NextGen,, it proposes to take the issue into the study area of security  architecture in the  work program (33.899)","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13080,"status":"noted","reservation_date":"2016-09-17 17:48:37","uploaded":"2016-09-20 17:51:32","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161308.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161309","title":"Security Layer: Identity and Slice Management","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13090,"status":"noted","reservation_date":"2016-09-17 17:54:43","uploaded":"2016-09-20 17:52:11","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161309.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161310","title":"To KI#2.3: Use of Additional Credentials in AKA","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13100,"status":"noted","reservation_date":"2016-09-17 18:04:15","uploaded":"2016-09-20 17:54:17","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161310.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161311","title":"To KI#2.3: Minimum Root Credential Set for Authentication and Authorization","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13110,"status":"noted","reservation_date":"2016-09-17 18:06:33","uploaded":"2016-09-20 17:56:16","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161311.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161312","title":"To KI#2.3: Service Isolation by Credentials","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13120,"status":"noted","reservation_date":"2016-09-17 18:08:08","uploaded":"2016-09-20 17:56:59","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161312.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161313","title":"KI#3.3.y: Data Structure of  Security Association","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13130,"status":"revised","reservation_date":"2016-09-17 18:10:57","uploaded":"2016-09-20 17:58:13","revisionof":"","revisedto":"S3-161470","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161313.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161314","title":"To KI#2.2: Knowledge-Split  for Long Term Secrecy","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13140,"status":"revised","reservation_date":"2016-09-17 18:16:28","uploaded":"2016-09-20 17:58:13","revisionof":"","revisedto":"S3-161468","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161314.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161315","title":"Security Monitoring and Management","source":"ZTE Corporation","contact":"David Huo","contact-id":19203,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13150,"status":"revised","reservation_date":"2016-09-17 18:21:57","uploaded":"2016-09-20 17:58:13","revisionof":"","revisedto":"S3-161469","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161315.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161316","title":"Security Architecture for Network Slicing","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for the Key Issue #8.3 Security on UEs\u2019 access to slices of TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13160,"status":"noted","reservation_date":"2016-09-18 09:02:42","uploaded":"2016-09-19 10:35:01","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161316.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161317","title":"Scenarios for key sharing between slices","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose scenarios for key sharing between slices that authenticating UE\u2019s access to slices needs to consider","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13170,"status":"approved","reservation_date":"2016-09-19 03:07:45","uploaded":"2016-09-22 05:14:35","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161317.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161318","title":"Solution for UE access network and slices","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose a solution for UE access network and slices","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13180,"status":"revised","reservation_date":"2016-09-19 03:13:26","uploaded":"2016-09-22 05:14:35","revisionof":"","revisedto":"S3-161460","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161318.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161319","title":"Additional Security Requirements on credential storage","source":"ORANGE, Telecom Italia, Gemalto, Deutsche Telekom, Oberthur, Giesecke&Devrient","contact":"Todor Gamishev","contact-id":58178,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":8,"ainumber":"4.6","ainame":"Security within NG-UE","tdoc_agenda_sort_order":13190,"status":"revised","reservation_date":"2016-09-19 09:18:52","uploaded":"2016-09-19 09:22:57","revisionof":"S3-161160","revisedto":"S3-161511","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161319.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161320","title":"Blocking the UE which repeat authentication in a short period","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution of preventing massive number of UEs from repeatedly initiating the authentication process at a short time.","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13200,"status":"revised","reservation_date":"2016-09-19 09:28:51","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"S3-161501","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161320.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161321","title":"Potential security requirements on gNB","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution proposes some security requirements on gNB in order to protect the integrity of setting and software and the confidentiality of sensitive data.","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":13210,"status":"available","reservation_date":"2016-09-19 09:33:04","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161321.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161322","title":"Security Key Refresh Triggered by UE","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution presents a key refresh solution triggered by UE","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13220,"status":"available","reservation_date":"2016-09-19 09:35:48","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161322.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161323","title":"Mutual Authentication and Security Agreement","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution proposes a Next Generation Mutual Authentication and Security Agreement (NG-MASA) solution.","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13230,"status":"revised","reservation_date":"2016-09-19 09:41:37","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"S3-161444","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161323.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161324","title":"Adding security requirements of low latency","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution presents security requirements of low latency","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13240,"status":"revised","reservation_date":"2016-09-19 09:44:11","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"S3-161485","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161324.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161325","title":"Automatic anti-Dos for user plane","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"This contribution presents Automatic anti-Dos for user plane","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":13250,"status":"available","reservation_date":"2016-09-19 09:47:11","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161325.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161326","title":"Mutual Authentication and Security Agreement","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Discussion","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13260,"status":"noted","reservation_date":"2016-09-19 09:49:28","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161326.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161327","title":"Potential security requirements on Relay","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":11,"ainumber":"4.9","ainame":"Relay security","tdoc_agenda_sort_order":13270,"status":"available","reservation_date":"2016-09-19 09:51:41","uploaded":"2016-09-19 10:21:25","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161327.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161328","title":"Integrity protection of UE supported algorithms and UE\u2019s preferences","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13280,"status":"noted","reservation_date":"2016-09-19 09:56:02","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161328.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161329","title":"Add security threats and potential requirements for KI#1.11","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13290,"status":"revised","reservation_date":"2016-09-19 09:57:34","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"S3-161486","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161329.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161330","title":"Introduce D-H algorithm negotiation method in Solution #3.1","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13300,"status":"available","reservation_date":"2016-09-19 09:59:05","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161330.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161331","title":"Network Management and Deployment Security","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13310,"status":"revised","reservation_date":"2016-09-19 10:01:12","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"S3-161524","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161331.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161332","title":"DoS from External Network","source":"Huawei;Hisillicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13320,"status":"available","reservation_date":"2016-09-19 10:04:19","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161332.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161333","title":"new security area: Security between NG UE and NG CN","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13330,"status":"noted","reservation_date":"2016-09-19 10:05:39","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161333.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161334","title":"Clarification on relation between flexible UP-traffic protection and slicing\/heterogeneous access network","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13340,"status":"approved","reservation_date":"2016-09-19 10:07:06","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161334.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161335","title":"threats of control plane between UE and network","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13350,"status":"revised","reservation_date":"2016-09-19 10:08:29","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"S3-161483","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161335.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161336","title":"Security of NAS signallings before security activation","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13360,"status":"available","reservation_date":"2016-09-19 10:11:14","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161336.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161337","title":"Clarify the meaning of \u201cno interworking with GSM\/GPRS, UMTS\u201d","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":15,"ainumber":"4.13","ainame":"Interworking and migration","tdoc_agenda_sort_order":13370,"status":"available","reservation_date":"2016-09-19 10:12:54","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161337.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161338","title":"Potential requirements for Key Issue 6.2 Network authorization","source":"Deutsche Telekom AG","contact":"Sven Lachmund","contact-id":62366,"tdoctype":"pCR","for":"Approval","abstract":"This pCR adds yet missing potential security requirements to Key Issue 6.2 on Newtwork authorization, where the UE\/user can decide to authorize the AN to be used.","secretary_remarks":"-","agenda_item_sort_order":9,"ainumber":"4.7","ainame":"Authorization","tdoc_agenda_sort_order":13380,"status":"revised","reservation_date":"2016-09-19 14:17:06","uploaded":"2016-09-19 14:40:21","revisionof":"","revisedto":"S3-161513","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161338.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161339","title":"Correction of reference inside TR.33.899 (editorial change)","source":"Deutsche Telekom AG","contact":"Sven Lachmund","contact-id":62366,"tdoctype":"pCR","for":"Approval","abstract":"This pCR corrects a reference pointing to the wrong clause in Key Issue 7.2 on subscriber privacy in TR 33.899","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13390,"status":"available","reservation_date":"2016-09-19 14:24:24","uploaded":"2016-09-19 14:40:21","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161339.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161340","title":"Refreshing CN short-term subscriber identifiers","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13400,"status":"revised","reservation_date":"2016-09-19 15:26:54","uploaded":"2016-09-20 12:37:29","revisionof":"","revisedto":"S3-161461","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161340.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161341","title":"Untrusted non-3GPP access - key issue","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds a key issue on untrusted non-3GPP access","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13410,"status":"revised","reservation_date":"2016-09-19 19:05:25","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"S3-161531","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161341.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161342","title":"Untrusted non 3GPP access - proposedsolution","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for the untrusted non-3GPP access in the NG system.","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13420,"status":"revised","reservation_date":"2016-09-19 19:09:41","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"S3-161532","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161342.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161343","title":"Trusted non-3GPP access - key issue","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution adds a key issue on trusted non-3GPP access.","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13430,"status":"approved","reservation_date":"2016-09-19 19:16:35","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161343.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161344","title":"Trusted non 3GPP access - proposed solution","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution for the trusted non-3GPP access in the NG system.","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13440,"status":"approved","reservation_date":"2016-09-19 19:19:14","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161344.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161345","title":"Security aspects of dual connectivity","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes additions to dual connectivity clause.","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":13450,"status":"available","reservation_date":"2016-09-19 19:22:25","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161345.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161346","title":"Connectionless access for small data solution","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"","abstract":"This contribution presents connectionless access security solution for small data","secretary_remarks":"-","agenda_item_sort_order":16,"ainumber":"4.14","ainame":"Small data","tdoc_agenda_sort_order":13460,"status":"available","reservation_date":"2016-09-19 19:26:48","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161346.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161347","title":"Network Slice initial attach and authentication","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes network slice authentication scenario where the default CCNF itself hosts the network slice for the UE or the default CCNF selects and assigns a different network slice serving CCNF for serving the UE.","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13470,"status":"revised","reservation_date":"2016-09-19 19:29:41","uploaded":"2016-09-20 13:10:11","revisionof":"","revisedto":"S3-161528","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161347.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161348","title":"pCR to TR 33.899: Update of a solution on key hierarchy for 5G security","source":"NEC Corporation","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"This pCR updates a solution of #1.4 Key hierarchy in the security area of architectural aspects of 5G security in TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13480,"status":"revised","reservation_date":"2016-09-20 02:25:41","uploaded":"2016-09-20 04:35:47","revisionof":"","revisedto":"S3-161488","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161348.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161349","title":"pCR to TR 33.899: Proposal of group security for 5G security","source":"NEC Corporation","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13490,"status":"noted","reservation_date":"2016-09-20 02:27:40","uploaded":"2016-09-20 04:35:47","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161349.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161350","title":"Removal of Editor's Notes of Solution 8.1","source":"NEC Corporation","contact":"Hironori Ito","contact-id":65573,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13500,"status":"noted","reservation_date":"2016-09-20 02:29:29","uploaded":"2016-09-20 04:35:47","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161350.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161351","title":"Authentication and Key Agreement for non-3GPP access","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes a proposal for Authentication and Key Agreement procedure between the UE and the NextGen core network via for non-3GPP access.","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13510,"status":"revised","reservation_date":"2016-09-20 03:10:39","uploaded":"2016-09-20 04:05:36","revisionof":"","revisedto":"S3-161530","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161351.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161352","title":"Missing Bearer Management Definition for Non-3GPP Access","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"discussion","for":"Decision","abstract":"This contribution discusses bearer management aspect of NextGen for non-3GPP access","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13520,"status":"revised","reservation_date":"2016-09-20 03:19:41","uploaded":"2016-09-20 04:05:36","revisionof":"","revisedto":"S3-161457","release":"Rel-14","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161352.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161353","title":"Network access for remote credential provisioning - security considerations","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Discussion","abstract":"This paper looks at the various security aspects that need to be considered while granting network access for remote credential provisioning of a UE.","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13530,"status":"noted","reservation_date":"2016-09-20 03:31:05","uploaded":"2016-09-20 10:08:17","revisionof":"","revisedto":"","release":"Rel-14","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161353.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161354","title":"Discussion on  Attach procedure for Remote Provisioning in Response to SA2 LS S2-165175","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"discussion","for":"Decision","abstract":"This contribution discusses Remote Provisioning in Response to SA2 LS (S2-165175).","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13540,"status":"noted","reservation_date":"2016-09-20 03:31:38","uploaded":"2016-09-20 04:05:36","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161354.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161355","title":"Remote credential provisioning - for headed devices using captive portal technique","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes solutions for remote credential provisioning for headed devices using as method similar to what used in Wi-Fi captive portal technique.","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13550,"status":"withdrawn","reservation_date":"2016-09-20 03:35:09","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161356","title":"pCR to TR 33.899 - Definitions of Identifiers","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"This pCR provides definitions for additional set of identifiers.","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13560,"status":"revised","reservation_date":"2016-09-20 03:35:29","uploaded":"2016-09-20 10:08:17","revisionof":"","revisedto":"S3-161526","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161356.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161357","title":"Remote credential provisioning \u2013 Add Headless IoT device to existing User\u2019s MNO subscription","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes solutions for remote network operator credential provisioning for headless IoT devices using a companion","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13570,"status":"withdrawn","reservation_date":"2016-09-20 03:39:19","uploaded":"2016-09-20 04:05:36","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161357.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161358","title":"LS to SA1 on Update on definitions of identifiers","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"LS out","for":"Approval","abstract":"This LS provides an update to SA1 on SA3's agreement on definition of the various identifiers \nin TR 33.899","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13580,"status":"revised","reservation_date":"2016-09-20 03:44:27","uploaded":"2016-09-20 10:07:49","revisionof":"","revisedto":"S3-161527","release":"Rel-14","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161358.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161359","title":"pCR to TR 33.899: Solution #1.z Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes a solution to Key Issues of \u201c#1 Architectural aspects of NextGen security\u201c","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13590,"status":"revised","reservation_date":"2016-09-20 03:50:15","uploaded":"2016-09-20 05:11:49","revisionof":"","revisedto":"S3-161489","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161359.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161360","title":"Remote credential provisioning \u2013 Add Headless IoT device to existing User\u2019s subscription","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes solutions for remote network operator credential provisioning for headless IoT devices using a companion.","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13600,"status":"revised","reservation_date":"2016-09-20 05:06:01","uploaded":"2016-09-20 05:17:55","revisionof":"","revisedto":"S3-161520","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161360.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161361","title":"An authentication solution for service provider connectivity","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13610,"status":"revised","reservation_date":"2016-09-20 07:39:58","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"S3-161503","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161361.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161362","title":"UP protection for PDU session (re)establishment triggered by handover","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13620,"status":"revised","reservation_date":"2016-09-20 07:44:28","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"S3-161508","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161362.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161363","title":"Key hierarchy and the related procedure","source":"Huawei, HiSilicon, KPN","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13630,"status":"revised","reservation_date":"2016-09-20 07:46:23","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"S3-161490","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161363.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161364","title":"Solution for Security Mechanism Differentiation for Network Slices","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13640,"status":"noted","reservation_date":"2016-09-20 07:48:04","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161364.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161365","title":"Alternative 3GPP Credentials based on Identity-based Cryptography","source":"Huawei, HiSilicon,","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13650,"status":"noted","reservation_date":"2016-09-20 07:49:53","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161365.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161366","title":"Prevent UP DoS Attack over Air Interface","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":13660,"status":"available","reservation_date":"2016-09-20 07:51:37","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161366.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161367","title":"Protect the Permanent or Long Termn User Identity with Public Key Techologies","source":"Huawei, HiSilicon,","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13670,"status":"available","reservation_date":"2016-09-20 07:53:48","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161367.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161368","title":"Non-AKA Authentication Procedures for Alternative 3GPP Credentials","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13680,"status":"revised","reservation_date":"2016-09-20 07:55:33","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"S3-161504","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161368.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161369","title":"Remote Provisioning for IoT devices through a Companion UE","source":"Huawei, Hisilicon, China Mobile, Deutsche Telekom AG, KPN","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13690,"status":"noted","reservation_date":"2016-09-20 07:57:33","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161369.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161370","title":"Small Data Protection","source":"Huawei, HiSilicon,","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":16,"ainumber":"4.14","ainame":"Small data","tdoc_agenda_sort_order":13700,"status":"available","reservation_date":"2016-09-20 07:59:16","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161370.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161371","title":"Aggregate Authentication for massive IoT","source":"Huawei, Hisilicon,","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13710,"status":"revised","reservation_date":"2016-09-20 08:01:06","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"S3-161505","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161371.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161372","title":"Mutual Authentication between Remote UE and Network over A Relay","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13720,"status":"revised","reservation_date":"2016-09-20 08:02:56","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"S3-161506","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161372.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161373","title":"Modification on Solution #1.5: User plane security policy and key derivation","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13730,"status":"revised","reservation_date":"2016-09-20 08:05:53","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"S3-161484","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161373.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161374","title":"pCR_amendment to security requirements and threats for key issue #8.3","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13740,"status":"approved","reservation_date":"2016-09-20 08:07:47","uploaded":"2016-09-20 08:12:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161374.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161375","title":"Clarify the KI #1.7 and modify the corresponding solution","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13750,"status":"approved","reservation_date":"2016-09-20 08:14:22","uploaded":"2016-09-20 08:20:20","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161375.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161376","title":"Security threats and potential requirements for KI#1.9 and KI#1.10","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13760,"status":"revised","reservation_date":"2016-09-20 08:16:15","uploaded":"2016-09-20 08:20:20","revisionof":"","revisedto":"S3-161487","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161376.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161377","title":"Basic security call flow for UE initial attach","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13770,"status":"revised","reservation_date":"2016-09-20 08:18:41","uploaded":"2016-09-20 08:20:20","revisionof":"","revisedto":"S3-161492","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161377.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161378","title":"Secure Mechanism to Achieve Remote Credential Provisioning for IoT devices","source":"Huawei, HiSilicon, Deutsche Telekom AG","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13780,"status":"revised","reservation_date":"2016-09-20 08:21:54","uploaded":"2016-09-20 08:23:43","revisionof":"","revisedto":"S3-161522","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161378.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161379","title":"pCR Security enhancement to the attach procedure without relying on PKI","source":"China Mobile Com. Corporation","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13790,"status":"available","reservation_date":"2016-09-20 08:50:12","uploaded":"2016-09-20 08:56:23","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161379.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161380","title":"pCR Security enhancement to the attach procedure relying on PKI","source":"China Mobile Com. Corporation","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13800,"status":"available","reservation_date":"2016-09-20 08:52:07","uploaded":"2016-09-20 08:56:23","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161380.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161381","title":"Solution for Key issue #2.4: Device identifier authentication","source":"China Mobile Com. Corporation","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13810,"status":"revised","reservation_date":"2016-09-20 09:11:27","uploaded":"2016-09-20 09:47:21","revisionof":"","revisedto":"S3-161507","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161381.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161382","title":"Introducing RAN terminology and correcting privacy terminology","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":64718,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":13820,"status":"available","reservation_date":"2016-09-20 09:40:54","uploaded":"2016-09-20 12:37:29","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161382.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161383","title":"FS_NSA: cryptographic algorithms","source":"Gemalto N.V.","contact":"Mireille Pauliac","contact-id":23516,"tdoctype":"pCR","for":"Approval","abstract":"It proposes a new security area dealing with cryptographic algorithms","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13830,"status":"revised","reservation_date":"2016-09-20 10:04:10","uploaded":"2016-09-20 10:12:35","revisionof":"","revisedto":"S3-161525","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161383.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161384","title":"5G Privacy - additional requirement on LI aspect in key issue 7.1","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13840,"status":"withdrawn","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:34:55","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161384.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161385","title":"5G Privacy - additional requirement on transmission of identifiers in key issue 7.6","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13850,"status":"withdrawn","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:34:55","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161385.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161386","title":"5G Privacy - clarification to solution 7.1","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13860,"status":"withdrawn","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:34:55","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161386.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161387","title":"5G Privacy - Commenting solution 7.3 and proposal to split from LI issues","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13870,"status":"withdrawn","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:34:55","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161387.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161388","title":"5G Privacy - Commenting solution 7.4","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13880,"status":"available","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:34:55","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161388.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161389","title":"5G Privacy Pseudonym-IMSI","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13890,"status":"revised","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 12:59:40","revisionof":"","revisedto":"S3-161463","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161389.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161390","title":"5G Privacy Pseudonym-IMSI - process steps","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13900,"status":"revised","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 12:59:40","revisionof":"","revisedto":"S3-161464","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161390.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161391","title":"5G Privacy Recovery after pseudonym loss","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13910,"status":"revised","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 12:59:40","revisionof":"","revisedto":"S3-161465","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161391.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161392","title":"5G key identification - key issue","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13920,"status":"available","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:38:42","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161392.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161393","title":"5G key identification - solution","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13930,"status":"available","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:38:42","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161393.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161394","title":"5G interworking - key issue on bidding down attack","source":"Nokia","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":15,"ainumber":"4.13","ainame":"Interworking and migration","tdoc_agenda_sort_order":13940,"status":"available","reservation_date":"2016-09-20 10:06:03","uploaded":"2016-09-20 11:38:42","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161394.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161395","title":"Update of terminology in TR 33.899: identifier, equipment, subscription","source":"Ericsson","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13950,"status":"approved","reservation_date":"2016-09-20 10:40:22","uploaded":"2016-09-20 13:02:07","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161395.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161396","title":"Update to key issue #2.3: Authentication identifiers and credentials","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13960,"status":"revised","reservation_date":"2016-09-20 10:47:33","uploaded":"2016-09-20 13:02:07","revisionof":"","revisedto":"S3-161496","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161396.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161397","title":"Update to solution #2.9: agreed terminology","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13970,"status":"approved","reservation_date":"2016-09-20 10:49:55","uploaded":"2016-09-20 13:02:07","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161397.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161398","title":"Update to solution #2.9: termination of EAP method in the VPLMN","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13980,"status":"revised","reservation_date":"2016-09-20 10:52:01","uploaded":"2016-09-20 13:02:07","revisionof":"","revisedto":"S3-161499","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161398.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161399","title":"Solution for NSA Security Context Management","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13990,"status":"available","reservation_date":"2016-09-20 11:23:45","uploaded":"2016-09-20 11:39:40","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161399.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161400","title":"Authentication in Factory Deployment","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14000,"status":"revised","reservation_date":"2016-09-20 11:24:41","uploaded":"2016-09-20 11:39:40","revisionof":"","revisedto":"S3-161456","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161400.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161401","title":"update of visibility and configurability area","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":14010,"status":"revised","reservation_date":"2016-09-20 11:25:37","uploaded":"2016-09-20 11:39:40","revisionof":"","revisedto":"S3-161516","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161401.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161402","title":"Security visibility solution using indication policy","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":14020,"status":"revised","reservation_date":"2016-09-20 11:26:30","uploaded":"2016-09-20 11:39:40","revisionof":"","revisedto":"S3-161518","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161402.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161403","title":"Security configurability solution using control policy","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":14030,"status":"revised","reservation_date":"2016-09-20 11:27:15","uploaded":"2016-09-20 11:39:40","revisionof":"","revisedto":"S3-161519","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161403.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161404","title":"pCR adding solution on using effective temporary identifier","source":"THALES","contact":"Renaud Moliere","contact-id":63048,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes to add the following solution to answer key issues #7.4 and #7.7.","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14040,"status":"available","reservation_date":"2016-09-20 11:39:05","uploaded":"2016-09-20 11:41:04","revisionof":"","revisedto":"S3-161639","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161404.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161405","title":"Opportunistic encryption for IMSI exchange","source":"THALES","contact":"Renaud Moliere","contact-id":63048,"tdoctype":"pCR","for":"Approval","abstract":"In this solution the UE and the gNB uses opportunistic encryption in order to exchange the IMSI.","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14050,"status":"available","reservation_date":"2016-09-20 11:52:34","uploaded":"2016-09-20 13:43:32","revisionof":"","revisedto":"S3-161620","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161405.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161406","title":"NG authentication functions","source":"Nokia, Vodafone, Telecom Italia, Qualcomm Incorporated","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14060,"status":"revised","reservation_date":"2016-09-20 12:00:06","uploaded":"2016-09-20 13:11:02","revisionof":"","revisedto":"S3-161494","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161406.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161407","title":"Draft LS to SA2 on NG authentication functions","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"LS out","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14070,"status":"revised","reservation_date":"2016-09-20 12:02:33","uploaded":"2016-09-20 13:12:10","revisionof":"","revisedto":"S3-161509","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161407.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161408","title":"Security solution for Infrequent Small Data","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":16,"ainumber":"4.14","ainame":"Small data","tdoc_agenda_sort_order":14080,"status":"available","reservation_date":"2016-09-20 12:03:54","uploaded":"2016-09-20 13:45:22","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161408.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161409","title":"Updating authentication terminology in solution 2.7","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14090,"status":"approved","reservation_date":"2016-09-20 12:05:34","uploaded":"2016-09-20 13:12:10","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161409.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161410","title":"Small data security area introduction","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":16,"ainumber":"4.14","ainame":"Small data","tdoc_agenda_sort_order":14100,"status":"available","reservation_date":"2016-09-20 12:07:40","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161410.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161411","title":"Evaluating solution #2.6 against key issue 2.2","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14110,"status":"revised","reservation_date":"2016-09-20 12:07:58","uploaded":"2016-09-20 13:12:10","revisionof":"","revisedto":"S3-161498","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161411.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161412","title":"Key issues in Small data","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":16,"ainumber":"4.14","ainame":"Small data","tdoc_agenda_sort_order":14120,"status":"available","reservation_date":"2016-09-20 12:08:29","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161412.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161413","title":"Requirements for NG-UE","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":8,"ainumber":"4.6","ainame":"Security within NG-UE","tdoc_agenda_sort_order":14130,"status":"noted","reservation_date":"2016-09-20 12:09:26","uploaded":"2016-09-20 13:46:37","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161413.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161414","title":"pCR for adding a solution for key issue #1.13: Security Implications of Low Latency","source":"THALES","contact":"Christiane KAMENI NGASSA","contact-id":64495,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes a solution dealing with the key issues #1.13\u201cSecurity Implications of Low Latency\u201d.","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14140,"status":"revised","reservation_date":"2016-09-20 12:09:58","uploaded":"2016-09-20 12:14:03","revisionof":"","revisedto":"S3-161493","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161414.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161415","title":"Details on key issue #4.4: Security aspects of intra-NR mobility","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":14150,"status":"available","reservation_date":"2016-09-20 12:11:02","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"S3-161864","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161415.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161416","title":"Updates for Solution #2.8 (Authentication Framework)","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14160,"status":"revised","reservation_date":"2016-09-20 12:11:25","uploaded":"2016-09-20 13:21:53","revisionof":"","revisedto":"S3-161495","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161416.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161417","title":"Evaluating solution #2.6 against key issue 3.1","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":14170,"status":"available","reservation_date":"2016-09-20 12:11:49","uploaded":"2016-09-20 13:12:10","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161417.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161418","title":"Details on key issue #4.5: Security aspects of WLAN aggregation","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":14180,"status":"available","reservation_date":"2016-09-20 12:11:58","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"S3-161863","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161418.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161419","title":"Solution for Credentials Provisioning","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":14190,"status":"revised","reservation_date":"2016-09-20 12:12:59","uploaded":"2016-09-20 13:21:53","revisionof":"","revisedto":"S3-161523","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161419.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161420","title":"Making UP security termination point a key issue of its own","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14200,"status":"revised","reservation_date":"2016-09-20 12:13:13","uploaded":"2016-09-20 13:58:12","revisionof":"","revisedto":"S3-161462","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161420.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161421","title":"Making UP protection granularity a key issue of its own","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14210,"status":"revised","reservation_date":"2016-09-20 12:13:58","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"S3-161481","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161421.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161422","title":"Resolving Editor\u2019s Note on UE behaviour in reading the SIB","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":14220,"status":"available","reservation_date":"2016-09-20 12:14:35","uploaded":"2016-09-20 13:21:53","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161422.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161423","title":"Interconnection Security Key Issue","source":"Nokia, Telecom Italia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14230,"status":"approved","reservation_date":"2016-09-20 12:15:15","uploaded":"2016-09-20 13:13:18","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161423.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161424","title":"Resolving Editor\u2019s Note on provisioning of public keys to the UE","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":14240,"status":"available","reservation_date":"2016-09-20 12:15:51","uploaded":"2016-09-20 13:21:53","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161424.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161425","title":"Making On-demand security policy a key issue of its own","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14250,"status":"revised","reservation_date":"2016-09-20 12:16:51","uploaded":"2016-09-20 13:17:28","revisionof":"","revisedto":"S3-161482","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161425.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161426","title":"Interconnection Security - Circles of Trust","source":"Nokia, Telecom Italia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14260,"status":"revised","reservation_date":"2016-09-20 12:18:12","uploaded":"2016-09-20 13:13:18","revisionof":"","revisedto":"S3-161515","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161426.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161427","title":"Discussion on key-free secured pairing and protected radio access to network","source":"THALES","contact":"Christiane KAMENI NGASSA","contact-id":64495,"tdoctype":"discussion","for":"","abstract":"This discussion deals with the current and future threats concerning authentication and long term secret key.","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":14270,"status":"available","reservation_date":"2016-09-20 12:19:06","uploaded":"2016-09-20 12:22:16","revisionof":"","revisedto":"S3-161640","release":"Rel-14","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161427.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161428","title":"Solution proposal for enhancing security of sending of authentication vectors","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14280,"status":"revised","reservation_date":"2016-09-20 12:20:04","uploaded":"2016-09-20 13:13:18","revisionof":"","revisedto":"S3-161497","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161428.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161429","title":"pCR to TR 33.899 v0.3.0 \"Security visibility and configurability\"","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":14290,"status":"approved","reservation_date":"2016-09-20 12:24:10","uploaded":"2016-09-20 13:13:18","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161429.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161430","title":"5G Privacy Evaluation of solutions on P-IMSI and recovery","source":"Nokia Networks","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14300,"status":"revised","reservation_date":"2016-09-20 12:55:19","uploaded":"2016-09-20 12:59:40","revisionof":"","revisedto":"S3-161466","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161430.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161431","title":"Update of solution #1.6 to include roaming architectural aspects","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14310,"status":"revised","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161491","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161431.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161432","title":"Alternative EAP proposal for 3GPP access","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14320,"status":"revised","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:30","revisionof":"","revisedto":"S3-161510","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161432.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161433","title":"Clarifying the scope of the confidentiality and integrity requirements for UE to network control plane message","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14330,"status":"merged","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:30","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161433.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161434","title":"pCR solution to Key Issue # 3.2 on refreshing keys","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":14340,"status":"available","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161734","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161434.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161435","title":"pCR solution to Key Issue # 4.6 User plane DoS attacks","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":7,"ainumber":"4.5","ainame":"RAN security","tdoc_agenda_sort_order":14350,"status":"available","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161733","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161435.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161436","title":"pCR to update solution #7.4: Privacy enhanced Mobile Subscriber Identifier (PMSI)","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14360,"status":"available","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161732","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161436.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161437","title":"pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":14370,"status":"available","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161731","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161437.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161438","title":"New key issue on storage of device credentials","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":8,"ainumber":"4.6","ainame":"Security within NG-UE","tdoc_agenda_sort_order":14380,"status":"revised","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161512","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161438.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161439","title":"Adding requirements to the Key Issue # 5.1","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":8,"ainumber":"4.6","ainame":"Security within NG-UE","tdoc_agenda_sort_order":14390,"status":"noted","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161439.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161440","title":"Moving equipment identifier and credentials related text in Key Issue 2.3 to 2.4","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14400,"status":"approved","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161440.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161441","title":"Updates to Solution 2.10 \u2013 Device Authentication using certificates","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14410,"status":"revised","reservation_date":"2016-09-20 13:20:29","uploaded":"2016-09-20 13:47:29","revisionof":"","revisedto":"S3-161500","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161441.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161442","title":"Remote credential provisioning - for headed devices using captive portal technique","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes solutions for remote credential provisioning for headed devices using as method similar to what used in Wi-Fi captive portal technique","secretary_remarks":"-","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":14420,"status":"revised","reservation_date":"2016-09-20 14:34:36","uploaded":"2016-09-20 14:36:13","revisionof":"","revisedto":"S3-161521","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161442.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161443","title":"pCR to TR 33.899: Temporary Identity refresh parameters","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"Vodafone propose that for any temporary identities, requirements related to the triggers that could cause them to change should be added.","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14430,"status":"available","reservation_date":"2016-09-20 14:52:34","uploaded":"2016-09-20 14:58:41","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161443.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161444","title":"Huawei, Hisilicon, Deutsche Telekom AG","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution proposes a Next Generation Mutual Authentication and Security Agreement (NG-MASA) solution.","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14440,"status":"revised","reservation_date":"2016-09-21 23:46:57","uploaded":"2016-09-22 00:04:03","revisionof":"S3-161323","revisedto":"S3-161502","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161444.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161445","title":"Replaces S3-161384-v0 5G Privacy - additional requirement on LI aspect in key issue 7.1","source":"Nokia, Ericsson","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14450,"status":"available","reservation_date":"2016-09-22 12:02:57","uploaded":"2016-09-22 12:35:53","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161445.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161446","title":"replaces S3-161385-v0 5G Privacy - additional requirement on transmission of identifiers in key issue 7.6","source":"Nokia, Ericsson","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14460,"status":"available","reservation_date":"2016-09-22 12:03:59","uploaded":"2016-09-22 12:35:53","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161446.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161447","title":"replaces S3-161387-v1 5G Privacy - Commenting solution 7 3 and proposal to split from LI issues","source":"Nokia, Ericsson","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14470,"status":"available","reservation_date":"2016-09-22 12:05:20","uploaded":"2016-09-22 12:35:53","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161447.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161448","title":"Nokia comments on Alternative EAP proposal for 3GPP access (S3-161432 by Qualcomm Incorporated)","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14480,"status":"noted","reservation_date":"2016-09-22 12:25:43","uploaded":"2016-09-22 13:30:51","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161448.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161449","title":"Nokia comments on pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities (S3-161437 by Qualcomm Incorporated)","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":14490,"status":"available","reservation_date":"2016-09-22 12:27:18","uploaded":"2016-09-22 13:30:51","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161449.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161450","title":"Letter from Federal Communications Commission","source":"FCC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":14500,"status":"noted","reservation_date":"2016-09-22 12:30:22","uploaded":"2016-09-22 13:38:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161450.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161451","title":"Reply LS on alternative authentication methods and different types of credentials considerations for NextGen network","source":"S1-162559","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":14510,"status":"noted","reservation_date":"2016-09-22 12:33:45","uploaded":"2016-09-22 13:38:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-161159","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161451.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161452","title":"LS on 5G work alignment","source":"S1-162544","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":14520,"status":"noted","reservation_date":"2016-09-22 12:36:44","uploaded":"2016-09-22 13:38:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161452.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161453","title":"Reply LS on \"Next Generation\" Security Requirements","source":"S2-165436","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":14530,"status":"noted","reservation_date":"2016-09-22 13:32:09","uploaded":"2016-09-22 13:38:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-161182","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161453.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161454","title":"LS on \"Attach procedure for Remote SIM Provisioning\u201d","source":"S2-165437","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":14540,"status":"postponed","reservation_date":"2016-09-22 13:36:15","uploaded":"2016-09-22 13:38:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161454.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161455","title":"Key issue #7.y: Need to protect entire Permanent Identifier","source":"INTERDIGITAL COMMUNICATIONS","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This PCR provides content for the new Key Issue #7.y: Need to protect entire Permanent Identifier. The issue was discussed at SA3#84 and the appropriate Editors Note was included in TR 33.899.","secretary_remarks":"-","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14550,"status":"available","reservation_date":"2016-09-22 19:08:56","uploaded":"2016-09-22 19:14:14","revisionof":"","revisedto":"S3-161611","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161455.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161456","title":"Authentication in Factory Deployment","source":"LG Electronics France","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14560,"status":"noted","reservation_date":"2016-09-23 02:54:44","uploaded":"2016-09-23 03:00:26","revisionof":"S3-161400","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161456.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161457","title":"Missing Bearer Management Definition for Non-3GPP Access","source":"Intel Corporation (UK) Ltd","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"discussion","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13521,"status":"noted","reservation_date":"2016-09-26 15:11:52","uploaded":"2016-09-26 15:21:59","revisionof":"S3-161352","revisedto":"","release":"Rel-14","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161457.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161458","title":"LS to 3GPP SA3 on PII protection in the mobile and 5G networks","source":"ETSI TC CYBER","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":145800,"status":"postponed","reservation_date":"2016-09-26 15:14:21","uploaded":"2016-09-26 15:21:59","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161458.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161459","title":"Draft TR 33.899","source":"Rapporteur (Ericsson)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":145900,"status":"approved","reservation_date":"2016-10-11 09:05:17","uploaded":"2016-10-11 11:00:17","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161459.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161460","title":"Solution for UE access network and slices","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13181,"status":"revised","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161318","revisedto":"S3-161529","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161460.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161461","title":"Refreshing CN short-term subscriber identifiers","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13401,"status":"available","reservation_date":"2016-10-05 10:33:50","uploaded":"2016-10-05 10:33:50","revisionof":"S3-161340","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161461.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161462","title":"Making UP security termination point a key issue of its own","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14201,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161420","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161462.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161463","title":"5G Privacy Pseudonym-IMSI","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13891,"status":"available","reservation_date":"2016-09-30 17:03:33","uploaded":"2016-09-30 17:03:33","revisionof":"S3-161389","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161463.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161464","title":"5G Privacy Pseudonym-IMSI - process steps","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13901,"status":"available","reservation_date":"2016-09-30 17:03:33","uploaded":"2016-09-30 17:03:33","revisionof":"S3-161390","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161464.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161465","title":"5G Privacy Recovery after pseudonym loss","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13911,"status":"available","reservation_date":"2016-09-30 17:03:33","uploaded":"2016-09-30 17:03:33","revisionof":"S3-161391","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161465.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161466","title":"5G Privacy Evaluation of solutions on P-IMSI and recovery","source":"Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":14301,"status":"available","reservation_date":"2016-09-30 17:03:33","uploaded":"2016-09-30 17:03:33","revisionof":"S3-161430","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161466.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161467","title":"Guiding principles for evaluation","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":146700,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161467.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161468","title":"To KI#2.2: Knowledge-Split  for Long Term Secrecy","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.8","ainame":"Subscriber privacy","tdoc_agenda_sort_order":13141,"status":"noted","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161314","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161468.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161469","title":"Security Monitoring and Management","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13151,"status":"noted","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161315","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161469.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161470","title":"KI#3.3.y: Data Structure of  Security Association","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13131,"status":"noted","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161313","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161470.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161480","title":"reply to LS on \"Attach procedure for Remote SIM Provisioning\u201d","source":"Huawei","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":148000,"status":"withdrawn","reservation_date":"2016-10-11 09:05:20","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161481","title":"Making UP protection granularity a key issue of its own","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14211,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161421","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161481.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161482","title":"Making On-demand security policy a key issue of its own","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14251,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161425","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161482.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161483","title":"threats of control plane between UE and network","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13351,"status":"approved","reservation_date":"2016-10-06 09:48:15","uploaded":"2016-10-06 09:48:15","revisionof":"S3-161335","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161483.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161484","title":"Modification on Solution #1.5: User plane security policy and key derivation","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13731,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161373","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161484.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161485","title":"Adding security requirements of low latency","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13241,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161324","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161485.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161486","title":"Add security threats and potential requirements for KI#1.11","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13291,"status":"approved","reservation_date":"2016-10-06 09:48:15","uploaded":"2016-10-06 09:48:15","revisionof":"S3-161329","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161486.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161487","title":"Security threats and potential requirements for KI#1.9 and KI#1.10","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13761,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161376","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161487.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161488","title":"pCR to TR 33.899: Update of a solution on key hierarchy for 5G security","source":"NEC Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13481,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161348","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161488.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161489","title":"pCR to TR 33.899: Solution #1.z Key hierarchy for NextGen","source":"NEC EUROPE LTD","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13591,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161359","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161489.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161490","title":"Key hierarchy and the related procedure","source":"Huawei, HiSilicon, KPN","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13631,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161363","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161490.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161491","title":"Update of solution #1.6 to include roaming architectural aspects","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14311,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161431","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161491.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161492","title":"Basic security call flow for UE initial attach","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13771,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161377","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161492.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161493","title":"pCR for adding a solution for key issue #1.13: Security Implications of Low Latency","source":"THALES","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":14141,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161414","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161493.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161494","title":"NG authentication functions","source":"Nokia, Vodafone, Telecom Italia, Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14061,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161406","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161494.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161495","title":"Updates for Solution #2.8 (Authentication Framework)","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14161,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161416","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161495.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161496","title":"Update to key issue #2.3: Authentication identifiers and credentials","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13961,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161396","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161496.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161497","title":"Solution proposal for enhancing security of sending of authentication vectors","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14281,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161428","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161497.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161498","title":"Evaluating solution #2.6 against key issue 2.2","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14111,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161411","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161498.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161499","title":"Update to solution #2.9: termination of EAP method in the VPLMN","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13981,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161398","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161499.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161500","title":"Updates to Solution 2.10 \u2013 Device Authentication using certificates","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14411,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161441","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161500.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161501","title":"Blocking the UE which repeat authentication in a short period","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13201,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161320","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161501.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161502","title":"Huawei, Hisilicon, Deutsche Telekom AG","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14441,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161444","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161502.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161503","title":"An authentication solution for service provider connectivity","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13611,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161361","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161503.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161504","title":"Non-AKA Authentication Procedures for Alternative 3GPP Credentials","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13681,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161368","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161504.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161505","title":"Aggregate Authentication for massive IoT","source":"Huawei, Hisilicon,","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13711,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161371","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161505.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161506","title":"Mutual Authentication between Remote UE and Network over A Relay","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13721,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161372","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161506.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161507","title":"Solution for Key issue #2.4: Device identifier authentication","source":"China Mobile Com. Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13811,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161381","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161507.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161508","title":"UP protection for PDU session (re)establishment triggered by handover","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13621,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161362","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161508.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161509","title":"LS to SA2 on NG authentication functions","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14071,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161407","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161509.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161510","title":"Alternative EAP proposal for 3GPP access","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":14321,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161432","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161510.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161511","title":"Additional Security Requirements on credential storage","source":"ORANGE, Telecom Italia, Gemalto, Deutsche Telekom, Oberthur, Giesecke&Devrient","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"4.6","ainame":"Security within NG-UE","tdoc_agenda_sort_order":13191,"status":"noted","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161319","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161511.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161512","title":"New key issue on storage of device credentials","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"4.6","ainame":"Security within NG-UE","tdoc_agenda_sort_order":14381,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161438","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161512.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161513","title":"Potential requirements for Key Issue 6.2 Network authorization","source":"Deutsche Telekom AG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.7","ainame":"Authorization","tdoc_agenda_sort_order":13381,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161338","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161513.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161514","title":"Key issue #6.y: Authorization decoupled from Authentication","source":"INTERDIGITAL COMMUNICATIONS","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.7","ainame":"Authorization","tdoc_agenda_sort_order":13041,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161304","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161514.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161515","title":"Interconnection Security - Circles of Trust","source":"Nokia, Telecom Italia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.1","ainame":"Network domain security","tdoc_agenda_sort_order":14261,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161426","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161515.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161516","title":"update of visibility and configurability area","source":"LG Electronics France","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":14011,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161401","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161516.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161517","title":"Key Issue #11.4: On demand security framework","source":"INTERDIGITAL COMMUNICATIONS","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":13021,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161302","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161517.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161518","title":"Security visibility solution using indication policy","source":"LG Electronics France","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":14021,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161402","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161518.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161519","title":"Security configurability solution using control policy","source":"LG Electronics France","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"4.11","ainame":"Security visibility and configurability","tdoc_agenda_sort_order":14031,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161403","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161519.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161520","title":"Remote credential provisioning \u2013 Add Headless IoT device to existing User\u2019s subscription","source":"Intel Corporation (UK) Ltd","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13601,"status":"approved","reservation_date":"2016-10-05 10:33:50","uploaded":"2016-10-05 10:33:50","revisionof":"S3-161360","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161520.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161521","title":"Remote credential provisioning - for headed devices using captive portal technique","source":"Intel Corporation (UK) Ltd","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":14421,"status":"approved","reservation_date":"2016-10-05 10:33:50","uploaded":"2016-10-05 10:33:50","revisionof":"S3-161442","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161521.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161522","title":"Secure Mechanism to Achieve Remote Credential Provisioning for IoT devices","source":"Huawei, HiSilicon, Deutsche Telekom AG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":13781,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161378","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161522.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161523","title":"Solution for Credentials Provisioning","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"4.12","ainame":"Credential provisioning","tdoc_agenda_sort_order":14191,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161419","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161523.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161524","title":"Network Management and Deployment Security","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13311,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161331","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161524.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161525","title":"FS_NSA: cryptographic algorithms","source":"Gemalto N.V.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13831,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161383","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161525.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161526","title":"pCR to TR 33.899 - Definitions of Identifiers","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13561,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161356","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161526.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161527","title":"LS to SA1 on Update on definitions of identifiers","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.16","ainame":"Other","tdoc_agenda_sort_order":13581,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161358","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA1","Cc":"SA2","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161527.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161528","title":"Network Slice initial attach and authentication","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13471,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161347","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161528.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161529","title":"Solution for UE access network and slices","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"4.4","ainame":"Network slicing security","tdoc_agenda_sort_order":13182,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161460","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161529.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161530","title":"Authentication and Key Agreement for non-3GPP access","source":"Intel Corporation (UK) Ltd","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.2","ainame":"Authentication","tdoc_agenda_sort_order":13511,"status":"approved","reservation_date":"2016-10-05 10:33:50","uploaded":"2016-10-05 10:33:50","revisionof":"S3-161351","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161530.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161531","title":"Untrusted non-3GPP access - key issue","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13411,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161341","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161531.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161532","title":"Untrusted non 3GPP access - proposedsolution","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13421,"status":"approved","reservation_date":"2016-09-30 17:00:33","uploaded":"2016-09-30 17:00:33","revisionof":"S3-161342","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161532.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]