[{"name":"S3-200600","title":"Agenda","source":"WG Chair","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"agenda","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":1,"ainumber":"1","ainame":"Agenda and meeting objectives","tdoc_agenda_sort_order":6000,"status":"approved","reservation_date":"2020-04-02 07:16:03","uploaded":"2020-04-06 15:33:11","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200600.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200601","title":"eV2XARC-Security policy for unicast message in PC5","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6010,"status":"revised","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"S3-200824","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200601.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200602","title":"eV2XARC-Security policy provisioning","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6020,"status":"noted","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200602.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200603","title":"eV2XARC-Security establishment for user plane bearer","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6030,"status":"noted","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200603.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200604","title":"eV2XARC-LCID clairification","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6040,"status":"noted","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200604.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200605","title":"eV2XARC-Correction in 5.3.3.1.3.2 and 5.3.3.2.2","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6050,"status":"approved","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200605.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200606","title":"AKMA-Derivation of the KAF","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6060,"status":"noted","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200606.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200607","title":"AKMA-KAF refreshment","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6070,"status":"merged","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200607.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200608","title":"AKMA-Editorial on the 6.2","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6080,"status":"noted","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200608.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200609","title":"AKMA-AAnF definition","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6090,"status":"noted","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200609.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200610","title":"AKMA-AKMA capability indication between UE and AF","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6100,"status":"noted","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200610.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200611","title":"UPIP-Update for solution#10","source":"Apple","contact":"Ivy Guo","contact-id":78821,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6110,"status":"approved","reservation_date":"2020-04-02 08:01:44","uploaded":"2020-04-03 13:25:05","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200611.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200612","title":"TS 33.536 - Corrections","source":"InterDigital, Inc., Nokia, Nokia Shanghai Bell, Ericsson","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides editorial corrections for TS 33.536-1.0.0.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6120,"status":"approved","reservation_date":"2020-04-02 09:14:13","uploaded":"2020-04-03 12:22:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200612.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200613","title":"Authentication between network functions and the NRF in indirect communication","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6130,"status":"noted","reservation_date":"2020-04-02 12:42:07","uploaded":"2020-04-02 20:02:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200613.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200614","title":"Token-based authorization in Scenario D","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6140,"status":"noted","reservation_date":"2020-04-02 12:43:21","uploaded":"2020-04-02 20:02:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200614.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200615","title":"LS on 5G-GUTI reallocation after paging of a UE in 5GMM-IDLE mode with suspend indication","source":"C1-200967","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":6150,"status":"postponed","reservation_date":"2020-04-02 14:09:59","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200615.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200616","title":"LS on Misalignment on HTTP connections for N32-c and on N32-f contexts termination","source":"C4-200781","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6160,"status":"withdrawn","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200616.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200617","title":"LS on Misalignments on N32-f context Id","source":"C4-200782","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6170,"status":"withdrawn","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200617.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200618","title":"Mandatory User Plane Integrity for 5G","source":"GSMA","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6180,"status":"noted","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200618.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200619","title":"Clarification on encryption requirements for AGF interfaces (N1, N2, N3) [WWC]","source":"BBF","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"2.6","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":6190,"status":"postponed","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200619.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200620","title":"LS to SA3 on NR V2X Security issues","source":"R2-2001980","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6200,"status":"replied to","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-200820, S3-200820","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200620.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200621","title":"Response LS on Enhancing Location Information Reporting with Dual Connectivity","source":"R3-201249","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":6210,"status":"noted","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200621.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200622","title":"Reply LS on AUSF role in slice specific authentication","source":"S2-1910668","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":6220,"status":"replied to","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-200821, S3-200821","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200622.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200623","title":"Reply LS on LS on PC5S and PC5 RRC unicast message protection","source":"S2-1912002","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6230,"status":"noted","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200623.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200624","title":"Reply LS on PC5 unicast and groupcast security protection","source":"S2-2000971","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6240,"status":"noted","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200624.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200625","title":"Reply LS on 5G-S-TMSI Truncation Procedure","source":"S2-2001248","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":6250,"status":"noted","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200625.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200626","title":"LS on enhancing location information reporting with Dual Connectivity","source":"S2-2002422","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":6260,"status":"noted","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200626.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200627","title":"LS on uniqueness of PEI in certain FN-RG configurations","source":"S3i200069","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"2.6","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":6270,"status":"postponed","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200627.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200628","title":"Reply LS on how the IWF obtains key material for interworking group and private communications","source":"S6-192194","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":6280,"status":"replied to","reservation_date":"2020-04-02 14:10:00","uploaded":"2020-04-02 15:20:40","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-200649, S3-200649","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200628.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200629","title":"pCR to TR 33.853 move of network options from introduction to section 4","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"moves the network options from the introduction to the network options section.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6290,"status":"noted","reservation_date":"2020-04-02 14:28:33","uploaded":"2020-04-03 14:56:36","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200629.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200630","title":"pCR to TR33.853 (UPIP) - Addition of conclusions to section 7.2","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"This adds a conclusion for LTE core based options","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6300,"status":"withdrawn","reservation_date":"2020-04-02 14:34:29","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200631","title":"pCR to TR 33.853 (UPIP): addition of new solution - used NR PDCP for LTE","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"this adds a new solution for the LTE core options.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6310,"status":"noted","reservation_date":"2020-04-02 14:36:45","uploaded":"2020-04-03 14:30:12","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200631.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200632","title":"draft WID - Normative changes for UPIP","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"WID new","for":"Approval","abstract":"This WID covers changes to SA3 specification to implement updates to UPIP","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6320,"status":"noted","reservation_date":"2020-04-02 14:38:53","uploaded":"2020-04-03 14:05:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200632.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200633","title":"CR to 33.501 - Update to User Plane Integrity Protection","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6330,"status":"not pursued","reservation_date":"2020-04-02 14:42:56","uploaded":"2020-04-03 13:42:26","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":785.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200633.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200634","title":"LS to RAN3 and CT1 on Updated User Plane Integrity Protection advice","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6340,"status":"noted","reservation_date":"2020-04-02 14:46:08","uploaded":"2020-04-03 13:36:06","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN3, CT1","Cc":"RAN, SA, SA2","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200634.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200635","title":"Cover sheet for TR 33.853 for Information","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"TS or TR cover","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6350,"status":"noted","reservation_date":"2020-04-02 14:48:12","uploaded":"2020-04-03 09:48:13","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200635.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200636","title":"minutes of UPIP confcall #1 on 2 April 2020","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6360,"status":"noted","reservation_date":"2020-04-02 14:49:54","uploaded":"2020-04-03 09:47:17","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200636.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200637","title":"minutes of confcall 2 on UPIP held 3 April 2020","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6370,"status":"noted","reservation_date":"2020-04-02 14:50:55","uploaded":"2020-04-03 14:08:59","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200637.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200638","title":"Discussion docuemnt on the approval of TR33.853","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"discussion","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6380,"status":"withdrawn","reservation_date":"2020-04-02 15:04:09","uploaded":null,"revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200639","title":"pCR to 33.853 (UPIP) - Correction to Key Issue 5","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6390,"status":"noted","reservation_date":"2020-04-02 16:00:39","uploaded":"2020-04-03 14:46:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/s3-200639.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200640","title":"AKMA Application Key Requirement","source":"Futurewei","contact":"Marcus Wong","contact-id":82314,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes to remove one of the AKMA AF requirements.","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6400,"status":"approved","reservation_date":"2020-04-02 17:56:12","uploaded":"2020-04-02 19:49:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200640.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200641","title":"eLCS NOTE Clarification","source":"Futurewei","contact":"Marcus Wong","contact-id":82314,"tdoctype":"other","for":"Approval","abstract":"This pCR proposes clarification to NOTEs in the living CR for eLCS.","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":6410,"status":"noted","reservation_date":"2020-04-02 18:09:12","uploaded":"2020-04-02 19:49:32","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200641.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200642","title":"Emergency Services in eV2X","source":"Futurewei","contact":"Marcus Wong","contact-id":82314,"tdoctype":"other","for":"Approval","abstract":"This pCR proposes some clarification on emergency services support.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6420,"status":"revised","reservation_date":"2020-04-02 18:20:10","uploaded":"2020-04-02 19:49:32","revisionof":"","revisedto":"S3-200805, S3-200806","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200642.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200643","title":"UPIP Way Forward Discussion","source":"Futurewei","contact":"Marcus Wong","contact-id":82314,"tdoctype":"discussion","for":"Endorsement","abstract":"This is discussion paper on way forward for UPIP in R16.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6430,"status":"noted","reservation_date":"2020-04-02 18:22:12","uploaded":"2020-04-02 19:49:32","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200643.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200644","title":"[33.180] R16 Fix first-to-answer","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Align the first-to-answer security setup procedure with the normal private call security setup procedures.","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":6440,"status":"not pursued","reservation_date":"2020-04-02 21:27:56","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.3.0","workitem":[{"winame":"MCXSec"}],"crnumber":141.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200644.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200645","title":"[33.179] R13 token scope fix","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Fix Rel-13 access token scope definitions to align with Rel-14+ access token scope definitions.","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":6450,"status":"not pursued","reservation_date":"2020-04-02 21:32:41","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"13.10.0","workitem":[{"winame":"MCPTT"}],"crnumber":106.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200645.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200646","title":"[33.180] R16 Fix IdM client terminology","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Clarify that IdM client implementations are outside the scope of 33.180.","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":6460,"status":"not pursued","reservation_date":"2020-04-02 21:35:40","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.3.0","workitem":[{"winame":"MCXSec"}],"crnumber":142.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200646.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200647","title":"[33.180] R16 Fix XML references","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Fix References","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":6470,"status":"not pursued","reservation_date":"2020-04-02 21:38:48","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.3.0","workitem":[{"winame":"MCXSec"}],"crnumber":143.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200647.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200648","title":"[33.180] R16 TrK-ID and InK-ID indication","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":6480,"status":"not pursued","reservation_date":"2020-04-02 21:42:02","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.3.0","workitem":[{"winame":"MCXSec"}],"crnumber":144.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200648.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200649","title":"SA3 Reply LS on how the IWF obtains key material for interworking group and private communications","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"LS out","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":6490,"status":"approved","reservation_date":"2020-04-02 22:44:45","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200628","lsto":"CT1, SA6","Cc":"","lsoriginalls":"S3-193930","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200649.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200650","title":"SEAL Key Management procedure","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"key management procedure for a SEAL","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"2.9","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":6500,"status":"revised","reservation_date":"2020-04-02 22:48:41","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"S3-200835","release":"Rel-16","crspec":33.434,"crspecversion":"0.2.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200650.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200651","title":"SEAL Key Management Request and Response messages","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"Key management messages for SEAL key management service.","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"2.9","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":6510,"status":"revised","reservation_date":"2020-04-02 22:51:48","uploaded":"2020-04-03 14:31:42","revisionof":"","revisedto":"S3-200836","release":"Rel-16","crspec":33.434,"crspecversion":"0.2.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200651.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200652","title":"AGF in 5GC trust domain","source":"Juniper Networks, Ericsson","contact":"Steve Kohalmi","contact-id":37299,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"2.6","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":6520,"status":"approved","reservation_date":"2020-04-02 23:53:23","uploaded":"2020-04-02 23:57:04","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200652.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200653","title":"TS 33.536 - Clean up","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This pCR clean-up the latest version of TS 33.536 in general","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6530,"status":"approved","reservation_date":"2020-04-03 01:03:34","uploaded":"2020-04-03 02:58:44","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"AKMA"},{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200653.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200654","title":"TS 33.536 - Common Security over NR PC5","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes requirements and procedures that can be commonly applied to all kinds of modes over NR PC5","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6540,"status":"revised","reservation_date":"2020-04-03 01:10:13","uploaded":"2020-04-03 02:58:44","revisionof":"","revisedto":"S3-200823","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200654.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200655","title":"TS 33.536 - Security Policy for NR PC5","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes a procedure to select the security policy at the receiving UE.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6550,"status":"noted","reservation_date":"2020-04-03 01:15:47","uploaded":"2020-04-03 02:58:44","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200655.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200656","title":"TS 33.536 - Group ID conversion on NR PC5","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes text to cover the privacy of destination ID for the groupcast.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6560,"status":"noted","reservation_date":"2020-04-03 01:19:42","uploaded":"2020-04-03 02:58:44","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200656.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200657","title":"eNS Living CR Re-submission","source":"Nokia, Nokia Shanghai Bell","contact":"Suresh Nair","contact-id":70166,"tdoctype":"draftCR","for":"Approval","abstract":"Re-submission of eNS living CR","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":6570,"status":"noted","reservation_date":"2020-04-03 01:36:13","uploaded":"2020-04-03 12:01:15","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"eNS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200657.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200658","title":"Slice Specific Authentication and Authrorization clauses","source":"Nokia, Nokia Shanghai Bell","contact":"Suresh Nair","contact-id":70166,"tdoctype":"draftCR","for":"Approval","abstract":"Text for subclauses for eNS","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":6580,"status":"revised","reservation_date":"2020-04-03 01:42:15","uploaded":"2020-04-03 12:00:10","revisionof":"","revisedto":"S3-200807","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"eNS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200658.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200659","title":"draft_Reply LS to SA2 on AUSF role","source":"Nokia, Nokia Shanghai Bell","contact":"Suresh Nair","contact-id":70166,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":6590,"status":"merged","reservation_date":"2020-04-03 01:47:12","uploaded":"2020-04-03 12:00:10","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200622","lsto":"SA2","Cc":"","lsoriginalls":"S2-1910668","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200659.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200660","title":"Way forward on authentication and authorization in SBA","source":"CableLabs","contact":"Tao Wan","contact-id":79074,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6600,"status":"noted","reservation_date":"2020-04-03 01:53:29","uploaded":"2020-04-03 01:57:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"FS_SBA_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200660.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200661","title":"TS 33.535 - Corrections","source":"InterDigital, Inc.","contact":"Alec Brusilovsky","contact-id":72017,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides editorial corrections for TS 33.535-0.3.0.","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6610,"status":"approved","reservation_date":"2020-04-03 02:53:06","uploaded":"2020-04-03 12:22:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200661.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200662","title":"Validation of Access Token ownership requirement","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"clarification to the validation of the access token during token-based authorization in the case of Direct and Indirect communication","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6620,"status":"not pursued","reservation_date":"2020-04-03 04:54:23","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":786.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200662.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200663","title":"Discussion End-2-End Access Token ownership validation","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"discussion","for":"Endorsement","abstract":"What is required for end-2-end access token authorization","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6630,"status":"noted","reservation_date":"2020-04-03 04:54:28","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200663.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200664","title":"end-2-end client authentication during Indirect communication","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"discussion","for":"Endorsement","abstract":"Discussion on the required proof for enabling end-2-end authentication during Indirect communication","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6640,"status":"noted","reservation_date":"2020-04-03 04:54:28","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200664.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200665","title":"Clarification of Token-based authorization","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"What is required to enable end-2-end hop-by-hop mutual authentuication","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6650,"status":"not pursued","reservation_date":"2020-04-03 04:54:28","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":787.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200665.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200666","title":"Clarification of Indirect Communication Mutual Authentication","source":"Mavenir,Deutsche Telekom","contact":"Ahmad Muhanna","contact-id":84435,"tdoctype":"CR","for":"Approval","abstract":"Removing ambiguity regarding mutual authentication between NFs within same PLMN during Indirect communication, e.g., with SCP as a proxy service node","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6660,"status":"not pursued","reservation_date":"2020-04-03 04:54:30","uploaded":"2020-04-03 05:13:01","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":788.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200666.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200667","title":"Procedure to transfer UE capability for UEs without AS Security","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":6670,"status":"noted","reservation_date":"2020-04-03 06:00:42","uploaded":"2020-04-03 07:17:59","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200667.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200668","title":"Security of RRC UE capability transfer procedure in 5G for CIoT optimisation","source":"Intel Corporation (UK) Ltd","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":6680,"status":"noted","reservation_date":"2020-04-03 06:14:24","uploaded":"2020-04-03 07:17:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200668.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200669","title":"Update clause 4.1","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6690,"status":"approved","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200669.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200670","title":"Update the figure in clause 6.1","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6700,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200670.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200671","title":"Update the procedure in clause 6.2","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6710,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200671.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200672","title":"Store AUSF instance ID in UDM","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6720,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200672.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200673","title":"Defining  AKMA key identifier for  AKMA Anchor Key on demand procedures","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6730,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200673.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200674","title":"AKMA anchor Key push","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6740,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200674.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200675","title":"AKMA anchor Key update notification","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6750,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200675.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200676","title":"Processing of KAKMA failure from AUSF to AAnF","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6760,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200676.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200677","title":"Expire time in UE","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6770,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200677.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200678","title":"Derivation of KAF","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6780,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200678.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200679","title":"KAF update","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":6790,"status":"noted","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200679.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200680","title":"Adding a definition for IAB-UE","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":6800,"status":"not pursued","reservation_date":"2020-04-03 06:53:32","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"NR_IAB"}],"crnumber":789.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200680.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200681","title":"Update the Annex M.2.4","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":6810,"status":"not pursued","reservation_date":"2020-04-03 06:53:39","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"NR_IAB"}],"crnumber":790.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200681.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200682","title":"Adding some abbreviations to V2X TS","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6820,"status":"approved","reservation_date":"2020-04-03 06:53:40","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200682.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200683","title":"Update the clause 5.3.3.1.2.3","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6830,"status":"revised","reservation_date":"2020-04-03 06:53:40","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"S3-200825","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200683.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200684","title":"Update clause 5.3.3.2.2","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6840,"status":"revised","reservation_date":"2020-04-03 06:53:40","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"S3-200828","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200684.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200685","title":"Clean up of V2X TS","source":"ZTE Corporation","contact":"Jin PENG","contact-id":49548,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6850,"status":"approved","reservation_date":"2020-04-03 06:53:40","uploaded":"2020-04-03 09:12:56","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200685.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200686","title":"Trust mode in the eSBA","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6860,"status":"not pursued","reservation_date":"2020-04-03 07:28:54","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":791.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200686.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200687","title":"eSBA: Discussion on the subscribe\/notify issue","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6870,"status":"noted","reservation_date":"2020-04-03 07:28:58","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200687.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200688","title":"Authorization in the Subscribe-Notify interaction scenarios","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6880,"status":"not pursued","reservation_date":"2020-04-03 07:28:58","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":792.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200688.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200689","title":"Clarification on NF consumer instance ID verification","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":6890,"status":"not pursued","reservation_date":"2020-04-03 07:28:59","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":793.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200689.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200690","title":"eV2X: Resolving EN on policy definition","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6900,"status":"approved","reservation_date":"2020-04-03 07:29:00","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200690.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200691","title":"eV2X: Resolving EN on security policy handling","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6910,"status":"noted","reservation_date":"2020-04-03 07:29:00","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200691.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200692","title":"eV2X: Resolving EN on the choice of security notification message","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6920,"status":"noted","reservation_date":"2020-04-03 07:29:00","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200692.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200693","title":"eV2X: Clarification on the security policy provisioning","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":6930,"status":"noted","reservation_date":"2020-04-03 07:29:00","uploaded":"2020-04-03 07:44:32","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200693.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200694","title":"F1 interface security set-up procedure","source":"Samsung, Thales, Nokia, Nokia Shanghai Bell, ZTE","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":6940,"status":"not pursued","reservation_date":"2020-04-03 07:49:47","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"IAB"}],"crnumber":794.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200694.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200695","title":"Proposed solution for UP IP issues in GSMA LS","source":"Samsung, Nokia, Nokia Shanghai Bell","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6950,"status":"noted","reservation_date":"2020-04-03 07:55:49","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200695.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200696","title":"UP integrity protection for UP Signalling messages","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6960,"status":"not pursued","reservation_date":"2020-04-03 07:59:03","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"TEI16"}],"crnumber":795.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200696.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200697","title":"Integrity protection of DNS messages","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6970,"status":"not pursued","reservation_date":"2020-04-03 08:02:17","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.401,"crspecversion":"16.2.0","workitem":[{"winame":"TEI16"}],"crnumber":692.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200697.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200698","title":"Draft CR as a living baseline for 5GS LCS normative work","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":6980,"status":"approved","reservation_date":"2020-04-03 08:02:36","uploaded":"2020-04-03 08:47:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200698.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200699","title":"Reduced overhead for UP IP for 5G RAN_conclusion","source":"Philips International B.V.","contact":"Walter Dees","contact-id":54701,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":6990,"status":"noted","reservation_date":"2020-04-03 08:03:40","uploaded":"2020-04-03 14:59:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200699.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200700","title":"Conclusion to Key Issue #5","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7000,"status":"noted","reservation_date":"2020-04-03 08:04:21","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200700.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200701","title":"Reply LS on 5G-GUTI reallocation after paging of a UE in 5GMM-IDLE mode with suspend indication","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"LS out","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7010,"status":"noted","reservation_date":"2020-04-03 08:08:39","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200615","lsto":"CT1","Cc":"","lsoriginalls":"C1-200967","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200701.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200702","title":"Removing ENs in Draft CR as a living baseline for 5GS LCS normative work","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":7020,"status":"noted","reservation_date":"2020-04-03 08:09:56","uploaded":"2020-04-03 08:47:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200702.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200703","title":"Discussion paper to support AKMA progress","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7030,"status":"noted","reservation_date":"2020-04-03 08:10:50","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200703.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200704","title":"AKMA key ID derivation","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7040,"status":"noted","reservation_date":"2020-04-03 08:13:31","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200704.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200705","title":"Key update procedure","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7050,"status":"noted","reservation_date":"2020-04-03 08:15:19","uploaded":"2020-04-03 12:31:25","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200705.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200706","title":"KAF derivation and refresh","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7060,"status":"noted","reservation_date":"2020-04-03 08:16:42","uploaded":"2020-04-03 12:26:48","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200706.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200707","title":"Authorization of AF in AKMA","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7070,"status":"noted","reservation_date":"2020-04-03 08:18:11","uploaded":"2020-04-03 09:38:59","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200707.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200708","title":"LS reply to RAN WG2 LS on NR V2X Security issues","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7080,"status":"revised","reservation_date":"2020-04-03 08:21:21","uploaded":"2020-04-03 08:47:02","revisionof":"","revisedto":"S3-200820","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200708.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200709","title":"Adding additional AF functionality in clause 4.2.2","source":"CATT","contact":"Xiaoyu Bi","contact-id":86856,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7090,"status":"revised","reservation_date":"2020-04-03 08:33:54","uploaded":"2020-04-03 08:57:34","revisionof":"","revisedto":"S3-200826","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200709.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200710","title":"Adding UDM functionality in clause 4.2","source":"CATT","contact":"Xiaoyu Bi","contact-id":86856,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7100,"status":"noted","reservation_date":"2020-04-03 08:39:32","uploaded":"2020-04-03 08:57:34","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200710.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200711","title":"Adding UE functionality in clause 4.2","source":"CATT","contact":"Xiaoyu Bi","contact-id":86856,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7110,"status":"noted","reservation_date":"2020-04-03 08:43:14","uploaded":"2020-04-03 08:57:34","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200711.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200712","title":"The details of the AKMA service subscription information confirmation","source":"CATT","contact":"Xiaoyu Bi","contact-id":86856,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7120,"status":"noted","reservation_date":"2020-04-03 08:47:10","uploaded":"2020-04-03 08:57:34","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200712.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200713","title":"Update Requirement on clause 4.3.1","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7130,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200713.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200714","title":"Lifetime of Kakma ID","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7140,"status":"approved","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200714.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200715","title":"Kakma ID format","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7150,"status":"revised","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"S3-200814","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200715.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200716","title":"Kakma and Kakma ID derivation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7160,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200716.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200717","title":"Store Kakma ID in the UDM","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7170,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200717.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200718","title":"AUSF selection","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7180,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200718.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200719","title":"Add a new clause on AKMA key re-keying","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7190,"status":"revised","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"S3-200815","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200719.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200720","title":"Add clarifications to the living CR","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":7200,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200720.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200721","title":"editorial change to IAB architecture","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":7210,"status":"approved","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200721.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200722","title":"Security handling for UP data protection for UP CIoT 5GS Opmitization","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7220,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200722.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200723","title":"Discussion on protection of UE radio capability","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7230,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200723.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200724","title":"Deriving AKMA Application key for a specific AF via NEF","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7240,"status":"merged","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200724.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200725","title":"Update to deriving AKMA Application key for a specific AF","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7250,"status":"revised","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"S3-200816","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200725.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200726","title":"AUSF function in AKMA","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7260,"status":"revised","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"S3-200817","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200726.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200727","title":"Discussion on the functionality of Key ID in PDCP header for NR PC5 unicast communication","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7270,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 13:34:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200727.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200728","title":"V2X signalling security mandatory activation for unicast","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7280,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200728.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200729","title":"Draft LS on the security context index field in PDCP header for NR PC5 unicast","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7290,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 13:34:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200729.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200730","title":"Clarification for V2X layer passing security configurations to AS layer","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7300,"status":"revised","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"S3-200819","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200730.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200731","title":"Add requirement for OAM to IAB ENDC","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":7310,"status":"approved","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.401,"crspecversion":"16.2.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200731.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200732","title":"Draft LS on security of eLCS","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":7320,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"CT1,SA2","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200732.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200733","title":"way forward on Calculation of shortResumeMAC-I","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"discussion","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7330,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200733.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200734","title":"Address EN for Calculation of ShortResumeMAC-I for UP 5GS CIoT Optimisation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7340,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200734.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200735","title":"Draft LS to RAN2 and RAN3 inputs for ShortResumeMAC-I Calculation for UP 5GS CIoT Optimisation","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7350,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2, RAN3","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200735.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200736","title":"Draft Reply LS on 5G-S-TMSI Truncation Procedure","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7360,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2, RAN2, CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200736.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200737","title":"Discussion on endorsement for UP IP","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7370,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200737.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200738","title":"Draft LS on UP IP","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7380,"status":"noted","reservation_date":"2020-04-03 08:55:17","uploaded":"2020-04-03 10:24:29","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2, RAN2, RAN3, CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200738.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200739","title":"AKMA AF key request via NEF","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7390,"status":"revised","reservation_date":"2020-04-03 09:28:21","uploaded":"2020-04-03 13:34:58","revisionof":"","revisedto":"S3-200803","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200739.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200740","title":"AKMA Architecture considerations","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7400,"status":"noted","reservation_date":"2020-04-03 09:28:21","uploaded":"2020-04-03 13:34:58","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200740.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200741","title":"pCR to TS 33.535: Update of the AKMA procedures","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7410,"status":"noted","reservation_date":"2020-04-03 09:28:21","uploaded":"2020-04-03 13:34:58","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200741.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200742","title":"Discussion paper on eV2X groupcast privacy","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7420,"status":"noted","reservation_date":"2020-04-03 09:34:08","uploaded":"2020-04-03 13:05:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200742.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200743","title":"Adding privacy procedures for V2X group cast communication","source":"Huawei, HiSilicon, Lenovo, Motorola Mobility","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7430,"status":"noted","reservation_date":"2020-04-03 09:39:43","uploaded":"2020-04-03 13:05:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200743.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200744","title":"[Draft CR] Input to MESSAGE when calculating ShortResumeMAC-I in RRC Connection Suspend and Resume","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7440,"status":"noted","reservation_date":"2020-04-03 09:47:43","uploaded":"2020-04-03 11:18:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200744.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200745","title":"UPIP: pCR for new solution of UP IP in EPS","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7450,"status":"revised","reservation_date":"2020-04-03 09:47:43","uploaded":"2020-04-03 11:19:24","revisionof":"","revisedto":"S3-200832","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200745.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200746","title":"UPIP: pCR for new solution for option 5","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7460,"status":"revised","reservation_date":"2020-04-03 09:47:43","uploaded":"2020-04-03 11:19:55","revisionof":"","revisedto":"S3-200833","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200746.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200747","title":"Way forward for UE caps protection and NB-IoT Ues","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7470,"status":"noted","reservation_date":"2020-04-03 10:03:34","uploaded":"2020-04-03 10:17:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200747.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200748","title":"UE caps protection using AS security in EPS Rel-16","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7480,"status":"not pursued","reservation_date":"2020-04-03 10:03:35","uploaded":"2020-04-03 10:17:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.401,"crspecversion":"16.2.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":693.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200748.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200749","title":"UE caps protection using AS security in 5GS Rel-16","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7490,"status":"not pursued","reservation_date":"2020-04-03 10:03:37","uploaded":"2020-04-03 10:17:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":796.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200749.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200750","title":"Resolving ENs in Draft CR","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":7500,"status":"noted","reservation_date":"2020-04-03 10:03:39","uploaded":"2020-04-03 10:17:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200750.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200751","title":"[DRAFT] LS on security of eLCS","source":"Ericsson","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":7510,"status":"noted","reservation_date":"2020-04-03 10:03:39","uploaded":"2020-04-03 10:17:33","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"5G_eLCS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN2","Cc":"CT1, SA2","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200751.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200752","title":"ERP for TNAP mobility","source":"Lenovo, Motorola Mobility","contact":"Andreas Kunz","contact-id":72589,"tdoctype":"CR","for":"Approval","abstract":"Introduction of ERP for TNAP mobility","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"2.6","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":7520,"status":"not pursued","reservation_date":"2020-04-03 10:13:09","uploaded":"2020-04-03 11:09:16","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5WWC"}],"crnumber":797.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200752.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200753","title":"Resolving the Editors\u2019 Note on policy name in V2X TS","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7530,"status":"noted","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200753.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200754","title":"Proposal to finalise UP security policy in V2X","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7540,"status":"noted","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200754.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200755","title":"Proposal to resolve the Editor\u2019s note of the size of COUNT","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7550,"status":"noted","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200755.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200756","title":"Privacy of K_NRP ID","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7560,"status":"noted","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200756.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200757","title":"Resolving the editor\u2019s note on the protection of messages","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7570,"status":"noted","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200757.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200758","title":"Using the old security context for processing received re-transmissions","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7580,"status":"noted","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200758.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200759","title":"Proposal for the Editor\u2019s note on groupcast privacy","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7590,"status":"noted","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200759.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200760","title":"Interworking between EPS and 5GS when UP IP is supported in EPS","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7600,"status":"approved","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200760.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200761","title":"Using existing algorithm IEs to indicate support UP IP with an eNB","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7610,"status":"approved","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200761.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200762","title":"F1 security setup with certificate based IKEv2 authentication","source":"Qualcomm Incorporated, Ericsson, Intel","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":7620,"status":"not pursued","reservation_date":"2020-04-03 10:30:00","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"NR_IAB"}],"crnumber":798.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200762.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200763","title":"F1 security setup with PSK based IKEv2 authentication","source":"Qualcomm Incorporated, Ericsson, Intel","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":7630,"status":"not pursued","reservation_date":"2020-04-03 10:30:03","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"NR_IAB"}],"crnumber":799.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200763.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200764","title":"Protection of UE radio capability transfer for UEs without AS security","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7640,"status":"noted","reservation_date":"2020-04-03 10:30:04","uploaded":"2020-04-03 11:57:30","revisionof":"S3-200357","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200764.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200765","title":"Way forward for UE radio capability protection without AS security","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7650,"status":"noted","reservation_date":"2020-04-03 10:30:05","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200765.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200766","title":"On the GSMA LS on UP IP","source":"Qualcomm Incorporated, vivo, Nokia, Nokia Shanghai Bell","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7660,"status":"noted","reservation_date":"2020-04-03 10:30:05","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200766.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200767","title":"Proposed solution for UP IP issues in GSMA LS","source":"Qualcomm Incorporated, vivo","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7670,"status":"noted","reservation_date":"2020-04-03 10:30:05","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200767.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200768","title":"Proposed conclusion for Key Issue #6 in TR 33.853","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":7680,"status":"approved","reservation_date":"2020-04-03 10:30:05","uploaded":"2020-04-03 11:57:30","revisionof":"S3-194338","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200768.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200769","title":"pCR : Requirements on AKMA Key Identifier","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7690,"status":"revised","reservation_date":"2020-04-03 10:30:05","uploaded":"2020-04-03 11:57:30","revisionof":"S3-200365","revisedto":"S3-200812","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200769.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200770","title":"pCR : AKMA Temporary UE Identifier","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7700,"status":"noted","reservation_date":"2020-04-03 10:30:05","uploaded":"2020-04-03 11:57:30","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200770.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200771","title":"Correction of FC values","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7710,"status":"revised","reservation_date":"2020-04-03 10:56:48","uploaded":"2020-04-03 12:07:31","revisionof":"","revisedto":"S3-200830","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200771.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200772","title":"CR to TS 33.220-FC value allocations for AKMA","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7720,"status":"not pursued","reservation_date":"2020-04-03 11:03:38","uploaded":"2020-04-03 12:07:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.22,"crspecversion":"16.0.0","workitem":[{"winame":"AKMA"}],"crnumber":200.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200772.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200773","title":"Removing obsolete Editor\u2019s Notes in TS 33.535","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7730,"status":"approved","reservation_date":"2020-04-03 11:06:31","uploaded":"2020-04-03 12:07:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200773.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200774","title":"Derivation of KAF","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7740,"status":"noted","reservation_date":"2020-04-03 11:08:34","uploaded":"2020-04-03 12:07:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200774.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200775","title":"Meeting minutes of AKMA conference call on 31st March","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"other","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":7750,"status":"noted","reservation_date":"2020-04-03 11:10:19","uploaded":"2020-04-03 12:07:31","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200775.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200776","title":"Addessing EN on transmitting NSSAI to AAA","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7760,"status":"noted","reservation_date":"2020-04-03 11:15:28","uploaded":"2020-04-03 11:34:06","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"eNS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200776.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200777","title":"LS on transformation of S-NSSAI during NSSAA","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7770,"status":"noted","reservation_date":"2020-04-03 11:19:50","uploaded":"2020-04-03 11:34:06","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"eNS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2, CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200777.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200778","title":"DraftCR \u2013 Living document for supporting 5G CIoT security","source":"Ericsson","contact":"Henrik Andreas Normann","contact-id":77974,"tdoctype":"draftCR","for":"Approval","abstract":"Baseline capturing previously agreed text","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":7780,"status":"noted","reservation_date":"2020-04-03 11:22:24","uploaded":"2020-04-03 11:32:03","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_CIoT"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200778.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200779","title":"N5CW: editorial correction","source":"THALES, ORANGE","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"draftCR","for":"Approval","abstract":"N5CW: editorial correction","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"2.6","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":7790,"status":"noted","reservation_date":"2020-04-03 11:29:12","uploaded":"2020-04-03 12:15:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200779.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200780","title":"[DRAFT] Reply LS on AUSF role in slice specific authentication","source":"Ericsson","contact":"Henrik Andreas Normann","contact-id":77974,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7800,"status":"merged","reservation_date":"2020-04-03 11:46:55","uploaded":"2020-04-03 12:31:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S2-1910668","lsto":"SA2","Cc":"CT3, CT4","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200780.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200781","title":"DraftCR \u2013 Replacing AUSF with AAA-IWF for NSSAA procedures","source":"Ericsson, Hewlett-Packard Enterprise, China Mobile, CATT","contact":"Henrik Andreas Normann","contact-id":77974,"tdoctype":"draftCR","for":"Approval","abstract":"This contribution targets the living CR document.","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7810,"status":"merged","reservation_date":"2020-04-03 11:46:55","uploaded":"2020-04-03 12:31:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"eNS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200781.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200782","title":"Discussion paper on the role of AUSF during NSSAA","source":"Ericsson, Hewlett-Packard Enterprise, China Mobile, CATT","contact":"Henrik Andreas Normann","contact-id":77974,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7820,"status":"noted","reservation_date":"2020-04-03 11:46:55","uploaded":"2020-04-03 12:31:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"eNS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200782.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200783","title":"UE pre-configuration for non-3GPP access networks","source":"THALES, ORANGE","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"draftCR","for":"Approval","abstract":"UE pre-configuration for non-3GPP access networks","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"2.6","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":7830,"status":"approved","reservation_date":"2020-04-03 12:06:44","uploaded":"2020-04-03 12:11:47","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200783.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200784","title":"AUSF role in slice-specific authentication","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7840,"status":"noted","reservation_date":"2020-04-03 12:22:22","uploaded":"2020-04-03 13:05:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200784.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200785","title":"draft LS to SA2 on AUSF roles","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7850,"status":"revised","reservation_date":"2020-04-03 12:22:22","uploaded":"2020-04-03 13:05:02","revisionof":"","revisedto":"S3-200821","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"SA2","lsto":"SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200785.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200786","title":"draft CR on AUSF roles","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7860,"status":"merged","reservation_date":"2020-04-03 12:22:22","uploaded":"2020-04-03 13:05:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200786.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200787","title":"draft CR on sending NSSAI to AAA","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7870,"status":"noted","reservation_date":"2020-04-03 12:22:22","uploaded":"2020-04-03 13:05:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200787.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200788","title":"draft CR on miscellaneous items","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":7880,"status":"merged","reservation_date":"2020-04-03 12:22:22","uploaded":"2020-04-03 13:05:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200788.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200789","title":"Destination L2 privacy","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"pCR","for":"Approval","abstract":"a new solution against V2X UE tracking based on PC5 destination L2 identifier","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7890,"status":"noted","reservation_date":"2020-04-03 12:49:43","uploaded":"2020-04-03 13:04:28","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200789.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200790","title":"Discussion paper on security policy","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":7900,"status":"withdrawn","reservation_date":"2020-04-03 13:31:48","uploaded":"2020-04-03 13:34:37","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200790.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200791","title":"eLCS privacy discussion on way forward","source":"NTT DOCOMO","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":7910,"status":"noted","reservation_date":"2020-04-03 14:47:58","uploaded":"2020-04-03 14:51:06","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200791.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200792","title":"Token based authorization in model D - Scenario 1","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"Token based authorization for Model D - Scenario 1","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7920,"status":"noted","reservation_date":"2020-04-03 14:51:57","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200792.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200793","title":"Process for SA3#98bis-e meeting","source":"Ericsson LM","contact":"Noamen Ben Henda","contact-id":63310,"tdoctype":"other","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":1,"ainumber":"1","ainame":"Agenda and meeting objectives","tdoc_agenda_sort_order":7930,"status":"noted","reservation_date":"2020-04-03 14:55:01","uploaded":"2020-04-03 15:07:04","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200793.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200794","title":"Token based authorization in model D - Scenario 2","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7940,"status":"noted","reservation_date":"2020-04-03 14:56:01","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200794.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200795","title":"Authentication between Network Functions","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7950,"status":"noted","reservation_date":"2020-04-03 14:59:27","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200795.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200796","title":"Authentication between NRF and NF","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7960,"status":"noted","reservation_date":"2020-04-03 15:02:04","uploaded":"2020-04-03 15:08:39","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200796.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200797","title":"Access token ownership in Direct communication scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7970,"status":"noted","reservation_date":"2020-04-03 15:10:44","uploaded":"2020-04-03 15:27:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200797.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200798","title":"Access token ownership in Indirect communication scenarios","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7980,"status":"noted","reservation_date":"2020-04-03 15:12:47","uploaded":"2020-04-03 15:27:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200798.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200799","title":"Token based authorization in model D","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":7990,"status":"withdrawn","reservation_date":"2020-04-03 15:14:39","uploaded":"2020-04-03 15:27:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200799.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200800","title":"SBA Network Function certificate profile","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":8000,"status":"noted","reservation_date":"2020-04-03 15:28:33","uploaded":"2020-04-03 15:29:52","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200800.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200801","title":"Discussion paper on authentication for indirect communication","source":"Nokia, Nokia Shanghai Bell","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"2.3","ainame":"Security Aspects of the 5G Service Based Architecture (Rel-16)","tdoc_agenda_sort_order":8010,"status":"noted","reservation_date":"2020-04-03 15:32:13","uploaded":"2020-04-03 15:33:42","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5G_eSBA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200801.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200802","title":"5G_eLCS - meeting minutes conf-call on eLCS Privacy Protection","source":"Nanjing Ericsson Panda Com Ltd","contact":"Prajwol Kumar Nakarmi","contact-id":76183,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"2.2","ainame":"Security of the enhancement to the 5GC location services","tdoc_agenda_sort_order":8020,"status":"noted","reservation_date":"2020-04-17 11:00:31","uploaded":"2020-04-17 14:47:45","revisionof":"","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200802.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200803","title":"AKMA AF key request via NEF","source":"Ericsson, Huawei","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8030,"status":"approved","reservation_date":"2020-04-17 13:49:40","uploaded":"2020-04-17 14:04:09","revisionof":"S3-200739","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200803.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200804","title":"Draft TR 33.853 v0.8.0","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"draft TR","for":"Approval","abstract":"Draft TR as a result of SA3 98bis-e","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":8040,"status":"reserved","reservation_date":"2020-04-17 14:05:32","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.8.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200805","title":"Emergency Services in eV2X","source":"Futurewei","contact":"Marcus Wong","contact-id":82314,"tdoctype":"other","for":"Approval","abstract":"This pCR proposes some clarification on emergency services support.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8050,"status":"withdrawn","reservation_date":"2020-04-17 14:11:43","uploaded":"2020-04-17 14:19:21","revisionof":"S3-200642","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200805.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200806","title":"Emergency Services in eV2X","source":"Futurewei, InterDigital, Inc.","contact":"Marcus Wong","contact-id":82314,"tdoctype":"other","for":"Approval","abstract":"This pCR proposes some clarification on emergency services support.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8060,"status":"approved","reservation_date":"2020-04-17 14:26:37","uploaded":"2020-04-17 14:29:26","revisionof":"S3-200642","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200806.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200807","title":"Living CR for Slice Specific Authentication and Authrorization clauses","source":"Nokia, Nokia Shanghai Bell, Huawei, HiSilicon, Ericsson, Hewlett-Packard Enterprise, China Mobile, CATT, Interdigital","contact":"Suresh Nair","contact-id":70166,"tdoctype":"draftCR","for":"Approval","abstract":"Text for subclauses for eNS","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":8070,"status":"approved","reservation_date":"2020-04-17 14:29:25","uploaded":"2020-04-17 14:52:19","revisionof":"S3-200658","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"eNS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200807.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200808","title":"[33.179] R13 token scope fix","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"draftCR","for":"Agreement","abstract":"Fix Rel-13 access token scope definitions to align with Rel-14+ access token scope definitions.","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":8080,"status":"approved","reservation_date":"2020-04-17 17:12:26","uploaded":"2020-04-18 20:06:43","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.179,"crspecversion":"13.10.0","workitem":[{"winame":"MCPTT"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200808.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200809","title":"[33.180] R16 Fix IdM client terminology","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"draftCR","for":"Agreement","abstract":"Clarify that IdM client implementations are outside the scope of 33.180.","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":8090,"status":"approved","reservation_date":"2020-04-17 17:15:12","uploaded":"2020-04-18 20:06:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.3.0","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200809.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200810","title":"[33.180] R16 Fix XML references","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"draftCR","for":"Agreement","abstract":"Fix References","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":8100,"status":"approved","reservation_date":"2020-04-17 17:16:55","uploaded":"2020-04-18 20:06:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.3.0","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200810.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200811","title":"[33.180] R16 TrK-ID and InK-ID indication","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":2,"ainumber":"2.1","ainame":"Mission Critical security (Rel-16)","tdoc_agenda_sort_order":8110,"status":"approved","reservation_date":"2020-04-17 17:18:31","uploaded":"2020-04-18 20:06:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.3.0","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200811.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200812","title":"pCR : Requirements on AKMA Key Identifier","source":"Qualcomm Incorporated","contact":"Anand Palanigounder","contact-id":84545,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8120,"status":"approved","reservation_date":"2020-04-17 21:13:03","uploaded":"2020-04-17 21:24:29","revisionof":"S3-200769","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200812.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200813","title":"Kakma ID format","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8130,"status":"withdrawn","reservation_date":"2020-04-18 01:35:34","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200814","title":"Kakma ID format","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8140,"status":"approved","reservation_date":"2020-04-18 01:39:13","uploaded":"2020-04-18 02:18:48","revisionof":"S3-200715","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200814.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200815","title":"Add a new clause on AKMA key re-keying","source":"Huawei, Hisilicon,Apple","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8150,"status":"approved","reservation_date":"2020-04-18 01:40:46","uploaded":"2020-04-18 02:18:48","revisionof":"S3-200719","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200815.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200816","title":"Update to deriving AKMA Application key for a specific AF","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8160,"status":"approved","reservation_date":"2020-04-18 01:43:22","uploaded":"2020-04-18 02:18:48","revisionof":"S3-200725","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200816.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200817","title":"AUSF function in AKMA","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8170,"status":"approved","reservation_date":"2020-04-18 01:44:08","uploaded":"2020-04-18 02:18:48","revisionof":"S3-200726","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200817.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200818","title":"Living CR for 5WWC","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"2.6","ainame":"Security of the Wireless and Wireline Convergence for the 5G system  architecture (Rel-16)","tdoc_agenda_sort_order":8180,"status":"approved","reservation_date":"2020-04-18 01:53:03","uploaded":"2020-04-28 08:57:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"5WWC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200818.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200819","title":"Clarification for V2X layer passing security configurations to AS layer","source":"Huawei, Hisilicon","contact":"Longhua Guo","contact-id":80179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8190,"status":"approved","reservation_date":"2020-04-18 01:55:10","uploaded":"2020-04-18 02:18:48","revisionof":"S3-200730","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"0.3.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200819.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200820","title":"LS reply to RAN WG2 LS on NR V2X Security issues","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8200,"status":"approved","reservation_date":"2020-04-18 02:54:05","uploaded":"2020-04-23 09:27:57","revisionof":"S3-200708","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200620","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200820.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200821","title":"LS to SA2 on AUSF roles","source":"Huawei, HiSilicon, Nokia, Ericsson","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":8,"ainumber":"2.7","ainame":"Security aspects of Enhancement of Network Slicing (Rel-16)","tdoc_agenda_sort_order":8210,"status":"approved","reservation_date":"2020-04-18 07:56:35","uploaded":"2020-04-18 10:14:23","revisionof":"S3-200785","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"FS_eNS_SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-200622","lsto":"SA2, CT1, CT3, CT4","Cc":"","lsoriginalls":"S3-200622","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200821.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200822","title":"draft_TS 33.536 v1.1.0","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"draft TS","for":"Approval","abstract":"draft TS 33.536 v1.1.0 implements the contributions approved during SA3#98bis-e meeting.","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8220,"status":"approved","reservation_date":"2020-04-20 01:01:34","uploaded":"2020-04-20 05:25:16","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.1.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200822.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200823","title":"TS 33.536 - Common Security over NR PC5","source":"LG Electronics Inc.","contact":"Dongjoo Kim","contact-id":84882,"tdoctype":"pCR","for":"Approval","abstract":"This pCR proposes requirements and procedures that can be commonly applied to all kinds of modes over NR PC5","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8230,"status":"approved","reservation_date":"2020-04-20 01:28:26","uploaded":"2020-04-20 01:30:36","revisionof":"S3-200654","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200823.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200824","title":"eV2XARC-Security policy for unicast message in PC5","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8240,"status":"approved","reservation_date":"2020-04-20 02:17:38","uploaded":"2020-04-23 09:27:57","revisionof":"S3-200601","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200824.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200825","title":"Update the clause 5.3.3.1.2.3","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":81252,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8250,"status":"approved","reservation_date":"2020-04-20 03:24:48","uploaded":"2020-04-23 09:27:57","revisionof":"S3-200683","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200825.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200826","title":"Adding additional AF functionality in clause 4.2.2","source":"CATT","contact":"Xiaoyu Bi","contact-id":86856,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8260,"status":"approved","reservation_date":"2020-04-20 04:35:39","uploaded":"2020-04-20 04:49:20","revisionof":"S3-200709","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200826.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200827","title":"Draft 33.434 v0.3.0","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"draft TS","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"2.9","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":8270,"status":"approved","reservation_date":"2020-04-20 04:52:03","uploaded":"2020-04-24 13:04:26","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.3.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200827.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200828","title":"Update clause 5.3.3.2.2","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":81252,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8280,"status":"approved","reservation_date":"2020-04-20 06:10:22","uploaded":"2020-04-23 09:27:57","revisionof":"S3-200684","revisedto":"","release":"Rel-16","crspec":33.536,"crspecversion":"1.0.0","workitem":[{"winame":"eV2XARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200828.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200829","title":"Adding a definition for IAB-UE","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":81252,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"2.8","ainame":"Security for NR Integrated Access and Backhaul (Rel-16)","tdoc_agenda_sort_order":8290,"status":"approved","reservation_date":"2020-04-20 06:17:16","uploaded":"2020-04-23 09:27:57","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.501,"crspecversion":"16.2.0","workitem":[{"winame":"NR_IAB"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200829.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200830","title":"Correction of FC values","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8300,"status":"approved","reservation_date":"2020-04-20 09:22:13","uploaded":"2020-04-20 09:28:38","revisionof":"S3-200771","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.3.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200830.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200831","title":"draft TS 33.535 v0.4.0","source":"China Mobile","contact":"Xiaoting Huang","contact-id":78337,"tdoctype":"draft TS","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":5,"ainumber":"2.4","ainame":"Authentication and key management for applications based on 3GPP credential in  5G  (Rel-16)","tdoc_agenda_sort_order":8310,"status":"approved","reservation_date":"2020-04-20 09:41:59","uploaded":"2020-04-20 13:35:07","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.535,"crspecversion":"0.4.0","workitem":[{"winame":"AKMA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200831.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200832","title":"UPIP: pCR for new solution of UP IP in EPS","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":8320,"status":"approved","reservation_date":"2020-04-20 10:28:45","uploaded":"2020-04-20 10:47:45","revisionof":"S3-200745","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200832.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200833","title":"UPIP: pCR for new solution for option 5","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"2.11","ainame":"Study on User Plane Integrity Protection (Rel-16)","tdoc_agenda_sort_order":8330,"status":"approved","reservation_date":"2020-04-20 10:37:10","uploaded":"2020-04-20 10:48:21","revisionof":"S3-200746","revisedto":"","release":"Rel-16","crspec":33.853,"crspecversion":"0.7.0","workitem":[{"winame":"FS_UP_IP_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200833.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200834","title":"LS on Specifying the PC5-S messages that can be processed without protection","source":"Qualcomm Incorpotated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":11,"ainumber":"2.1","ainame":"Security Aspects of 3GPP support for Advanced V2X Services (Rel-16)","tdoc_agenda_sort_order":8340,"status":"approved","reservation_date":"2020-04-20 11:12:37","uploaded":"2020-04-20 11:16:54","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200834.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200835","title":"SEAL Key Management procedure","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"key management procedure for a SEAL","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"2.9","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":8350,"status":"approved","reservation_date":"2020-04-20 14:55:30","uploaded":"2020-04-20 15:10:53","revisionof":"S3-200650","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.2.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200835.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200836","title":"SEAL Key Management Request and Response messages","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"pCR","for":"Agreement","abstract":"Key management messages for SEAL key management service.","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"2.9","ainame":"Security aspects of SEAL (Rel-16)","tdoc_agenda_sort_order":8360,"status":"approved","reservation_date":"2020-04-20 14:57:17","uploaded":"2020-04-20 15:10:53","revisionof":"S3-200651","revisedto":"","release":"Rel-16","crspec":33.434,"crspecversion":"0.2.0","workitem":[{"winame":"SEAL"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200836.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-200837","title":"CIoT UE caps confcall rapporteur notes","source":"Ericsson","contact":"Henrik Andreas Normann","contact-id":77974,"tdoctype":"discussion","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":6,"ainumber":"2.5","ainame":"Evolution of Cellular IoT security for the 5G System (Rel-16)","tdoc_agenda_sort_order":8370,"status":"noted","reservation_date":"2020-04-21 08:28:39","uploaded":"2020-04-21 10:07:19","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_98Bis_e\/Docs\/S3-200837.zip","group":"S3","meeting":"S3-ah-38059","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]