[{"name":"S3-200050","title":"Agenda","source":"WG Chair","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"agenda","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":1,"ainumber":"1","ainame":"Agenda and meeting objectives","tdoc_agenda_sort_order":500,"status":"approved","reservation_date":"2020-02-05 15:31:10","uploaded":"2020-02-13 10:09:10","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200050.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200051","title":"LS to 3GPP SA3 to consider appropriate authorization and authentication when providing network slice access","source":"GSMA","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":510,"status":"replied to","reservation_date":"2020-02-05 15:39:03","uploaded":"2020-02-13 10:06:36","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-200442, S3-200442","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200051.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200052","title":"LS on Sending CAG ID","source":"S2-2001616","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":520,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:36","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200052.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200053","title":"Reply LS on Sending CAG ID in NAS layer","source":"R2-1916349","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":530,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:36","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200053.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200054","title":"Reply LS on PC5S and PC5 RRC unicast message protection","source":"R2-1916461","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":540,"status":"noted","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:36","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200054.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200055","title":"Reply LS on LS on PC5S and PC5 RRC unicast message protection","source":"S2-1912002","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":550,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:36","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200055.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200056","title":"Reply LS on PC5 unicast and groupcast security protection","source":"S2-2000971","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":560,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:36","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200056.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200057","title":"LS on NR V2X Security issue and PDCP SN size","source":"R2-1916467","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":570,"status":"replied to","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"S3-200478, S3-200478","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200057.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200058","title":"Reply LS on NSI requirements","source":"S1-193596","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":580,"status":"noted","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200058.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200059","title":"Reply LS on NPN clarifications","source":"S1-193605","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":590,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200059.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200060","title":"Reply LS on SUCI computation from an NSI","source":"S2-1912417","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":600,"status":"noted","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200060.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200061","title":"Reply LS on token-based authorization for indirect communication with delegated discovery (Scenario D)","source":"S2-1912657","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":610,"status":"noted","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200061.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200062","title":"Reply LS on clarification on the requirement for steering of roaming","source":"S2-1912764","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":620,"status":"noted","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200062.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200063","title":"LS on Further clarifications on GLI\/GCI and Line ID\/ HFC_Identifier","source":"S2-1912767","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":630,"status":"noted","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200063.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200064","title":"Reply LS on 5G-S-TMSI Truncation Procedure","source":"S2-2001248","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":640,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200064.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200065","title":"Reply LS to Transfer the study on service-based support for SMS in 5GC to CT WGs","source":"SP-191362","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":650,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200065.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200066","title":"Reply LS to LS on analytics support for energy saving","source":"SP-191378","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":660,"status":"noted","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200066.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200067","title":"Reply LS on AUSF role in slice specific authentication","source":"S2-1910668","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":670,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200067.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200068","title":"LS on security consideration of performance measurement function protocol","source":"C1-196940","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":680,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200068.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200069","title":"Reply LS on how the IWF obtains key material for interworking group and private communications","source":"S6-192194","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":690,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200069.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200070","title":"LS on native 5G NAS security context activation","source":"C1-199003","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":700,"status":"replied to","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-200517, S3-200529","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200070.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200071","title":"LS on ARPF in UDICOM","source":"C4-195553","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":710,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200071.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200072","title":"LS on uniqueness of PEI in certain FN-RG configurations","source":"s3i200069","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":720,"status":"postponed","reservation_date":"2020-02-05 15:39:06","uploaded":"2020-02-13 10:06:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200072.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200073","title":"TS 33.536 - Security procedure for unicast messages over PC5","source":"InterDigital Communications","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes the security procedure for unicast messages over PC5 for normative work, as concluded in TR 33.836, i.e., the initiating UE uses the entire session identifier, Kd session ID, to identify the security context for a given peer UE","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":730,"status":"merged","reservation_date":"2020-02-05 17:32:03","uploaded":"2020-02-20 18:26:45","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.1","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200073.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200074","title":"TS 33.536 - Privacy protection procedure for unicast messages over PC5","source":"InterDigital Communications","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This contribution describes the procedure for privacy protection of unicast messages over PC5 for normative work, as concluded in TR 33.836, i.e., changing the layer 2 identities of both peer UEs and the Key ID at the same time.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":740,"status":"merged","reservation_date":"2020-02-05 17:45:24","uploaded":"2020-02-20 18:26:45","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.1","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200074.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200075","title":"TS 33.536 - Privacy protection requirements for unicast messages over PC5","source":"InterDigital Communications","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides the requirements for privacy protection of unicast messages over PC5 for normative work. It ports the approved requirements from TR 33.836.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":750,"status":"merged","reservation_date":"2020-02-05 17:53:16","uploaded":"2020-02-20 18:26:45","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.1","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200075.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200076","title":"TS 33.536 - Security requirements for unicast messages over PC5","source":"InterDigital Communications","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides the requirements for security protection of unicast messages over PC5 for normative work. It ports the approved requirements from TR 33.836.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":760,"status":"merged","reservation_date":"2020-02-05 17:59:13","uploaded":"2020-02-20 18:26:45","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.1","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200076.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200077","title":"Security requirements for unicast mode","source":"Oy LM Ericsson AB","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"pCR","for":"Agreement","abstract":"This contribution proposes to add the security requirements for unicast mode.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":770,"status":"merged","reservation_date":"2020-02-14 11:59:06","uploaded":"2020-02-14 12:40:16","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200077.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200078","title":"Discussion on the Support of Multi-CU-UP connectivity in Rel-17","source":"China Telecom Corporation Ltd.","contact":"sen xu","contact-id":83316,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":780,"status":"noted","reservation_date":"2020-02-14 12:23:07","uploaded":"2020-02-19 04:15:38","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200078.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200079","title":"Study on the security of Multi-CU-UP connectivity","source":"China Telecom,CATT,Xiaomi,vivo","contact":"sen xu","contact-id":83316,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":790,"status":"revised","reservation_date":"2020-02-15 09:45:21","uploaded":"2020-02-21 06:57:36","revisionof":"","revisedto":"S3-200341","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200079.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200080","title":"[33.180] R16 - Formatting corrections","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Fix table title formatting","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":800,"status":"agreed","reservation_date":"2020-02-19 18:45:55","uploaded":"2020-02-21 01:26:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.2.0","workitem":[{"winame":"MCXSec"}],"crnumber":135.0,"crrevision":"","crcategory":"D","tsg_crp":"SP-200135","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200080.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200081","title":"[33.180] R16 - MC Gateway security","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add security for interconnection when using an MC gateway server.","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":810,"status":"revised","reservation_date":"2020-02-19 18:50:05","uploaded":"2020-02-21 01:26:33","revisionof":"","revisedto":"S3-200514","release":"Rel-16","crspec":33.18,"crspecversion":"16.2.0","workitem":[{"winame":"MCXSec"}],"crnumber":136.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200081.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200082","title":"[33.434] SEAL key management procedure","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Approval","abstract":"key management procedure for a SEAL UE to acquire key material","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":820,"status":"noted","reservation_date":"2020-02-19 18:55:52","uploaded":"2020-02-21 01:26:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200082.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200083","title":"AGF-side SEG option","source":"Juniper Networks","contact":"Steve Kohalmi","contact-id":37299,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":830,"status":"agreed","reservation_date":"2020-02-19 19:12:52","uploaded":"2020-02-21 00:21:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":712.0,"crrevision":"","crcategory":"C","tsg_crp":"SP-200145","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200083.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200084","title":"[33.180] R16 MC location authorization","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add authorization for location services","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":840,"status":"agreed","reservation_date":"2020-02-20 00:07:03","uploaded":"2020-02-21 01:26:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.2.0","workitem":[{"winame":"MCXSec"}],"crnumber":137.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200135","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200084.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200085","title":"TS 33.536 - Common Security Requirement over NR PC5","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides the requirements that can applied for all communication modes over NR PC5. It brings the approved requirements from TR 33.836.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":850,"status":"noted","reservation_date":"2020-02-20 04:46:57","uploaded":"2020-02-21 00:30:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200085.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200086","title":"TS 33.536 - Common Security Procedure over NR PC5","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides the procedure  that can applied for all communication modes over NR PC5.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":860,"status":"noted","reservation_date":"2020-02-20 04:51:10","uploaded":"2020-02-21 00:30:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200086.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200087","title":"TS 33.536 - Text for general clauses","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides introductory text for general clauses in TS 33.536","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":870,"status":"approved","reservation_date":"2020-02-20 04:53:50","uploaded":"2020-02-21 00:30:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200087.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200088","title":"TS 33.536 - Clean-up for broadcast and groupcast","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This contribution suggests renaming of some clauses along the text lines for clarification","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":880,"status":"approved","reservation_date":"2020-02-20 04:58:34","uploaded":"2020-02-21 00:30:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200088.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200089","title":"Reply LS to RAN2 on FBS detection","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":890,"status":"withdrawn","reservation_date":"2020-02-20 08:55:11","uploaded":"2020-02-20 09:18:08","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"RAN2","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200089.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200090","title":"VAL Client authentication","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":900,"status":"withdrawn","reservation_date":"2020-02-20 12:48:20","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200090.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200091","title":"[Draft CR]Solution for IAB Architecture (Baseline version)","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"draftCR","for":"Approval","abstract":"Re-submission of S3-194596, agreed in the last meeting. Baseline for the IAB normative work (TS 33.501).","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":910,"status":"revised","reservation_date":"2020-02-20 12:48:25","uploaded":"2020-02-20 13:12:25","revisionof":"","revisedto":"S3-200443","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200091.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200092","title":"Security requirement update in clause 5.1","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":920,"status":"withdrawn","reservation_date":"2020-02-20 12:53:08","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200092.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200093","title":"[Draft CR] F1 interface set-up procedure","source":"Samsung, Thales, Nokia, Nokia Shanghai Bell","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":930,"status":"noted","reservation_date":"2020-02-20 12:54:57","uploaded":"2020-02-20 13:12:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200093.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200094","title":"Security for SEAL interfaces","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":940,"status":"withdrawn","reservation_date":"2020-02-20 12:55:27","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200094.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200095","title":"Annex X: OpenID Connect","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":950,"status":"withdrawn","reservation_date":"2020-02-20 12:57:34","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200095.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200096","title":"[Draft CR] Cleanup of IAB draft CR","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":960,"status":"approved","reservation_date":"2020-02-20 12:57:39","uploaded":"2020-02-20 13:12:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200096.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200097","title":"Terminology alignment","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":970,"status":"withdrawn","reservation_date":"2020-02-20 13:00:52","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200097.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200098","title":"Group key management in SEAL","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":980,"status":"withdrawn","reservation_date":"2020-02-20 13:02:48","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200098.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200099","title":"Key generation and distribution in SEAL","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":990,"status":"withdrawn","reservation_date":"2020-02-20 13:04:29","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200099.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200100","title":"Security policy handling for NR PC5","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1000,"status":"withdrawn","reservation_date":"2020-02-20 13:07:44","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200100.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200101","title":"AKMA key derivation","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1010,"status":"withdrawn","reservation_date":"2020-02-20 13:10:56","uploaded":"2020-02-20 15:33:52","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200101.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200102","title":"UP security in TSC","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1020,"status":"withdrawn","reservation_date":"2020-02-20 13:15:45","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":713.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200102.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200103","title":"Wayforward for UP security in TSC","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1030,"status":"withdrawn","reservation_date":"2020-02-20 13:18:40","uploaded":"2020-02-20 14:28:38","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200103.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200104","title":"Alignment of the term NPN","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1040,"status":"withdrawn","reservation_date":"2020-02-20 13:23:06","uploaded":"2020-02-20 15:33:52","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":714.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200104.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200105","title":"NF and NRF mutual Authentication during Indirect communication","source":"Mavenir, Deutsche Telekom AG","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"discussion","for":"Endorsement","abstract":"Mutual authentication between the NF and NRF is required for access token authorization","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":1050,"status":"noted","reservation_date":"2020-02-20 17:28:04","uploaded":"2020-02-20 23:36:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200105.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200106","title":"Clarification of Indirect Communication Mutual Authentication","source":"Mavenir, Deutsche Telekom AG, Nokia","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"Removing ambiguity regarding mutual authentication between NFs within same PLMN during Indirect communication, e.g., with SCP as a proxy service node","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":1060,"status":"not pursued","reservation_date":"2020-02-20 17:28:04","uploaded":"2020-02-20 23:36:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":715.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200106.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200107","title":"V2X UE source IP address randomization","source":"Futurewei Technologies","contact":"Marcus Wong","contact-id":82314,"tdoctype":"discussion","for":"Discussion","abstract":"This contribution discusses the source UE IP address randomization .","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1070,"status":"noted","reservation_date":"2020-02-20 19:55:28","uploaded":"2020-02-20 23:00:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200107.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200108","title":"eV2X UE source IP address randomization","source":"Futurewei Technologies","contact":"Marcus Wong","contact-id":82314,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes to enhance the requirement on UE source IP address randomization.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1080,"status":"approved","reservation_date":"2020-02-20 20:00:27","uploaded":"2020-02-20 23:00:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200108.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200109","title":"Referencing Annex I for non-public networks in untrusted non-3GPP access case","source":"CableLabs, Nokia, Nokia Shanghai Bell, Charter Communications","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1090,"status":"not pursued","reservation_date":"2020-02-20 22:33:42","uploaded":"2020-02-20 22:39:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":716.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200109.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200110","title":"[33.180] R16 SeGy IWF corrections","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"The implementation of security within a SeGy for interworking is not clear.","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":1100,"status":"revised","reservation_date":"2020-02-21 00:52:57","uploaded":"2020-02-21 01:26:33","revisionof":"","revisedto":"S3-200515","release":"Rel-16","crspec":33.18,"crspecversion":"16.2.0","workitem":[{"winame":"MCXSec"}],"crnumber":138.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200110.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200111","title":"Discussion paper on SA2 LS S2-2001730 on AMF reallocation via RAN r-routing","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1110,"status":"noted","reservation_date":"2020-02-21 01:56:02","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200111.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200112","title":"draft reply LS to SA2 LS S2-2001730 on AMF reallocation","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1120,"status":"noted","reservation_date":"2020-02-21 01:58:37","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200112.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200113","title":"draft reply LS to CT1 LS S3-200070 on activating 5G native NAS context","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1130,"status":"noted","reservation_date":"2020-02-21 02:06:44","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200113.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200114","title":"draft reply LS to CT1 on PMF protocol security","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1140,"status":"noted","reservation_date":"2020-02-21 02:08:43","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200114.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200115","title":"draft reply LS to SA2 LS on AUSF role in slice specific authentication","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1150,"status":"noted","reservation_date":"2020-02-21 02:12:23","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200115.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200116","title":"Discussion paper on AUSF role for Network Slice specific authentication","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1160,"status":"noted","reservation_date":"2020-02-21 02:14:27","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200116.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200117","title":"Enhanced Network Slicing living CR from SA3#97","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1170,"status":"noted","reservation_date":"2020-02-21 02:16:18","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200117.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200118","title":"draft CR for clause x.x.3 Slice specific authentication of living CR","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1180,"status":"noted","reservation_date":"2020-02-21 02:19:28","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200118.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200119","title":"draft CR for clause x.x.4 of Enhanced Network Slicing Living CR","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1190,"status":"noted","reservation_date":"2020-02-21 02:21:11","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200119.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200120","title":"draft CR for clause x.x.5 AAA triggered revocation of eNS living CR","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1200,"status":"noted","reservation_date":"2020-02-21 02:22:55","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200120.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200121","title":"draft CR for clause 14 AUSF services of eNS living CR","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1210,"status":"noted","reservation_date":"2020-02-21 02:24:28","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200121.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200122","title":"Discussion on GSMA LS 5GSTF20_001  on appropriate authentication for Network slice","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1220,"status":"noted","reservation_date":"2020-02-21 02:29:09","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200122.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200123","title":"draft reply to GSMA LS 5GSTF20_001  on NS authentication","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1230,"status":"merged","reservation_date":"2020-02-21 02:30:47","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200123.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200124","title":"Discussion on V2X LS R2-1916467","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1240,"status":"noted","reservation_date":"2020-02-21 02:32:58","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200124.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200125","title":"draft reply LS to RAN2 on V2X PDCP SN size and security","source":"Nokia Germany","contact":"Suresh Nair","contact-id":70166,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1250,"status":"noted","reservation_date":"2020-02-21 02:34:45","uploaded":"2020-02-21 14:23:41","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200125.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200126","title":"reply LS on security consideration of performance measurement function protocol","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":1260,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"ATSSS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"C1-196940\/S3-200068","lsto":"CT1","Cc":"SA2","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200126.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200127","title":"Discussion on AMF Reallocation via RAN re-routing","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":1270,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1"},{"winame":"TEI16"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200127.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200128","title":"reply LS on AMF Reallocation via RAN re-routing","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":1280,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1"},{"winame":"TEI16"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S2-2001730","lsto":"SA2","Cc":"TSG SA","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200128.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200129","title":"Adding UDM to AKMA reference model","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1290,"status":"revised","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"S3-200511","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200129.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200130","title":"AKMA anchor key identifier update","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1300,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200130.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200131","title":"resolve EN in clause 6.1","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1310,"status":"merged","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200131.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200132","title":"resolve EN in clause 6.2","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1320,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200132.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200133","title":"AKMA anchor Key push","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1330,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200133.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200134","title":"network initials AKMA anchor key update","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1340,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200134.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200135","title":"UE initials AKMA anchor key update","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1350,"status":"noted","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200135.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200136","title":"Update 6.2","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1360,"status":"revised","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"S3-200512","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200136.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200137","title":"Corrections in clause 6.1.2-R16","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1370,"status":"withdrawn","reservation_date":"2020-02-21 02:44:29","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":717.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200137.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200138","title":"Corrections in clause 6.1.2-R15","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1380,"status":"withdrawn","reservation_date":"2020-02-21 02:44:33","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":718.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200138.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200139","title":"Clarification for distribution of subscriber identities and security data in clause 6.3.1.2-R16","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1390,"status":"withdrawn","reservation_date":"2020-02-21 02:44:35","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":719.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200139.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200140","title":"Clarification for distribution of subscriber identities and security data in clause 6.3.1.2-R15","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1400,"status":"withdrawn","reservation_date":"2020-02-21 02:44:37","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":720.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200140.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200141","title":"remove the EN in clause 6.8.1.2.4-R16","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1410,"status":"withdrawn","reservation_date":"2020-02-21 02:44:38","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":721.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200141.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200142","title":"remove the EN in clause 6.8.1.2.4-R15","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1420,"status":"withdrawn","reservation_date":"2020-02-21 02:44:39","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":722.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200142.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200143","title":"Security handling in registration with AMF re-allocation via direct NAS reroute-R16","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1430,"status":"not pursued","reservation_date":"2020-02-21 02:44:40","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":723.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200143.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200144","title":"Security handling in registration with AMF re-allocation via direct NAS reroute-R15","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1440,"status":"withdrawn","reservation_date":"2020-02-21 02:44:41","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":724.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200144.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200145","title":"remove the EN in clause 13.2.3.6-R16","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1450,"status":"withdrawn","reservation_date":"2020-02-21 02:44:42","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":725.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200145.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200146","title":"remove the EN in clause 13.2.3.6-R15","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1460,"status":"withdrawn","reservation_date":"2020-02-21 02:44:43","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":726.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200146.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200147","title":"Remove the EN in clause 13.5-R16","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1470,"status":"withdrawn","reservation_date":"2020-02-21 02:44:44","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":727.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200147.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200148","title":"Remove the EN in clause 13.5-R15","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1480,"status":"withdrawn","reservation_date":"2020-02-21 02:44:45","uploaded":"2020-02-21 10:51:39","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":728.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200148.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200149","title":"Discussion on AUSF role","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1490,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200149.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200150","title":"Draft LS reply to SA2 on AUSF","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1500,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"SA2","lsto":"SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200150.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200151","title":"Draft LS reply to GSMA on slice access","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1510,"status":"revised","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"S3-200442","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"GSMA","lsto":"GSMA","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200151.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200152","title":"Discussion paper for Rel17 SID on UAS","source":"Huawei, HiSilicon, China Unicom, CATT","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":1520,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200152.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200153","title":"Study on security aspects of UAS Remote Identification and Application","source":"Huawei, HiSilicon, China Unicom, CATT","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":1530,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:35","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200153.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200154","title":"Discussion paper for Rel17 SID on network slicing security","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":1540,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:35","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200154.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200155","title":"New SID on security aspects of network slicing - RAN and Phase 2","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":1550,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:35","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200155.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200156","title":"Security procedures for network slices","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1560,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200156.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200157","title":"Addressing ENs in security procedures for network slices","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1570,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200157.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200158","title":"Addessing EN on transmitting NSSAI to AAA","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1580,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200158.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200159","title":"CR to slice management on NSaaS","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":1590,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200159.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200160","title":"Adding UP security policy for 5GLAN groups","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1600,"status":"merged","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200160.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200161","title":"Discussion paper on eV2X groupcast privacy","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1610,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200161.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200162","title":"Adding privacy procedures for V2X Groupcast communications","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1620,"status":"noted","reservation_date":"2020-02-21 03:15:22","uploaded":"2020-02-21 09:53:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.1.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200162.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200163","title":"VAL Client authentication","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":1630,"status":"revised","reservation_date":"2020-02-21 04:34:26","uploaded":"2020-02-21 05:41:13","revisionof":"","revisedto":"S3-200451","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200163.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200164","title":"Security requirement update in clause 5.1","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":1640,"status":"approved","reservation_date":"2020-02-21 04:37:12","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200164.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200165","title":"Security procedure for SEAL interfaces","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":1650,"status":"merged","reservation_date":"2020-02-21 04:40:59","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200165.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200166","title":"Annex X: OpenID Connect","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":1660,"status":"revised","reservation_date":"2020-02-21 04:42:58","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"S3-200452","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200166.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200167","title":"Terminology alignment","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":1670,"status":"approved","reservation_date":"2020-02-21 04:45:00","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200167.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200168","title":"Group key management in SEAL","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":1680,"status":"noted","reservation_date":"2020-02-21 04:46:58","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200168.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200169","title":"Key generation and distribution in SEAL","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":1690,"status":"noted","reservation_date":"2020-02-21 04:48:48","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200169.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200170","title":"Security policy handling for NR PC5","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1700,"status":"merged","reservation_date":"2020-02-21 04:51:38","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200170.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200171","title":"AKMA key derivation","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1710,"status":"noted","reservation_date":"2020-02-21 04:53:46","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200171.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200172","title":"UP security in TSC","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1720,"status":"not pursued","reservation_date":"2020-02-21 04:57:26","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":729.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200172.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200173","title":"Wayforward for UP security in TSC","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1730,"status":"noted","reservation_date":"2020-02-21 05:00:02","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200173.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200174","title":"Alignment of the term NPN","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":1740,"status":"not pursued","reservation_date":"2020-02-21 05:02:51","uploaded":"2020-02-21 05:43:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":730.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200174.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200175","title":"Reply LS to LS on native 5G NAS security context activation","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"LS out","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1750,"status":"revised","reservation_date":"2020-02-21 05:32:39","uploaded":"2020-02-21 07:12:31","revisionof":"","revisedto":"S3-200517","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200070","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200175.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200176","title":"Security of RRC UE capability transfer procedure in 5G for CIoT optimisation","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":1760,"status":"noted","reservation_date":"2020-02-21 05:41:27","uploaded":"2020-02-21 07:12:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200176.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200177","title":"Procedure to transfer UE capability for UEs without AS Security","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"discussion","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":1770,"status":"noted","reservation_date":"2020-02-21 06:02:59","uploaded":"2020-02-21 07:12:31","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200177.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200178","title":"New SID on the security of the system enablers for devices having multiple Universal Subscriber Identity Modules (USIM)","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"SID new","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":1780,"status":"noted","reservation_date":"2020-02-21 06:05:58","uploaded":"2020-02-21 07:12:31","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200178.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200179","title":"Discussion on new SID Security Study on system enablers for devices having multiple USIMS","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":1790,"status":"noted","reservation_date":"2020-02-21 06:08:11","uploaded":"2020-02-21 07:12:31","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200179.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200180","title":"Security of RRC UE capability transfer procedure in EPS","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":1800,"status":"revised","reservation_date":"2020-02-21 06:15:59","uploaded":"2020-02-21 07:12:31","revisionof":"","revisedto":"S3-200516","release":"Rel-15","crspec":33.401,"crspecversion":"15.10.0","workitem":[{"winame":"TEI15"}],"crnumber":688.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200180.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200181","title":"Add description of the KAKMA Key ID allocation","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1810,"status":"noted","reservation_date":"2020-02-21 07:46:22","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200181.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200182","title":"Add the functionalities of the AUSF into clause 4.2","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":1820,"status":"noted","reservation_date":"2020-02-21 07:55:18","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200182.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200183","title":"Modification on the RRC connection resume procedure","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1830,"status":"not pursued","reservation_date":"2020-02-21 08:01:03","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":731.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200183.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200184","title":"Discussion for AS rekeying failure on Xn-Handover","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"discussion","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1840,"status":"withdrawn","reservation_date":"2020-02-21 08:06:36","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200184.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200185","title":"Clarification on AS rekeying failure","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1850,"status":"withdrawn","reservation_date":"2020-02-21 08:10:46","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":732.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200185.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200186","title":"Clarification on the Xn-Handover procedure","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1860,"status":"withdrawn","reservation_date":"2020-02-21 08:15:28","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":733.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200186.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200187","title":"LS reply to RAN WG2 LS on NR V2X Security issue and PDCP SN size","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":1870,"status":"revised","reservation_date":"2020-02-21 08:22:05","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"S3-200478","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200187.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200188","title":"Adding a clause of \"Threats related to key reuse\" for the eNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to add a new key reuse threat for the eNB.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":1880,"status":"revised","reservation_date":"2020-02-21 08:27:20","uploaded":"2020-02-21 13:58:43","revisionof":"","revisedto":"S3-200502","release":"Rel-16","crspec":33.926,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_eNB"},{"winame":"TEI16"}],"crnumber":31.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200188.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200189","title":"Draft CR as a living baseline for 5GS LCS normative work","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"3.7","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":1890,"status":"approved","reservation_date":"2020-02-21 08:27:28","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200189.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200190","title":"Removing ENs in Draft CR as a living baseline for 5GS LCS normative work","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"3.7","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":1900,"status":"noted","reservation_date":"2020-02-21 08:31:18","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200190.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200191","title":"Updating the clause of \"Key Reuse\" for the gNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to update the key reuse threat for the gNB.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":1910,"status":"revised","reservation_date":"2020-02-21 08:32:19","uploaded":"2020-02-21 13:58:43","revisionof":"","revisedto":"S3-200503","release":"Rel-16","crspec":33.926,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":32.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200191.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200192","title":"Study on Security Aspects of Enhancement for Proximity Based Services in 5GS","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":1920,"status":"noted","reservation_date":"2020-02-21 08:35:55","uploaded":"2020-02-21 09:01:07","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200192.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200193","title":"Authorization in the Subscribe-Notify interaction scenarios","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":1930,"status":"noted","reservation_date":"2020-02-21 08:55:51","uploaded":"2020-02-21 10:52:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200193.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200194","title":"Resource-based authorization","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":1940,"status":"noted","reservation_date":"2020-02-21 08:55:51","uploaded":"2020-02-21 10:52:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200194.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200195","title":"Discussion on authentication result removal","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1950,"status":"withdrawn","reservation_date":"2020-02-21 08:55:51","uploaded":"2020-02-21 10:52:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200195.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200196","title":"JSON object modification - R15","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1960,"status":"withdrawn","reservation_date":"2020-02-21 08:55:51","uploaded":"2020-02-21 09:33:35","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":734.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200196.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200197","title":"JSON object modification - R16","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1970,"status":"withdrawn","reservation_date":"2020-02-21 08:55:52","uploaded":"2020-02-21 09:33:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":735.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200197.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200198","title":"SUCI computation clarification - R15","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1980,"status":"withdrawn","reservation_date":"2020-02-21 08:55:53","uploaded":"2020-02-21 09:33:35","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":736.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200198.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200199","title":"SUCI computation clarification - R16","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":1990,"status":"withdrawn","reservation_date":"2020-02-21 08:55:54","uploaded":"2020-02-21 09:33:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":737.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200199.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200200","title":"compatibility issue in resume request protection","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2000,"status":"withdrawn","reservation_date":"2020-02-21 08:55:55","uploaded":"2020-02-21 09:33:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200200.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200201","title":"New test case on NAS integrity protection","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":2010,"status":"revised","reservation_date":"2020-02-21 08:55:55","uploaded":"2020-02-21 09:54:29","revisionof":"","revisedto":"S3-200473","release":"Rel-16","crspec":33.512,"crspecversion":"16.1.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":5.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200201.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200202","title":"Solving registration failure in registration procedure with AMF reallocation","source":"Huawei, Hisilicon\nCMCC,ChinaTelecom","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2020,"status":"not pursued","reservation_date":"2020-02-21 08:55:56","uploaded":"2020-02-21 09:54:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":738.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200202.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200203","title":"Clarification on AMF reallocation via direct NAS reroute","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2030,"status":"withdrawn","reservation_date":"2020-02-21 08:55:58","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":739.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200204","title":"Clarification on AMF reallocation via direct NAS reroute","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2040,"status":"not pursued","reservation_date":"2020-02-21 08:55:59","uploaded":"2020-02-21 09:54:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":740.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200204.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200205","title":"Discussion on horizontal Kamf derivation in direct NAS reroute","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2050,"status":"noted","reservation_date":"2020-02-21 08:56:00","uploaded":"2020-02-21 09:54:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200205.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200206","title":"Discussion on AMF reallocation","source":"Huawei, Hisilicon\nCMCC,ChinaTelecom","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2060,"status":"noted","reservation_date":"2020-02-21 08:56:00","uploaded":"2020-02-21 09:54:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200206.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200207","title":"Discussion on slice separation","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2070,"status":"noted","reservation_date":"2020-02-21 08:56:01","uploaded":"2020-02-21 09:54:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200207.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200208","title":"LS reply to SA2 on AMF reallocation","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2080,"status":"noted","reservation_date":"2020-02-21 08:56:01","uploaded":"2020-02-21 10:08:11","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200208.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200209","title":"Clarification on confidential IEs replacement handling in original N32-f message","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":2090,"status":"not pursued","reservation_date":"2020-02-21 08:56:01","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.517,"crspecversion":"16.1.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":2.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200209.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200210","title":"Clarification on the clause 4.3.6.4 according to TS 29.501","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":2100,"status":"revised","reservation_date":"2020-02-21 08:56:02","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"S3-200497","release":"Rel-16","crspec":33.117,"crspecversion":"16.3.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":57.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200210.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200211","title":"eV2X: PC5 UP security policy activation","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2110,"status":"revised","reservation_date":"2020-02-21 08:56:03","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"S3-200468","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200211.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200212","title":"eV2X: PC5 key hierarchy","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2120,"status":"merged","reservation_date":"2020-02-21 08:56:03","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200212.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200213","title":"Discussion on CAG access control authorization","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":2130,"status":"noted","reservation_date":"2020-02-21 08:56:03","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200213.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200214","title":"New SID: Study on Security Aspects of Enhancement of Support for Edge Computing in 5GC","source":"Huawei, Hisilicon, China Unicom, CAICT, China Telecom, ZTE","contact":"Bo Zhang","contact-id":49401,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2140,"status":"noted","reservation_date":"2020-02-21 08:56:03","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200214.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200215","title":"Clarification on NF consumer instance ID verification","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2150,"status":"not pursued","reservation_date":"2020-02-21 08:56:03","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200215.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200216","title":"AKMA: Key ID generation","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2160,"status":"revised","reservation_date":"2020-02-21 08:56:03","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"S3-200499","release":"Rel-16","crspec":33.535,"crspecversion":"0.0.2","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200216.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200217","title":"Clarification on exposure of confidential IEs in N32-f message in TR 33.926","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":2170,"status":"not pursued","reservation_date":"2020-02-21 08:56:03","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.926,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":33.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200217.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200218","title":"eV2X: requirements for algorithm","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2180,"status":"merged","reservation_date":"2020-02-21 08:56:04","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200218.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200219","title":"eV2X: Discussion on LC ID used for PDCP protection","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2190,"status":"noted","reservation_date":"2020-02-21 08:56:04","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200219.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200220","title":"Clarification on native 5G NAS security context activation after an inter-system change from S1 mode to N1 mode in idle mode in Rel15","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2200,"status":"not pursued","reservation_date":"2020-02-21 08:56:04","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":741.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200220.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200221","title":"Mirror for clarification on native 5G NAS security context activation after an inter-system change from S1 mode to N1 mode in idle mode in Rel16","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2210,"status":"not pursued","reservation_date":"2020-02-21 08:56:06","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":742.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200221.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200222","title":"[DRAFT] Reply LS on native 5G NAS security context activation","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2220,"status":"noted","reservation_date":"2020-02-21 08:56:07","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200222.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200223","title":"Clarification on PLMN ID verification","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":2230,"status":"revised","reservation_date":"2020-02-21 08:56:07","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"S3-200498","release":"Rel-16","crspec":33.117,"crspecversion":"16.3.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":58.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200223.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200224","title":"Clarification on IPX certificate acquirement in SEPP","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2240,"status":"withdrawn","reservation_date":"2020-02-21 08:56:08","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":743.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200224.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200225","title":"Mirror for clarification on IPX certificate acquirement in SEPP","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2250,"status":"withdrawn","reservation_date":"2020-02-21 08:56:09","uploaded":"2020-02-21 09:28:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":744.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200225.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200226","title":"Address the ENs on Security procedures for Small Data Transfer in Control Plane CIoT 5GS Optimisation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":2260,"status":"revised","reservation_date":"2020-02-21 09:21:26","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200474","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200226.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200227","title":"Address EN for Calculation of ShortResumeMAC-I for UP CIoT Optimisation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":2270,"status":"noted","reservation_date":"2020-02-21 09:21:27","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200227.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200228","title":"Address the ENs on Security handling in User Plane CIoT 5GS Optimisation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":2280,"status":"revised","reservation_date":"2020-02-21 09:21:27","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200475","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200228.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200229","title":"Security handling for UP data protection for UP CIoT 5GS Opmitization","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":2290,"status":"revised","reservation_date":"2020-02-21 09:21:27","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200476","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200229.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200230","title":"UE handling on CHO key derivation for NR","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2300,"status":"revised","reservation_date":"2020-02-21 09:21:27","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200477","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":745.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200230.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200231","title":"UE handling on CHO key derivation for LTE","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2310,"status":"revised","reservation_date":"2020-02-21 09:21:31","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200479","release":"Rel-16","crspec":33.401,"crspecversion":"16.1.0","workitem":[{"winame":"TEI"}],"crnumber":689.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200231.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200232","title":"Include Resume Request Message to Calculation of ShortResumeMAC-I for INACTIVE","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2320,"status":"withdrawn","reservation_date":"2020-02-21 09:21:32","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":746.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200232.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200233","title":"Authentication in PNI-NPN","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":2330,"status":"revised","reservation_date":"2020-02-21 09:21:33","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200480","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":747.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200233.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200234","title":"Adding SEAL security requirements","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":2340,"status":"revised","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200492","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200234.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200235","title":"Adding security requirements of interfaces for SEAL","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":2350,"status":"revised","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200493","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200235.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200236","title":"Adding authorization procedures of SEAL system","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":2360,"status":"revised","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200494","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200236.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200237","title":"Adding SEAl security procedures for interconnection","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":2370,"status":"revised","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200495","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200237.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200238","title":"adding V2X groupcast privacy requirement","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2380,"status":"noted","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200238.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200239","title":"Adding V2X unicast security requirements","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2390,"status":"merged","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200239.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200240","title":"Adding V2X common requirements","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2400,"status":"noted","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200240.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200241","title":"Adding abbreviations to the V2X TS","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":2410,"status":"approved","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200241.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200242","title":"Update testcases of eNB SCAS","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2420,"status":"withdrawn","reservation_date":"2020-02-21 09:21:34","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.216,"crspecversion":"15.2.0","workitem":[{"winame":"SCAS_eNB"}],"crnumber":11.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200242.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200243","title":"Mirror - Update testcases of eNB SCAS","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2430,"status":"withdrawn","reservation_date":"2020-02-21 09:21:35","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.216,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_eNB"}],"crnumber":12.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200243.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200244","title":"Clarification on UP security activation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":2440,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200472","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200244.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200245","title":"Removing EN","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":2450,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200469","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200245.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200246","title":"Living of URLLC","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":2460,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200471","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200246.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200247","title":"Living of 5WWC","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":2470,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200467","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200247.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200248","title":"Update clause 4.1","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2480,"status":"noted","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200248.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200249","title":"Editoral change on clause 4.3","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2490,"status":"approved","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200249.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200250","title":"Adding AF under Network element clause","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2500,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200460","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200250.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200251","title":"Adding NEF under the Network element clause","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2510,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200461","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200251.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200252","title":"Delete EN of clause 4.4","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2520,"status":"noted","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200252.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200253","title":"Delete EN of clause 5.2","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2530,"status":"merged","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200253.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200254","title":"life time of Key identifier","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2540,"status":"noted","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200254.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200255","title":"The time when the key identifier is generated","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2550,"status":"merged","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200255.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200256","title":"KAKMA Derivation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2560,"status":"merged","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200256.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200257","title":"AAnF checks the authorization information of AF","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2570,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200463","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200257.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200258","title":"Add details on deleting Kakma","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2580,"status":"noted","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200258.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200259","title":"Kaf update procedure","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2590,"status":"noted","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200259.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200260","title":"Editoral Change on reference clauses","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2600,"status":"withdrawn","reservation_date":"2020-02-21 09:21:37","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"5GS_UTRAN_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200261","title":"Discussion for 5G SCAS Enhancement","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2610,"status":"noted","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200261.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200262","title":"New WID for 5G SCAS Enhancement","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"WID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2620,"status":"revised","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200459","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200262.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200263","title":"CR on requirements for algorithm selection and handover from EPS to 5GS over N26","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2630,"status":"withdrawn","reservation_date":"2020-02-21 09:21:37","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":748.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200263.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200264","title":"CR on requirements for algorithm selection and handover from EPS to 5GS over N26","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2640,"status":"withdrawn","reservation_date":"2020-02-21 09:21:39","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":749.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200264.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200265","title":"Discussion paper on UE radio capability protection for UEs without AS security","source":"Huawei, HiSilicon,China Mobile","contact":"Longhua Guo","contact-id":80179,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":2650,"status":"noted","reservation_date":"2020-02-21 09:21:40","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200265.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200266","title":"Protection of UE radio capability transfer for CIoT UEs that only support CP optimization","source":"Huawei, HiSilicon,China Mobile","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":2660,"status":"noted","reservation_date":"2020-02-21 09:21:40","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200266.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200267","title":"Discussion on security of 5G multicast-broadcast services","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2670,"status":"noted","reservation_date":"2020-02-21 09:21:40","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200267.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200268","title":"New SID: Study on Security Aspects of Enhancements for 5G Multicast-Broadcast Services","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2680,"status":"noted","reservation_date":"2020-02-21 09:21:40","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200268.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200269","title":"Add clarifications to the living CR","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"3.7","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":2690,"status":"noted","reservation_date":"2020-02-21 09:21:40","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200269.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200270","title":"Add requirement and  feature to the DraftCR","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":2700,"status":"revised","reservation_date":"2020-02-21 09:21:40","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"S3-200458","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200270.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200271","title":"Correction to security capability negotiation between SEPPs","source":"Huawei, HiSilicon,China Mobile","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2710,"status":"withdrawn","reservation_date":"2020-02-21 09:21:40","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":750.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200271.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200272","title":"Correction to security capability negotiation between SEPPs","source":"Huawei, HiSilicon,China Mobile","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2720,"status":"withdrawn","reservation_date":"2020-02-21 09:21:41","uploaded":"2020-02-21 12:29:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":751.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200272.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200273","title":"Correction to initial EAP Authentication with an external AAA server","source":"Huawei, HiSilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2730,"status":"withdrawn","reservation_date":"2020-02-21 09:21:42","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":752.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200273.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200274","title":"Correction to initial EAP Authentication with an external AAA server","source":"Huawei, HiSilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":2740,"status":"withdrawn","reservation_date":"2020-02-21 09:21:43","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":753.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200274.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200275","title":"Correction to definition about temporary group call related procedures","source":"Huawei, HiSilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":2750,"status":"agreed","reservation_date":"2020-02-21 09:21:44","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.2.0","workitem":[{"winame":"MCXSec"}],"crnumber":139.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-200135","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200275.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200276","title":"Correction to definition about the case of 'Temporary group call \u2013 user regroup''","source":"Huawei, HiSilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":2760,"status":"withdrawn","reservation_date":"2020-02-21 09:21:45","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.18,"crspecversion":"15.7.0","workitem":[{"winame":"eMCSec"}],"crnumber":140.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200276.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200277","title":"Security requirements for UP Gateway Function","source":"Huawei, HiSilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":2770,"status":"revised","reservation_date":"2020-02-21 09:21:46","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"S3-200481","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"UPGF"}],"crnumber":754.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200277.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200278","title":"Reply LS to S2-2001727 on UP gateway function on the N9 interface","source":"Huawei, HiSilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":2780,"status":"noted","reservation_date":"2020-02-21 09:21:47","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2","Cc":"CT4","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200278.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200279","title":"New SID: Study on Security Aspects of Enhancement of Support for Edge Applications in 5GC","source":"China Unicom, CAICT, China Telecom, Huawei, Hisilicon, ZTE","contact":"Feng Gao","contact-id":57352,"tdoctype":"SID new","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2790,"status":"noted","reservation_date":"2020-02-21 09:25:31","uploaded":"2020-02-21 09:30:05","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200279.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200280","title":"New WID on Security Assurance Specification for Non-3GPP InterWorking Function (N3IWF)","source":"China Unicom, CAICT, China Mobile, CATT, ZTE","contact":"Feng Gao","contact-id":57352,"tdoctype":"WID new","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2800,"status":"revised","reservation_date":"2020-02-21 09:28:07","uploaded":"2020-02-21 09:30:05","revisionof":"","revisedto":"S3-200527","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200280.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200281","title":"New WID on Study of certificate management for Service Based Architecture (SBA)","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2810,"status":"noted","reservation_date":"2020-02-21 09:40:41","uploaded":"2020-02-21 14:57:55","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200281.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200282","title":"Resource Level Authorization using Access Tokens","source":"Ericsson, Nokia, Nokia Shanghai Bell","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2820,"status":"revised","reservation_date":"2020-02-21 09:40:44","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"S3-200487","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":755.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200282.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200283","title":"Trust model and purpose of token-based authorization in Scenario D","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"discussion","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2830,"status":"noted","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200283.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200284","title":"Trust model and token-based authorization for Scenario D","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2840,"status":"noted","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200284.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200285","title":"Draft-CR as baseline for Token-based authorization for indirect communication with and without delegated discovery","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2850,"status":"approved","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200285.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200286","title":"Clarifications and corrections for token-based authorization in Scenario C","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2860,"status":"noted","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200286.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200287","title":"Token-based authorization for Scenario D","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2870,"status":"noted","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200287.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200288","title":"SCP vs SECOP","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2880,"status":"endorsed","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 09:46:27","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200288.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200289","title":"Identifiers in certificates and authorization tokens","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2890,"status":"noted","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200289.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200290","title":"Authorization of Subscribe-Notify interactions","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2900,"status":"noted","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200290.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200291","title":"3gpp-Sbi_Target-apiRoot header and TLS on N32","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":2910,"status":"revised","reservation_date":"2020-02-21 09:40:45","uploaded":"2020-02-21 12:50:43","revisionof":"","revisedto":"S3-200489","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":756.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200291.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200292","title":"draft reply-LS on UP gateway function on the N9 interface","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":2920,"status":"revised","reservation_date":"2020-02-21 09:40:47","uploaded":"2020-02-21 13:24:24","revisionof":"","revisedto":"S3-200482","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S2-2001727","lsto":"SA2","Cc":"CT4, SA","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200292.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200293","title":"Clarification of implicit lifetime","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2930,"status":"revised","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:13","revisionof":"","revisedto":"S3-200447","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200293.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200294","title":"AUSF selection for AKMA","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2940,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200294.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200295","title":"CR to TS 33.501: AUSF Selection for AKMA","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2950,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200295.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200296","title":"pCR to TS 33.535: Update of the AKMA procedures","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2960,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200296.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200297","title":"pCR to TS 33.535: UE authentication result notification","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2970,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200297.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200298","title":"CR to TS 33.501: UE authentication result notification","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2980,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200298.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200299","title":"pCR to TS 33.535: Optimization in AKMA key generation","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":2990,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200299.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200300","title":"CR to TS 33.501: AKMA key generation optimization","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3000,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200300.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200301","title":"pCR to TS 33.535: Application function key refresh","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3010,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200301.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200302","title":"[Draft CR] Resume identity I-RNTI in RRC Connection Suspend and Resum","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3020,"status":"merged","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200302.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200303","title":"[Draft CR] ShortResumeMAC-I in RRC Connection Suspend and Resume","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3030,"status":"merged","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200303.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200304","title":"[Draft CR] Input to MESSAGE when calculating ShortResumeMAC-I in RRC Connection Suspend and Resume","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3040,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200304.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200305","title":"Further evaluation to Solution #25: Security solution for preventing Botnet Attacks from Improper CIOT Device Use","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3050,"status":"withdrawn","reservation_date":"2020-02-21 10:07:10","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200306","title":"[Draft CR] Clean up of editor notes from living CR for 5G CIoT","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3060,"status":"merged","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200306.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200307","title":"[Draft CR] Updates to Control Plane CIoT 5GS Optimization","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3070,"status":"revised","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"S3-200519","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200307.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200308","title":"GUTI allocation for MT-EDT cases","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"discussion","for":"Endorsement","abstract":"Clarifies that requirements for GUTI reallocation.","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3080,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200308.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200309","title":"[DRAFT] LS on GUTI allocation for MT-EDT cases","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"LS out","for":"Approval","abstract":"Sends LS to other groups with clarificaiton of requirements for GUTI reallocation.","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3090,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1, SA2","Cc":"RAN2, RAN3, CT4","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200309.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200310","title":"Way forward for UE caps protection and NB-IoT UEs","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"discussion","for":"Endorsement","abstract":"Proposes a way forward for resilience against tempering of UE caps and NB-IoT UEs","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3100,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200310.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200311","title":"[Draft CR] RRCReestablishment procedure in 5G CIoT","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3110,"status":"approved","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200311.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200312","title":"[Draft CR] EDT in User Plane CIoT 5GS Optimization","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3120,"status":"merged","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200312.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200313","title":"CIOT: draft CR Living document","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"All agreed text, resubmitted as baseline","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3130,"status":"revised","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"S3-200518","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200313.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200314","title":"New SID on Slice isolation","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"SID new","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3140,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200314.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200315","title":"VERTICAL: New SID: Study on enhanced security support for Non-Public Networks","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"SID new","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3150,"status":"noted","reservation_date":"2020-02-21 10:07:10","uploaded":"2020-02-21 12:50:14","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200315.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200316","title":"Informative Annex: Deployment scenarios for end-to-end security","source":"KPN N.V.","contact":"Iko Keesmaat","contact-id":33148,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes informative text describing a method for obtaining secure communication between UE and AKMA AF based on 3GPP keys generated for the AKMA service.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3160,"status":"noted","reservation_date":"2020-02-21 10:10:22","uploaded":"2020-02-21 12:12:45","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200316.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200317","title":"IKEv2 profile update 33.310","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":3170,"status":"revised","reservation_date":"2020-02-21 10:18:54","uploaded":"2020-02-21 10:34:52","revisionof":"","revisedto":"S3-200462","release":"Rel-16","crspec":33.31,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":104.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200317.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200318","title":"Using EAP-TLS with TLS 1.3","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":3180,"status":"agreed","reservation_date":"2020-02-21 10:18:59","uploaded":"2020-02-21 10:34:52","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"CryptPr"}],"crnumber":757.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200318.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200319","title":"ESP profile update","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":3190,"status":"revised","reservation_date":"2020-02-21 10:19:01","uploaded":"2020-02-21 10:34:52","revisionof":"","revisedto":"S3-200464","release":"Rel-16","crspec":33.21,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":64.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200319.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200320","title":"Recovery from NASC verification failure","source":"MediaTek Inc.","contact":"Marko Niemi","contact-id":16608,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3200,"status":"not pursued","reservation_date":"2020-02-21 10:24:16","uploaded":"2020-02-21 10:34:58","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":758.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200320.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200321","title":"Security requirement for unicast message in PC5","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3210,"status":"merged","reservation_date":"2020-02-21 10:25:33","uploaded":"2020-02-21 11:37:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200321.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200322","title":"Correction for FN-RG authentication: transport of authentication indication from W-AGF to AMF","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3220,"status":"approved","reservation_date":"2020-02-21 10:27:04","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200322.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200323","title":"Corrections for N5CW","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3230,"status":"approved","reservation_date":"2020-02-21 10:27:04","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200323.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200324","title":"Corrections for 7B.d","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3240,"status":"approved","reservation_date":"2020-02-21 10:27:05","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200324.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200325","title":"Trust indication using UPU","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3250,"status":"noted","reservation_date":"2020-02-21 10:27:05","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200325.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200326","title":"Corrections for trusted access","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3260,"status":"approved","reservation_date":"2020-02-21 10:27:05","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200326.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200327","title":"TNAP mobility using ERP","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3270,"status":"noted","reservation_date":"2020-02-21 10:27:05","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200327.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200328","title":"Corrections for Annex X","source":"Ericsson, Cablelabs, Charter Communications, Huawei, Nokia, Nokia Shanghai Bell, Lenovo, Motorola Mobility","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3280,"status":"revised","reservation_date":"2020-02-21 10:27:05","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"S3-200448","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200328.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200329","title":"3GPP-based access authentication for untrusted non-3GPP access","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3290,"status":"noted","reservation_date":"2020-02-21 10:27:05","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200329.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200330","title":"pCR:3GPP-based access authentication for untrusted non-3GPP access","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":3300,"status":"noted","reservation_date":"2020-02-21 10:27:05","uploaded":"2020-02-21 13:10:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200330.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200331","title":"Certificate and CRL profile update","source":"Ericsson","contact":"Pinar Comak","contact-id":85151,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":3310,"status":"revised","reservation_date":"2020-02-21 10:41:07","uploaded":"2020-02-21 10:50:07","revisionof":"","revisedto":"S3-200465","release":"Rel-16","crspec":33.31,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":105.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200331.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200332","title":"TLS Recommended Cipher Suites","source":"Ericsson","contact":"Pinar Comak","contact-id":85151,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":3320,"status":"agreed","reservation_date":"2020-02-21 10:41:11","uploaded":"2020-02-21 10:50:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.21,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":65.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200332.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200333","title":"Required TLS extenstions and algorithms","source":"Ericsson","contact":"Pinar Comak","contact-id":85151,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":3330,"status":"revised","reservation_date":"2020-02-21 10:41:12","uploaded":"2020-02-21 10:50:07","revisionof":"","revisedto":"S3-200466","release":"Rel-16","crspec":33.21,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":66.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200333.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200334","title":"IKEv2 profile update 33.210","source":"Ericsson","contact":"Pinar Comak","contact-id":85151,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":3340,"status":"agreed","reservation_date":"2020-02-21 10:41:13","uploaded":"2020-02-21 10:50:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.21,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":67.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200334.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200335","title":"Complete the test cases of key refresh at the eNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to add a sub-test case in TS 33.216 clause 4.2.2.1.8 to cover the requirement in TS 36.331 clause 5.3.1.2.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":3350,"status":"revised","reservation_date":"2020-02-21 11:07:56","uploaded":"2020-02-21 13:58:43","revisionof":"","revisedto":"S3-200504","release":"Rel-16","crspec":33.216,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_eNB"},{"winame":"TEI16"}],"crnumber":13.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200335.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200336","title":"Complete the test cases of key refresh at the gNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to extend and add a sub-test case in TS 33.511 clause 4.2.2.1.13 to cover the requirement in TS 38.331 clause 5.3.1.2.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":3360,"status":"revised","reservation_date":"2020-02-21 11:10:08","uploaded":"2020-02-21 13:58:43","revisionof":"","revisedto":"S3-200505","release":"Rel-16","crspec":33.511,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":11.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200336.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200337","title":"Key derivation for CHO(LTE R16)","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3370,"status":"revised","reservation_date":"2020-02-21 11:10:19","uploaded":"2020-02-21 11:37:23","revisionof":"","revisedto":"S3-200437","release":"Rel-16","crspec":33.401,"crspecversion":"16.1.0","workitem":[{"winame":"TEI16"}],"crnumber":690.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200337.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200338","title":"Key derivation for CHO(NR R16)","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3380,"status":"revised","reservation_date":"2020-02-21 11:16:58","uploaded":"2020-02-21 11:37:23","revisionof":"","revisedto":"S3-200436","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"TEI16"}],"crnumber":759.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200338.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200339","title":"LS on security of eLCS","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"LS out","for":"Approval","abstract":"Sends LS to other groups so that they can get started with their work","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"3.7","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":3390,"status":"noted","reservation_date":"2020-02-21 11:23:45","uploaded":"2020-02-21 11:40:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2, SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200339.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200340","title":"[DRAFT] LS on security consideration of performance measurement function protocol","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":3400,"status":"noted","reservation_date":"2020-02-21 11:26:08","uploaded":"2020-02-21 11:37:23","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"SA2","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200340.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200341","title":"Study on the security of Multi-CU-UP connectivity","source":"China Telecom,China Unicom, CATT, Xiaomi, vivo","contact":"sen xu","contact-id":83316,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3410,"status":"noted","reservation_date":"2020-02-21 11:48:55","uploaded":"2020-02-21 11:52:20","revisionof":"S3-200079","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200341.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200342","title":"Adding the requirements for the for the security of the NR PC5 unicast link","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3420,"status":"revised","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"S3-200496","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200342.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200343","title":"Proposed solution for the security policy of unicast connections","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"other","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3430,"status":"noted","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200343.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200344","title":"Proposed skeleton for the security of unicast link procedures","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3440,"status":"noted","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200344.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200345","title":"Proposed text for general and overview clauses of NR PC5 unicast security","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3450,"status":"revised","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"S3-200501","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200345.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200346","title":"Proposed text for keying clause of NR PC5 unicast security","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3460,"status":"revised","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:13","revisionof":"","revisedto":"S3-200506","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200346.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200347","title":"Proposed text for security establishment clause of NR PC5 unicast security","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3470,"status":"revised","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:13","revisionof":"","revisedto":"S3-200507","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200347.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200348","title":"Proposed text for security protection clause of NR PC5 unicast security","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3480,"status":"revised","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"S3-200508","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200348.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200349","title":"Annex for key derivation functions in the V2X TS","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3490,"status":"revised","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"S3-200509","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200349.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200350","title":"Allocation of FC values for TS 33.356","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3500,"status":"not pursued","reservation_date":"2020-02-21 11:49:05","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.22,"crspecversion":"16.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":199.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200350.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200351","title":"Proposed requirements for the privacy of NR PC5 unicast connections","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3510,"status":"merged","reservation_date":"2020-02-21 11:49:06","uploaded":"2020-02-21 14:53:12","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200351.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200352","title":"Proposed procedures for the privacy of NR PC5 unicast connections","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":3520,"status":"revised","reservation_date":"2020-02-21 11:49:06","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"S3-200510","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200352.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200353","title":"Discussion on a response LS on AMF Re-allocation","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":3530,"status":"noted","reservation_date":"2020-02-21 11:49:06","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200353.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200354","title":"Response LS on AMF Reallocation via RAN re-routing","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":3540,"status":"noted","reservation_date":"2020-02-21 11:49:06","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S2-2001730","lsto":"SA2","Cc":"SA","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200354.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200355","title":"New WID on study of security aspects of Unmanned Aerial Systems","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"SID new","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3550,"status":"noted","reservation_date":"2020-02-21 11:49:06","uploaded":"2020-02-21 14:55:58","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200355.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200356","title":"Changes made to solution 30 in TR 33.861","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"other","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3560,"status":"withdrawn","reservation_date":"2020-02-21 11:49:06","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200356.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200357","title":"Protection of UE radio capability transfer for UEs without AS security","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3570,"status":"noted","reservation_date":"2020-02-21 11:49:06","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200357.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200358","title":"Clarification on native security context activation in handover from EPS to 5GS","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3580,"status":"revised","reservation_date":"2020-02-21 11:49:07","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"S3-200490","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"TEI16"},{"winame":"5GS_Ph1-SEC"}],"crnumber":760.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200358.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200359","title":"Reply LS on native 5G NAS security context activation","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":3590,"status":"noted","reservation_date":"2020-02-21 11:49:07","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200070","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200359.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200360","title":"F1 interface set-up procedure","source":"Qualcomm Incorporated, Ericsson","contact":"Adrian Escott","contact-id":24089,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":3600,"status":"noted","reservation_date":"2020-02-21 11:49:07","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200360.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200361","title":"Clarification on the use of SUPI as the Identity in EAP-AKA\u2019 key derivation","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3610,"status":"withdrawn","reservation_date":"2020-02-21 11:49:07","uploaded":"2020-02-21 14:53:44","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":761.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200361.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200362","title":"Clarification on the use of SUPI as the Identity in EAP-AKA\u2019 key derivation","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3620,"status":"withdrawn","reservation_date":"2020-02-21 11:49:08","uploaded":"2020-02-21 14:54:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":762.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200362.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200363","title":"pCR : Deriving AKMA key after UE is registered to 5GS","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3630,"status":"revised","reservation_date":"2020-02-21 11:49:09","uploaded":"2020-02-21 14:54:05","revisionof":"","revisedto":"S3-200486","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200363.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200364","title":"pCR : Initiation of AKMA","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3640,"status":"approved","reservation_date":"2020-02-21 11:49:09","uploaded":"2020-02-21 14:54:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200364.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200365","title":"pCR : Requirements on AKMA Key Identifier","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3650,"status":"noted","reservation_date":"2020-02-21 11:49:09","uploaded":"2020-02-21 14:54:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200365.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200366","title":"pCR : Requirements for Ua*","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3660,"status":"approved","reservation_date":"2020-02-21 11:49:10","uploaded":"2020-02-21 14:54:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200366.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200367","title":"URLLC: Resolve EN about MN being preconfigured with SN capability to perform UP IP","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":3670,"status":"merged","reservation_date":"2020-02-21 11:54:15","uploaded":"2020-02-21 12:54:37","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200367.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200368","title":"URLLC: Error handling in MN when SN cannot comply with UP security policy","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":3680,"status":"noted","reservation_date":"2020-02-21 11:54:15","uploaded":"2020-02-21 13:10:27","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200368.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200369","title":"URLLC: Pairing of redundant PDU sessions in MN","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":3690,"status":"noted","reservation_date":"2020-02-21 11:54:15","uploaded":"2020-02-21 14:55:50","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200369.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200370","title":"Clarification to TSC UP security policy","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3700,"status":"not pursued","reservation_date":"2020-02-21 11:54:15","uploaded":"2020-02-21 13:11:24","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":763.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200370.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200371","title":"5GLAN UP security policy","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3710,"status":"not pursued","reservation_date":"2020-02-21 11:54:17","uploaded":"2020-02-21 13:11:50","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":764.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200371.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200372","title":"AMF reallocation and slicing","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3720,"status":"noted","reservation_date":"2020-02-21 11:54:19","uploaded":"2020-02-21 13:12:35","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"TEI16"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200372.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200373","title":"Editoral Change on reference clauses","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"3.3","ainame":"Security aspects of single radio voice continuity from 5GS to UTRAN (Rel-16)","tdoc_agenda_sort_order":3730,"status":"agreed","reservation_date":"2020-02-21 11:57:18","uploaded":"2020-02-21 12:28:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_UTRAN_SEC"}],"crnumber":765.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-200223","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200373.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200374","title":"Reply LS on ARPF in UDICOM","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"LS out","for":"Approval","abstract":"SA3 thanks CT4 for the LS on ARPF in UDICOM and would like to provide response.","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":3740,"status":"noted","reservation_date":"2020-02-21 12:01:31","uploaded":"2020-02-21 12:19:51","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_5GC_SEC_ARPF"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-194439 \/ C4-195553","lsto":"CT4","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200374.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200375","title":"VLAN intro added","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3750,"status":"withdrawn","reservation_date":"2020-02-21 12:10:02","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":1.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200375.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200376","title":"Resolution of ed note on serving network name","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3760,"status":"withdrawn","reservation_date":"2020-02-21 12:10:05","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":2.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200376.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200377","title":"KI on interworking NPN and PLMN - security req","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3770,"status":"withdrawn","reservation_date":"2020-02-21 12:10:06","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":3.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200377.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200378","title":"KI on service continuity - threats and reqs","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3780,"status":"withdrawn","reservation_date":"2020-02-21 12:10:07","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":4.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200378.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200379","title":"Resolution of editors note on AAA","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3790,"status":"withdrawn","reservation_date":"2020-02-21 12:10:08","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":5.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200379.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200380","title":"Threats and requirements on AAA","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3800,"status":"withdrawn","reservation_date":"2020-02-21 12:10:09","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":6.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200380.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200381","title":"Resolution of editor's note in solution 1","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3810,"status":"withdrawn","reservation_date":"2020-02-21 12:10:10","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":7.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200381.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200382","title":"Resolution of editor's note in solution 15","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3820,"status":"withdrawn","reservation_date":"2020-02-21 12:10:11","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":8.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200382.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200383","title":"UP security policy enforcement in 5GLAN","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3830,"status":"withdrawn","reservation_date":"2020-02-21 12:10:12","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.819,"crspecversion":"16.0.0","workitem":[{"winame":"FS_Vertical_LAN_SEC"}],"crnumber":9.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200383.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200384","title":"UP security policy enforcement in 5GLAN","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3840,"status":"revised","reservation_date":"2020-02-21 12:10:13","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"S3-200455","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":766.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200384.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200385","title":"Referencing Annex for use of authentication methods","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3850,"status":"revised","reservation_date":"2020-02-21 12:10:14","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"S3-200456","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":767.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200385.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200386","title":"Clarifications on authentication methods selection and key derivation","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3860,"status":"revised","reservation_date":"2020-02-21 12:10:15","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"S3-200457","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":768.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200386.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200387","title":"Modification of CAG ID list","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3870,"status":"agreed","reservation_date":"2020-02-21 12:10:16","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":769.0,"crrevision":"","crcategory":"D","tsg_crp":"SP-200140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200387.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200388","title":"Definition of SN Id for standalone non-public networks","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3880,"status":"agreed","reservation_date":"2020-02-21 12:10:17","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":770.0,"crrevision":"","crcategory":"C","tsg_crp":"SP-200140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200388.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200389","title":"UP integrity enforcement for gPTP messages","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":3890,"status":"revised","reservation_date":"2020-02-21 12:10:18","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"S3-200454","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":771.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200389.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200390","title":"Reference correction in key hierarchy","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":3900,"status":"withdrawn","reservation_date":"2020-02-21 12:10:19","uploaded":"2020-02-21 14:51:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":772.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200390.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200391","title":"Derivation of KAF","source":"China Mobile, Nokia, Nokia Shanghai Bell","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3910,"status":"noted","reservation_date":"2020-02-21 12:35:01","uploaded":"2020-02-21 13:20:24","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200391.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200392","title":"Derivation of KAKMA and related key identifier","source":"China Mobile, Nokia, Nokia Shanghai Bell","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":3920,"status":"revised","reservation_date":"2020-02-21 12:49:23","uploaded":"2020-02-21 13:20:24","revisionof":"","revisedto":"S3-200513","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200392.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200393","title":"LS on transformation of S-NSSAI during NSSAA","source":"China Mobile","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":3930,"status":"noted","reservation_date":"2020-02-21 12:57:03","uploaded":"2020-02-21 13:07:09","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2, CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200393.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200394","title":"Work Item on Security Assurance Specification for 5G NWDAF","source":"China Mobile, China Unicom, CAICT, ZTE","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"WID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3940,"status":"revised","reservation_date":"2020-02-21 12:57:03","uploaded":"2020-02-21 13:07:09","revisionof":"","revisedto":"S3-200525","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200394.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200395","title":"New SID on security aspects of UAS Connectivity, Identification, and Tracking","source":"China Mobile","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"SID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3950,"status":"noted","reservation_date":"2020-02-21 12:57:03","uploaded":"2020-02-21 13:07:09","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200395.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200396","title":"Discussion on new SID for security of UAS Connectivity, Identification, and Tracking","source":"China Mobile","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3960,"status":"noted","reservation_date":"2020-02-21 12:57:03","uploaded":"2020-02-21 13:07:09","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200396.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200397","title":"A new test case for key update at the gNB on dual connectivity","source":"Nokia, Nokia Shanghai Bell, NTT DoCoMo,Telecom Italia","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to add a new clause for the test case of KSN update at the gNB on dual connectivity in TS 33.511 clause 4.2.2.1.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":3970,"status":"agreed","reservation_date":"2020-02-21 12:58:13","uploaded":"2020-02-21 13:58:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.511,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":12.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200397.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200398","title":"New test cases for key update at the eNB on dual connectivity","source":"Nokia, Nokia Shanghai Bell,Telecom Italia","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to add a new clause for the test case of key update at the eNB on dual connectivity with 5GC and a new clause for the test case of key update at the eNB on dual connectivity with EPC in TS 33.216 clause 4.2.2.1.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":3980,"status":"not pursued","reservation_date":"2020-02-21 13:01:03","uploaded":"2020-02-21 13:58:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.216,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_eNB"},{"winame":"TEI16"}],"crnumber":14.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200398.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200399","title":"Protection of N9 interface","source":"Nokia, Nokia Shanghai Bell, Juniper Networks","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"Protection of inter-PLMN N9 interface","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":3990,"status":"revised","reservation_date":"2020-02-21 13:06:32","uploaded":"2020-02-21 14:28:29","revisionof":"S3-194444","revisedto":"S3-200530","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"UPGF"}],"crnumber":689.0,"crrevision":2.0,"crcategory":"B","tsg_crp":"SP-200141","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200399.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200400","title":"draftCR on addessing EN on transmitting NSSAI to AAA","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":4000,"status":"noted","reservation_date":"2020-02-21 13:09:26","uploaded":"2020-02-21 13:20:24","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200400.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200401","title":"Security requirements for Inter-PLMN User Plane Security (IPUPS) function","source":"Nokia, Nokia Shanghai Bell, Juniper Networks","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"Security requirements for Inter-PLMN User Plane Security (IPUPS) function","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":4010,"status":"merged","reservation_date":"2020-02-21 13:10:45","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"UPGF"}],"crnumber":773.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200401.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200402","title":"Resolving editor's note on namespace: pCR against living baseline for 5GS LCS normative work S3-194465","source":"NTT DOCOMO INC.","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"other","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"3.7","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":4020,"status":"noted","reservation_date":"2020-02-21 13:15:43","uploaded":"2020-02-21 13:18:40","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200402.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200403","title":"eSBA - pCR to update Solution #21","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"pCR to update Solution #21","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4030,"status":"withdrawn","reservation_date":"2020-02-21 13:20:43","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.9.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200403.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200404","title":"eSBA: pCR to update Conclusion on KI #22","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"Update conclusion on KI #22","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4040,"status":"withdrawn","reservation_date":"2020-02-21 13:23:28","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.855,"crspecversion":"1.9.0","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200404.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200405","title":"Validation of Access Token ownership","source":"Mavenir, Deutsche Telekom AG","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"If Token-based authorization is used, validation of the Access Token ownership shall be required.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4050,"status":"not pursued","reservation_date":"2020-02-21 13:27:36","uploaded":"2020-02-21 13:44:06","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":774.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200405.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200406","title":"Token Based Authorization \u2013 Validation of client ownership of the access token","source":"Mavenir, Deutsche Telekom AG","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"discussion","for":"Endorsement","abstract":"During Token-based authorization, the validation of the ownership is required.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4060,"status":"noted","reservation_date":"2020-02-21 13:27:37","uploaded":"2020-02-21 13:44:06","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200406.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200407","title":"Clarification on Token Based Authorization","source":"Mavenir","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"discussion","for":"Endorsement","abstract":"clarification to the validation of the access token during token-based authorization in the case of Direct and Indirect communication","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4070,"status":"withdrawn","reservation_date":"2020-02-21 13:27:37","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200408","title":"eSBA: Token-based authorization in indirect communication scenario with delegated discovery (Model D)","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"Token-based authorization in indirect communication scenario with delegated discovery (Model D)","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4080,"status":"noted","reservation_date":"2020-02-21 13:27:50","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200408.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200409","title":"New WID on Security Assurance Specification for Service Communication Proxy (SECOP)","source":"Nokia, Nokia Shanghai Bell, Deutsch Telecom, T-Mobile USA, China Mobile, China Unicom","contact":"Wei Lu","contact-id":79335,"tdoctype":"WID new","for":"Approval","abstract":"This WID proposes to develop the Security Assurance Specification (SCAS) for the Service Communication Proxy (SECOP) network product class.","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":4090,"status":"revised","reservation_date":"2020-02-21 13:34:41","uploaded":"2020-02-21 13:58:43","revisionof":"","revisedto":"S3-200526","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200409.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200410","title":"eSBA: Mutual Authentication between NFs","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"Mutual authentication between NFs","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4100,"status":"not pursued","reservation_date":"2020-02-21 13:36:08","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":775.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200410.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200411","title":"Clarification on Token Based Authorization","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"clarification to the validation of the access token during token-based authorization in the case of Direct and Indirect communication","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4110,"status":"not pursued","reservation_date":"2020-02-21 13:41:01","uploaded":"2020-02-21 14:58:49","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":776.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200411.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200412","title":"eSBA: NF consumer authentication by the producer in direct communication scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"NF consumer authentication by the producer in direct communication scenarios","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4120,"status":"not pursued","reservation_date":"2020-02-21 13:49:13","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":777.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200412.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200413","title":"ERP for TNAP mobility","source":"Motorola Mobility, Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"draftCR","for":"Approval","abstract":"Introduction of ERP for TNAP mobility","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":4130,"status":"noted","reservation_date":"2020-02-21 13:53:59","uploaded":"2020-02-21 14:17:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200413.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200414","title":"eSBA: Network Function TLS certificate profile","source":"Nokia, Nokia Shanghai Bell, CommScope","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"SBA Network Function certificate profile","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4140,"status":"withdrawn","reservation_date":"2020-02-21 13:54:48","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200415","title":"SUCI computation: test data Rel-15","source":"THALES","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"CR","for":"Approval","abstract":"SUCI computation: test data for network specific identifier-based SUPI - Rel-15","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4150,"status":"withdrawn","reservation_date":"2020-02-21 13:59:00","uploaded":"2020-02-21 14:46:26","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":778.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200415.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200416","title":"5WWC: Update to Subscriber privacy for wireline access","source":"Nokia, Nokia Shanghai Bell, CableLabs","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"Update to Subscriber privacy for wireline access","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":4160,"status":"approved","reservation_date":"2020-02-21 14:00:52","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200416.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200417","title":"SUCI computation: test data Rel-16","source":"THALES","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"CR","for":"Approval","abstract":"SUCI computation: test data for network specific identifier-based SUPI - Rel-16","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4170,"status":"withdrawn","reservation_date":"2020-02-21 14:09:25","uploaded":"2020-02-21 14:46:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":779.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200417.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200418","title":"Identifier conversion in groupcast communication","source":"Motorola Mobility, Lenovo","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"CR","for":"Approval","abstract":"Addition of the UE behaviour when configured with the parameters for L2 group ID update.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4180,"status":"withdrawn","reservation_date":"2020-02-21 14:10:01","uploaded":"2020-02-21 14:17:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.185,"crspecversion":"15.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":2.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200418.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200419","title":"CryptPr: Update to clause 6.1.1 - Common rules to all certificates","source":"Nokia, Nokia Shanghai Bell, CommScope","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"Update to clause 6.1.1 - Common rules to all certificates","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":4190,"status":"not pursued","reservation_date":"2020-02-21 14:10:45","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":106.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200419.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200420","title":"CryptPr: Update to CRL Profile in clause 6.1a","source":"Nokia, Nokia Shanghai Bell, CommScope","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"CR","for":"Agreement","abstract":"Update to CRL Profile in clause 6.1a","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":4200,"status":"not pursued","reservation_date":"2020-02-21 14:15:57","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":107.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200420.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200421","title":"eSBA: Network Function TLS certificate profile","source":"Nokia, Nokia Shanghai Bell, CommScope","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"Network Function TLS certificate profile","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4210,"status":"noted","reservation_date":"2020-02-21 14:21:36","uploaded":"2020-02-21 14:28:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200421.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200422","title":"LS on AMF Reallocation via RAN re-routing","source":"S2-2001730","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4220,"status":"postponed","reservation_date":"2020-02-24 10:29:23","uploaded":"2020-02-24 10:31:10","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200422.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200423","title":"AGF in 5GC trust domain","source":"Juniper Networks, Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":4230,"status":"withdrawn","reservation_date":"2020-02-25 07:37:16","uploaded":"2020-02-25 07:42:49","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200423.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200424","title":"Identifier conversion in groupcast communication","source":"Motorola Mobility Germany GmbH","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4240,"status":"noted","reservation_date":"2020-02-25 10:11:03","uploaded":"2020-02-25 10:13:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200424.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200425","title":"Comments on S3-200289 Identifiers in certificates and authorization tokens","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4250,"status":"noted","reservation_date":"2020-02-26 01:31:59","uploaded":"2020-02-26 10:05:12","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200425.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200426","title":"Comments on S3-200290 Authorization of Subscribe-Notify interactions","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4260,"status":"revised","reservation_date":"2020-02-26 01:35:18","uploaded":"2020-02-26 09:06:06","revisionof":"","revisedto":"S3-200427","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200426.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200427","title":"Comments on S3-200290 Authorization of Subscribe-Notify interactions","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4270,"status":"noted","reservation_date":"2020-02-26 10:04:06","uploaded":"2020-02-26 10:05:12","revisionof":"S3-200426","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200427.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200428","title":"Process for SA3#98e electronic meeting","source":"WG chair","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"other","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":1,"ainumber":"1","ainame":"Agenda and meeting objectives","tdoc_agenda_sort_order":4280,"status":"noted","reservation_date":"2020-02-28 10:43:01","uploaded":"2020-03-02 09:16:34","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200428.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200429","title":"Meeting minutes of AKMA conference call for SA3#98e","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4290,"status":"noted","reservation_date":"2020-03-03 11:27:29","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200430","title":"Mandatory User Plane Integrity for 5G","source":"GSMA","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2","ainame":"Incoming LSes","tdoc_agenda_sort_order":4300,"status":"postponed","reservation_date":"2020-03-03 12:54:58","uploaded":"2020-03-03 12:57:09","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200430.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200431","title":"CR to TS 33.501 to clarify support for User Plane Integrity Protection in NR","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"CR","for":"Endorsement","abstract":"This CR clarifies that support for User Plane Integrity Protection in the UE and the gNB is mandatory for all supported data rates.","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4310,"status":"withdrawn","reservation_date":"2020-03-03 14:41:00","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"},{"winame":"TEI16"}],"crnumber":780.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200432","title":"CIoT - meeting minutes of conf call on UE caps and suspend\/resume","source":"Nanjing Ericsson Panda Com Ltd","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":4320,"status":"noted","reservation_date":"2020-03-04 16:18:29","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200433","title":"LS to SA3 on NR V2X Security issues","source":"R2-2001980","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4330,"status":"postponed","reservation_date":"2020-03-05 09:21:54","uploaded":"2020-03-05 09:27:58","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200433.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200434","title":"Reply LS to LS S3-194452 on UP gateway function on the N9 interface","source":"S2-2001727","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":4340,"status":"replied to","reservation_date":"2020-03-05 13:03:19","uploaded":"2020-03-05 13:04:18","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-200482, S3-200482","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200434.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200435","title":"Clarification on native security context activation in handover from EPS to 5GS","source":"Qualcomm Incorporated","contact":"Soo Bum Lee","contact-id":66439,"tdoctype":"CR","for":"Approval","abstract":"It is clarified that in order to activate the native security context, AMF shall perform NAS SMC and added a note saying when to activate it is up to AMF","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4350,"status":"agreed","reservation_date":"2020-03-05 14:15:31","uploaded":"2020-03-06 13:51:41","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.7.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":781.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-200134","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200435.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200436","title":"Key derivation for CHO(NR R16)","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4360,"status":"agreed","reservation_date":"2020-03-06 03:27:57","uploaded":"2020-03-11 15:22:21","revisionof":"S3-200338","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"TEI16"}],"crnumber":759.0,"crrevision":1.0,"crcategory":"C","tsg_crp":"SP-200139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200436.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200437","title":"Key derivation for CHO(LTE R16)","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4370,"status":"agreed","reservation_date":"2020-03-06 04:30:04","uploaded":"2020-03-11 15:22:21","revisionof":"S3-200337","revisedto":"","release":"Rel-16","crspec":33.401,"crspecversion":"16.1.0","workitem":[{"winame":"TEI16"}],"crnumber":690.0,"crrevision":1.0,"crcategory":"C","tsg_crp":"SP-200139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200437.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200438","title":"draft TS 33.535","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"draft TS","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4380,"status":"revised","reservation_date":"2020-03-06 07:37:18","uploaded":"2020-03-09 09:11:26","revisionof":"","revisedto":"S3-200523","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200438.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200439","title":"WI exception request for eV2X","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"WI exception request","for":"","abstract":"This work item exception requests to extend the deadline of the SA3 eV2X work till June 2020","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":4390,"status":"agreed","reservation_date":"2020-03-06 08:45:57","uploaded":"2020-03-06 10:24:52","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200439.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200440","title":"draft_TS 33.536 v0.3.0","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"draft TS","for":"","abstract":"draft_TS 33.536 v0.3.0 implements the contributions approved during SA3 #98e meeting.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4400,"status":"revised","reservation_date":"2020-03-06 08:51:14","uploaded":"2020-03-09 02:52:47","revisionof":"","revisedto":"S3-200528","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200440.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200441","title":"Rel-16 Work Item Exception for 5G_eSBA","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"WI exception request","for":"Approval","abstract":"Security aspects of the Rel-16 5G SBA includes several key issues including authentication in indirect communication, token-based authorization in indirect communication scenarios, authorization for NF Set, authorization at the resource level and authoriz","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4410,"status":"agreed","reservation_date":"2020-03-06 08:58:41","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200442","title":"LS reply to GSMA on slice access","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":4420,"status":"approved","reservation_date":"2020-03-06 10:05:18","uploaded":"2020-03-06 10:26:12","revisionof":"S3-200151","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200051","lsto":"GSMA","Cc":"","lsoriginalls":"S3-200051","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200442.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200443","title":"[Draft CR]Solution for IAB Architecture (Baseline version)","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"draftCR","for":"Approval","abstract":"Re-submission of S3-194596, agreed in the last meeting. Baseline for the IAB normative work (TS 33.501).","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":4430,"status":"approved","reservation_date":"2020-03-06 10:15:24","uploaded":"2020-03-06 15:12:32","revisionof":"S3-200091","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200443.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200444","title":"Solution for IAB Architecture - 5GC","source":"Samsung, Ericsson, Qualcomm Incorporated, Nokia, Nokia Shanghai Bell, Thales, Intel, Huawei, HiSilicon, AT&T","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"Creation of CR from Living Doc (based on S3-200443)","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":0,"status":"agreed","reservation_date":"2020-03-06 10:23:27","uploaded":"2020-03-06 15:12:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"IAB"}],"crnumber":782.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200444.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200445","title":"Solution for IAB Architecture - ENDC","source":"Samsung, Ericsson, Qualcomm Incorporated, Nokia, Nokia Shanghai Bell, Thales, Intel, Huawei, HiSilicon, AT&T","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"","abstract":"Creation of CR from Living Doc (S3-194599)","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":0,"status":"agreed","reservation_date":"2020-03-06 10:27:59","uploaded":"2020-03-06 15:12:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.401,"crspecversion":"16.1.0","workitem":[{"winame":"IAB"}],"crnumber":691.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200445.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200446","title":"Rel-16 Work Item Exception for Security for NR IAB","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"WI exception request","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":4460,"status":"agreed","reservation_date":"2020-03-06 10:33:06","uploaded":"2020-03-06 15:12:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"IAB"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200446.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200447","title":"Clarification of implicit lifetime","source":"Ericsson","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4470,"status":"approved","reservation_date":"2020-03-06 11:08:17","uploaded":"2020-03-06 11:24:36","revisionof":"S3-200293","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200447.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200448","title":"Corrections for Annex X","source":"Ericsson, Cablelabs, Charter Communications, Huawei, Nokia, Nokia Shanghai Bell, Lenovo, Motorola Mobility","contact":"Helena Vahidi","contact-id":75763,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":4480,"status":"approved","reservation_date":"2020-03-06 11:16:05","uploaded":"2020-03-06 12:13:49","revisionof":"S3-200328","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200448.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200449","title":"Draft TR 33.434 v0.2.0","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"draft TS","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4490,"status":"approved","reservation_date":"2020-03-06 11:28:50","uploaded":"2020-03-06 15:12:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200449.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200450","title":"Rel-16 Work Item Exception for SEAL security aspects","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"WI exception request","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4500,"status":"agreed","reservation_date":"2020-03-06 11:31:37","uploaded":"2020-03-06 15:12:32","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200450.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200451","title":"VAL Client authentication","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4510,"status":"approved","reservation_date":"2020-03-06 11:36:13","uploaded":"2020-03-06 12:11:01","revisionof":"S3-200163","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200451.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200452","title":"Annex X: OpenID Connect","source":"SAMSUNG","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4520,"status":"approved","reservation_date":"2020-03-06 11:37:30","uploaded":"2020-03-06 12:11:01","revisionof":"S3-200166","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200452.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200453","title":"WI Exception for Vertical LAN Security","source":"Nokia Germany","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"WI exception request","for":"","abstract":"This work item aims at specifying the security for system enhancements required for 5G system to support new vertical service requirements. \nThis exception sheet is to request an extension to June 2020 for enhancements to the 5G system to support Time Sen","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":4530,"status":"withdrawn","reservation_date":"2020-03-06 11:43:10","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200454","title":"UP integrity enforcement for gPTP messages","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":4540,"status":"agreed","reservation_date":"2020-03-06 11:57:02","uploaded":"2020-03-06 14:57:54","revisionof":"S3-200389","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":771.0,"crrevision":1.0,"crcategory":"C","tsg_crp":"SP-200140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200454.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200455","title":"UP security policy enforcement in 5GLAN","source":"Nokia, Nokia Shanghai Bell, Interdigital, Huawei, HiSilicon","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":4550,"status":"agreed","reservation_date":"2020-03-06 11:58:32","uploaded":"2020-03-06 14:57:54","revisionof":"S3-200384","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":766.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200455.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200456","title":"Referencing Annex for use of authentication methods","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":4560,"status":"agreed","reservation_date":"2020-03-06 12:01:23","uploaded":"2020-03-06 14:57:54","revisionof":"S3-200385","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":767.0,"crrevision":1.0,"crcategory":"D","tsg_crp":"SP-200140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200456.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200457","title":"Clarifications on authentication methods selection and key derivation","source":"Nokia, Nokia Shanghai Bell, Interdigital","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":4570,"status":"agreed","reservation_date":"2020-03-06 12:07:29","uploaded":"2020-03-06 14:57:54","revisionof":"S3-200386","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":768.0,"crrevision":1.0,"crcategory":"D","tsg_crp":"SP-200140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200457.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200458","title":"Add requirement and  feature to the DraftCR","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":16,"ainumber":"3.13","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":4580,"status":"approved","reservation_date":"2020-03-06 12:07:43","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200270","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200458.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200459","title":"New WID for 5G SCAS Enhancement","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"WID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":4590,"status":"agreed","reservation_date":"2020-03-06 12:18:22","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200262","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200459.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200460","title":"Adding AF under Network element clause","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4600,"status":"approved","reservation_date":"2020-03-06 12:19:51","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200250","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200460.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200461","title":"Adding NEF under the Network element clause","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4610,"status":"approved","reservation_date":"2020-03-06 12:20:57","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200251","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200461.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200462","title":"IKEv2 profile update 33.310","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":4620,"status":"agreed","reservation_date":"2020-03-06 12:21:17","uploaded":"2020-03-06 12:40:10","revisionof":"S3-200317","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":104.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200462.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200463","title":"AAnF checks the authorization information of AF","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4630,"status":"approved","reservation_date":"2020-03-06 12:22:10","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200257","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200463.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200464","title":"ESP profile update","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":4640,"status":"agreed","reservation_date":"2020-03-06 12:22:38","uploaded":"2020-03-06 12:40:10","revisionof":"S3-200319","revisedto":"","release":"Rel-16","crspec":33.21,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":64.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200464.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200465","title":"Certificate and CRL profile update","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":4650,"status":"agreed","reservation_date":"2020-03-06 12:23:14","uploaded":"2020-03-06 12:40:10","revisionof":"S3-200331","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":105.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200465.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200466","title":"Required TLS extensions and algorithms","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":21,"ainumber":"3.18","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":4660,"status":"agreed","reservation_date":"2020-03-06 12:23:53","uploaded":"2020-03-06 12:40:10","revisionof":"S3-200333","revisedto":"","release":"Rel-16","crspec":33.21,"crspecversion":"16.2.0","workitem":[{"winame":"CryptPr"}],"crnumber":66.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200466.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200467","title":"Living document of 5WWC","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":4670,"status":"approved","reservation_date":"2020-03-06 12:24:09","uploaded":null,"revisionof":"S3-200247","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200468","title":"eV2X: PC5 UP security policy activation","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4680,"status":"approved","reservation_date":"2020-03-06 12:25:32","uploaded":"2020-03-06 12:27:06","revisionof":"S3-200211","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200468.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200469","title":"Removing EN","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":4690,"status":"approved","reservation_date":"2020-03-06 12:25:35","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200245","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200469.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200470","title":"Exception sheet o fAuthentication and key management for applications based on 3GPP credential in 5G","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"WI exception request","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4700,"status":"revised","reservation_date":"2020-03-06 12:26:33","uploaded":"2020-03-09 10:17:59","revisionof":"","revisedto":"S3-200524","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200470.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200471","title":"Living of URLLC","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":4710,"status":"approved","reservation_date":"2020-03-06 12:26:53","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200246","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200471.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200472","title":"Clarification on UP security activation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":4720,"status":"agreed","reservation_date":"2020-03-06 12:28:05","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200244","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200472.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200473","title":"New test case on NAS integrity protection","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":4730,"status":"agreed","reservation_date":"2020-03-06 12:30:24","uploaded":"2020-03-06 12:31:50","revisionof":"S3-200201","revisedto":"","release":"Rel-16","crspec":33.512,"crspecversion":"16.1.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":5.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200473.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200474","title":"Address the ENs on Security procedures for Small Data Transfer in Control Plane CIoT 5GS Optimisation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":4740,"status":"approved","reservation_date":"2020-03-06 12:31:26","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200226","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200474.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200475","title":"Address the ENs on Security handling in User Plane CIoT 5GS Optimisation","source":"Huawei, Hisilicon, Ericsson","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":4750,"status":"approved","reservation_date":"2020-03-06 12:33:32","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200228","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200475.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200476","title":"Security handling for UP data protection for UP CIoT 5GS Opmitization","source":"Huawei, Hisilicon, Ericsson","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":4760,"status":"approved","reservation_date":"2020-03-06 12:34:25","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200229","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200476.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200477","title":"UE handling on CHO key derivation for NR","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4770,"status":"agreed","reservation_date":"2020-03-06 12:35:24","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200230","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"},{"winame":"TEI16"}],"crnumber":745.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200477.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200478","title":"LS reply to RAN WG2 LS on NR V2X Security issue and PDCP SN size","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4780,"status":"approved","reservation_date":"2020-03-06 12:35:42","uploaded":"2020-03-06 12:50:21","revisionof":"S3-200187","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200057","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200478.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200479","title":"UE handling on CHO key derivation for LTE","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4790,"status":"agreed","reservation_date":"2020-03-06 12:36:20","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200231","revisedto":"","release":"Rel-16","crspec":33.401,"crspecversion":"16.1.0","workitem":[{"winame":"TEI16"}],"crnumber":689.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200479.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200480","title":"Authentication in PNI-NPN","source":"Huawei, Hisilicon,  Nokia, Nokia Shanghai Bell","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"3.6","ainame":"Security for 5GS Enhanced support of Vertical and LAN Services (Rel-16)","tdoc_agenda_sort_order":4800,"status":"agreed","reservation_date":"2020-03-06 12:37:27","uploaded":"2020-03-06 13:14:41","revisionof":"S3-200233","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"Vertical_LAN_SEC"}],"crnumber":747.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200480.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200481","title":"Security requirements for UP Gateway Function","source":"Huawei, Hisilicon, Nokia, Nokia Shanghai Bell, Juniper Networks","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":4810,"status":"agreed","reservation_date":"2020-03-06 12:42:48","uploaded":"2020-03-06 12:44:32","revisionof":"S3-200277","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"UPGF"}],"crnumber":754.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200255","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200481.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200482","title":"reply-LS on UP gateway function on the N9 interface","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":4820,"status":"approved","reservation_date":"2020-03-06 12:44:27","uploaded":"2020-03-06 12:54:52","revisionof":"S3-200292","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200434","lsto":"SA2","Cc":"CT4, SA","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200482.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200483","title":"exception sheet for 5WWC","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"WI exception request","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":4830,"status":"agreed","reservation_date":"2020-03-06 12:49:25","uploaded":"2020-03-09 08:07:10","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200483.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200484","title":"Rel-16 Work Item Exception for CIoT security","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"WI exception request","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":4840,"status":"agreed","reservation_date":"2020-03-06 12:49:36","uploaded":"2020-03-06 14:14:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200484.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200485","title":"Security of 5G URLLC","source":"Huawei Device Co., Ltd","contact":"Longhua Guo","contact-id":80179,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"3.5","ainame":"Security of URLLC for 5GS (Rel-16)","tdoc_agenda_sort_order":4850,"status":"agreed","reservation_date":"2020-03-06 12:53:37","uploaded":"2020-03-06 13:55:24","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_URLLC_SEC"}],"crnumber":783.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200142","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200485.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200486","title":"pCR : Deriving AKMA key after UE is registered to 5GS","source":"Qualcomm Incorporated, Huawei, Hisilicon","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4860,"status":"approved","reservation_date":"2020-03-06 12:56:32","uploaded":"2020-03-06 13:16:21","revisionof":"S3-200363","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200486.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200487","title":"Resource Level Authorization using Access Tokens","source":"Ericsson, Nokia, Nokia Shanghai Bell, Huawei","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4870,"status":"agreed","reservation_date":"2020-03-06 12:59:49","uploaded":"2020-03-06 13:06:31","revisionof":"S3-200282","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":755.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200133","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200487.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200488","title":"Rel-16 Network Slice security Exception sheet","source":"Nokia, Nokia Shangahi Bell","contact":"Suresh Nair","contact-id":70166,"tdoctype":"WI exception request","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":4880,"status":"agreed","reservation_date":"2020-03-06 12:59:58","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_eNS_Ph2"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200489","title":"3gpp-Sbi_Target-apiRoot header and TLS on N32","source":"Ericsson, Nokia, Nokia Shanghai Bell","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"3.8","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":4890,"status":"agreed","reservation_date":"2020-03-06 13:00:43","uploaded":"2020-03-06 13:06:31","revisionof":"S3-200291","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":756.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200133","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200489.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200490","title":"Clarification on native security context activation in handover from EPS to 5GS","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":4900,"status":"agreed","reservation_date":"2020-03-06 13:10:38","uploaded":"2020-03-06 13:16:21","revisionof":"S3-200358","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":760.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-200134","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200490.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200491","title":"Rel-16 Work Item Exception for Security of the enhancement to the 5GC Location Services","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"WI exception request","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"3.7","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":4910,"status":"agreed","reservation_date":"2020-03-06 13:13:37","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200492","title":"Adding SEAL security requirements","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4920,"status":"approved","reservation_date":"2020-03-06 13:20:40","uploaded":"2020-03-06 13:55:24","revisionof":"S3-200234","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200492.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200493","title":"Adding security requirements of interfaces for SEAL","source":"Huawei, Hisilicon, Samsung","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4930,"status":"approved","reservation_date":"2020-03-06 13:22:26","uploaded":"2020-03-06 13:55:24","revisionof":"S3-200235","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200493.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200494","title":"Adding authorization procedures of SEAL system","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4940,"status":"approved","reservation_date":"2020-03-06 13:23:37","uploaded":"2020-03-06 13:56:56","revisionof":"S3-200236","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200494.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200495","title":"Adding SEAl security procedures for interconnection","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":17,"ainumber":"3.14","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":4950,"status":"approved","reservation_date":"2020-03-06 13:24:31","uploaded":"2020-03-06 13:56:56","revisionof":"S3-200237","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.1.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200495.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200496","title":"Adding the requirements for the for the security of the NR PC5 unicast link","source":"Qualcomm Incorporated, LG, Interdigital, Huawei, Apple","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4960,"status":"approved","reservation_date":"2020-03-06 13:26:07","uploaded":"2020-03-06 14:26:41","revisionof":"S3-200342","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200496.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200497","title":"Clarification on the clause 4.3.6.4 according to TS 29.501","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":4970,"status":"agreed","reservation_date":"2020-03-06 13:31:44","uploaded":"2020-03-06 13:39:36","revisionof":"S3-200210","revisedto":"","release":"Rel-16","crspec":33.117,"crspecversion":"16.3.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":57.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200497.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200498","title":"Clarification on PLMN ID verification","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":4980,"status":"agreed","reservation_date":"2020-03-06 13:33:13","uploaded":"2020-03-06 13:39:36","revisionof":"S3-200223","revisedto":"","release":"Rel-16","crspec":33.117,"crspecversion":"16.3.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":58.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200498.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200499","title":"AKMA: Key ID generation","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4990,"status":"approved","reservation_date":"2020-03-06 13:37:56","uploaded":"2020-03-06 13:39:36","revisionof":"S3-200216","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.0.2","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200499.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200500","title":"Enhanced Network Slicing Living CR","source":"Nokia, Nokia Shangahi Bell,","contact":"Suresh Nair","contact-id":70166,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":15,"ainumber":"3.12","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":5000,"status":"approved","reservation_date":"2020-03-06 13:39:59","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"FS_eNS_Ph2"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200501","title":"Proposed text for general and overview clauses of NR PC5 unicast security","source":"Qualcomm Incorporated, LG, Interdigital, Huawei","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":5010,"status":"approved","reservation_date":"2020-03-06 13:50:17","uploaded":"2020-03-06 14:26:41","revisionof":"S3-200345","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200501.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200502","title":"Adding a clause of \"Threats related to key reuse\" for the eNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to add a new key reuse threat for the eNB.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":5020,"status":"agreed","reservation_date":"2020-03-06 13:51:29","uploaded":"2020-03-06 14:20:19","revisionof":"S3-200188","revisedto":"","release":"Rel-16","crspec":33.926,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_eNB"},{"winame":"TEI16"}],"crnumber":31.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200502.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200503","title":"Updating the clause of \"Key Reuse\" for the gNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to update the key reuse threat for the gNB.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":5030,"status":"agreed","reservation_date":"2020-03-06 13:52:16","uploaded":"2020-03-06 14:20:19","revisionof":"S3-200191","revisedto":"","release":"Rel-16","crspec":33.926,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":32.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200503.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200504","title":"Complete the test cases of key refresh at the eNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to add a sub-test case in TS 33.216 clause 4.2.2.1.8 to cover the requirement in TS 36.331 clause 5.3.1.2.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":5040,"status":"agreed","reservation_date":"2020-03-06 13:53:16","uploaded":"2020-03-06 14:20:19","revisionof":"S3-200335","revisedto":"","release":"Rel-16","crspec":33.216,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_eNB"},{"winame":"TEI16"}],"crnumber":13.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200504.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200505","title":"Complete the test cases of key refresh at the gNB","source":"Nokia, Nokia Shanghai Bell, Telecom Italia, NTT DoCoMo","contact":"Wei Lu","contact-id":79335,"tdoctype":"CR","for":"Approval","abstract":"This CR proposes to extend and add a sub-test case in TS 33.511 clause 4.2.2.1.13 to cover the requirement in TS 38.331 clause 5.3.1.2.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"3.1","ainame":"Security Assurance Specification for 5G (Rel-16)","tdoc_agenda_sort_order":5050,"status":"agreed","reservation_date":"2020-03-06 13:53:54","uploaded":"2020-03-06 14:20:19","revisionof":"S3-200336","revisedto":"","release":"Rel-16","crspec":33.511,"crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":11.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200505.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200506","title":"Proposed text for keying clause of NR PC5 unicast security","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":5060,"status":"approved","reservation_date":"2020-03-06 13:57:58","uploaded":"2020-03-06 14:26:41","revisionof":"S3-200346","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200506.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200507","title":"Proposed text for security establishment clause of NR PC5 unicast security","source":"Qualcomm Incorporated, Interdigital, Apple, Huawei, LG, Samsung","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":5070,"status":"approved","reservation_date":"2020-03-06 14:06:35","uploaded":"2020-03-06 14:26:41","revisionof":"S3-200347","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200507.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200508","title":"Proposed text for security protection clause of NR PC5 unicast security","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":5080,"status":"approved","reservation_date":"2020-03-06 14:13:34","uploaded":"2020-03-06 14:26:41","revisionof":"S3-200348","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200508.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200509","title":"Annex for key derivation functions in the V2X TS","source":"Qualcomm Incorporated, LG","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":5090,"status":"approved","reservation_date":"2020-03-06 14:17:59","uploaded":"2020-03-06 14:26:41","revisionof":"S3-200349","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200509.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200510","title":"Proposed procedures for the privacy of NR PC5 unicast connections","source":"Qualcomm Incorporated, LG, Interdigital","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":5100,"status":"approved","reservation_date":"2020-03-06 14:22:25","uploaded":"2020-03-06 14:26:41","revisionof":"S3-200352","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.2.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200510.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200511","title":"Adding UDM to AKMA reference model","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":5110,"status":"approved","reservation_date":"2020-03-06 14:22:40","uploaded":"2020-03-06 14:45:04","revisionof":"S3-200129","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200511.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200512","title":"Update 6.2","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":5120,"status":"approved","reservation_date":"2020-03-06 14:23:31","uploaded":"2020-03-06 14:45:04","revisionof":"S3-200136","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200512.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200513","title":"Derivation of KAKMA","source":"China Mobile, Nokia, Nokia Shanghai Bell, ZTE, Huawei, Hisilicon, Samsung","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":5130,"status":"approved","reservation_date":"2020-03-06 14:45:53","uploaded":"2020-03-06 14:57:41","revisionof":"S3-200392","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200513.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200514","title":"[33.180] R16 - MC Gateway security","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add security for interconnection when using an MC gateway server.","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":5140,"status":"agreed","reservation_date":"2020-03-06 16:41:31","uploaded":"2020-03-06 17:06:57","revisionof":"S3-200081","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.2.0","workitem":[{"winame":"MCXSec"}],"crnumber":136.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-200135","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200514.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200515","title":"[33.180] R16 SeGy IWF corrections","source":"Motorola Solutions Danmark A\/S","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"The implementation of security within a SeGy for interworking is not clear.","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":5150,"status":"agreed","reservation_date":"2020-03-06 16:58:50","uploaded":"2020-03-06 17:06:57","revisionof":"S3-200110","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.2.0","workitem":[{"winame":"MCXSec"}],"crnumber":138.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200135","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200515.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200516","title":"Security of RRC UE capability transfer procedure in EPS","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":5160,"status":"agreed","reservation_date":"2020-03-06 17:17:25","uploaded":"2020-03-06 17:20:02","revisionof":"S3-200180","revisedto":"","release":"Rel-15","crspec":33.401,"crspecversion":"15.10.0","workitem":[{"winame":"TEI15"}],"crnumber":688.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200138","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200516.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200517","title":"Reply LS to LS on native 5G NAS security context activation","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"LS out","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":5170,"status":"revised","reservation_date":"2020-03-06 17:26:04","uploaded":"2020-03-06 17:51:21","revisionof":"S3-200175","revisedto":"S3-200529","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200070","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200517.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200518","title":"CIOT: draft CR Living document","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3131,"status":"approved","reservation_date":"2020-03-11 10:20:39","uploaded":null,"revisionof":"S3-200313","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200519","title":"[Draft CR] Updates to Control Plane CIoT 5GS Optimization","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"3.1","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":3071,"status":"approved","reservation_date":"2020-03-11 10:20:39","uploaded":null,"revisionof":"S3-200307","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200520","title":"CR on 5G security for 5WWC","source":"Huawei","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":14,"ainumber":"3.11","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":52000,"status":"agreed","reservation_date":"2020-03-11 10:20:39","uploaded":"2020-03-11 15:58:34","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"5WWC"}],"crnumber":784.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-200145","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98e\/Docs\/S3-200520.zip","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200521","title":"Cover sheet for TS 33.536","source":"LG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"TS or TR cover","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":52100,"status":"approved","reservation_date":"2020-03-11 10:20:42","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200522","title":"Work Item exception MCXsec","source":"Motorola Solutions","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WI exception request","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"3.2","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":52200,"status":"agreed","reservation_date":"2020-03-11 10:20:42","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200523","title":"draft TS 33.535","source":"China Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TS","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4381,"status":"approved","reservation_date":"2020-03-11 10:20:42","uploaded":null,"revisionof":"S3-200438","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.2.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200524","title":"Exception sheet of Authentication and key management for applications based on 3GPP credential in 5G","source":"China Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WI exception request","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"3.9","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":4701,"status":"agreed","reservation_date":"2020-03-11 10:20:44","uploaded":null,"revisionof":"S3-200470","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200525","title":"Work Item on Security Assurance Specification for 5G NWDAF","source":"China Mobile, China Unicom, CAICT, ZTE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":3941,"status":"agreed","reservation_date":"2020-03-11 10:20:44","uploaded":null,"revisionof":"S3-200394","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200526","title":"New WID on Security Assurance Specification for Service Communication Proxy (SECOP)","source":"Nokia, Nokia Shanghai Bell, Deutsch Telecom, T-Mobile USA, China Mobile, China Unicom","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WID new","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":4091,"status":"agreed","reservation_date":"2020-03-11 10:20:45","uploaded":null,"revisionof":"S3-200409","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200527","title":"New WID on Security Assurance Specification for Non-3GPP InterWorking Function (N3IWF)","source":"China Unicom, CAICT, China Mobile, CATT, ZTE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WID new","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"4","ainame":"New work and study item proposals","tdoc_agenda_sort_order":2801,"status":"agreed","reservation_date":"2020-03-11 10:20:45","uploaded":null,"revisionof":"S3-200280","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200528","title":"draft_TS 33.536 v0.3.0","source":"LG Electronics Inc.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TS","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"3.15","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":4401,"status":"approved","reservation_date":"2020-03-11 10:20:46","uploaded":null,"revisionof":"S3-200440","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200529","title":"Reply LS to LS on native 5G NAS security context activation","source":"Intel Corporation (UK) Ltd","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"3.19","ainame":"Other areas (Rel-16)","tdoc_agenda_sort_order":5171,"status":"approved","reservation_date":"2020-03-11 10:20:47","uploaded":null,"revisionof":"S3-200517","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200070","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200530","title":"Protection of N9 interface","source":"Nokia, Nokia Shanghai Bell, Juniper Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"Protection of inter-PLMN N9 interface","secretary_remarks":"","agenda_item_sort_order":19,"ainumber":"3.16","ainame":"User Plane Gateway Function for Inter-PLMN Security (Rel-16)","tdoc_agenda_sort_order":0,"status":"agreed","reservation_date":"2020-03-12 10:21:44","uploaded":null,"revisionof":"S3-200399","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.1.0","workitem":[{"winame":"UPGF"}],"crnumber":689.0,"crrevision":3.0,"crcategory":"B","tsg_crp":"SP-200255","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-37781","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]