3GPP TDocs (written contributions) at meeting
Meeting: S3-78 - 2015-01-26 to 2015-01-30, Sorrento
meeting id: S3-78 (click id for more info on this meeting)Click on the Tdoc to open its file.
TDoc | Title | Source | Remarks |
---|---|---|---|
S3‑151000 | Agenda | WG Chairman | - |
S3‑151001 | Report from last SA meeting | WG Chairman | - |
S3‑151002 | SA3 meeting calendar | ETSI Secretariat | - |
S3‑151003 | Report from last SA3 meeting | ETSI Secretariat | - |
S3‑151004 | SA3 WorkPlan | ETSI Secretariat | - |
S3‑151005 | Reply LS on UICC Access Optimization | C6-140686 | - |
S3‑151006 | LS on UE-based procedure with USAT application pairing | C6-140730 | - |
S3‑151007 | LS on Security Framework for Cellular IoT | GP-140717 | - |
S3‑151008 | Reply LS on new work item on simple encryption procedure for IoT device security | GP-140967 | - |
S3‑151009 | Potential collaboration on Mobile-Edge Computing | ETSI ISG MEC | - |
S3‑151010 | LS on TLS and DTLS terminology | ITU-T Q3/16 | - |
S3‑151011 | LS to SA3 on RAN2 agreements for Dual Connectivity | R2-145367 | - |
S3‑151012 | Reply LS on Transferring Security Information in the PDCP Header | R2-145415 | - |
S3‑151013 | LS on Network Access Algorithm Support for the Embedded UICC | GSMA SIM Group and Security Group | - |
S3‑151014 | Candidate Release Available | OneM2M | - |
S3‑151015 | LS on Establishment of new working group TSG SA WG6 | SP-140884 | - |
S3‑151016 | Liaison on Complete Platform Integrity for 3GPP Infrastructure | TCG Trusted Mobility Solutions WG | - |
S3‑151017 | Draft Reply LS to TCG | Interdigital, Freescale Semiconductor | - |
S3‑151018 | pCR SCAS Clarification/Improvements of logging requirements | Ericsson | - |
S3‑151019 | pCR SCAS Clarification/Improvements of traffic separation requirements | Ericsson | - |
S3‑151020 | Proposed TR skeleton for MCPTT Security Study | CESG | - |
S3‑151021 | pCR to TR 33.806 clause B.3.4.1 | Deutsche Telekom AG | - |
S3‑151022 | pCR to TR 33.806 clause B.3.4.2 | Deutsche Telekom AG | - |
S3‑151023 | pCR to TR 33.806 clause B.4.3 | Deutsche Telekom AG | - |
S3‑151024 | pCR to TR 33.806 clause B.4.2 | Deutsche Telekom AG | - |
S3‑151025 | Proposing a template to be used for test cases | Telecom Italia S.p.A | - |
S3‑151026 | Adding a new Annex (Annex D) to collect all test cases | Telecom Italia S.p.A | - |
S3‑151027 | Additions to Annex D related to new test cases | Telecom Italia S.p.A | - |
S3‑151028 | pCR on moving existing threats to the Tampering threat category | Telecom Italia S.p.A | - |
S3‑151029 | pCR on moving existing threats to the Denial of Service threat category | Telecom Italia S.p.A | - |
S3‑151030 | pCR on moving existing threats to the Elevation of Privilege threat category | Telecom Italia S.p.A | - |
S3‑151031 | pCR on moving existing threats to the Information Disclosure threat category | Telecom Italia S.p.A | - |
S3‑151032 | Proposed handling of requirements on authentication and authorization in Annex B.3.3.4 of TR 33.806 | Alcatel-Lucent, Nokia Networks | - |
S3‑151033 | pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Authentication policy | Alcatel-Lucent, Nokia Networks | - |
S3‑151034 | pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Authentication Attributes | Alcatel-Lucent, Nokia Networks | - |
S3‑151035 | pCR to TR 33.806 on merging requirements on password rules | Nokia Networks, Alcatel-Lucent | - |
S3‑151036 | pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Specific Authentication use cases | Alcatel-Lucent, Nokia Networks | - |
S3‑151037 | pCR to TR 33.806 on requirement on lock-out policy | Nokia Networks, Alcatel-Lucent | - |
S3‑151038 | pCR to TR 33.806 on merging requirements on authorization and access control | Nokia Networks, Alcatel-Lucent | - |
S3‑151039 | Discussion of requirements 3.01-15 and 3.01-19 in Annex C of TR 33.806 | Nokia Networks, Alcatel-Lucent | - |
S3‑151040 | pCR to TR 33.806 on modification of EditorĆs note | Nokia Networks, Alcatel-Lucent | - |
S3‑151041 | USAT Pairing update | Gemalto, Morpho,Oberthur | - |
S3‑151042 | Work Plan input from the Rapporteurs | ETSI Secretariat | - |
S3‑151043 | 3GU overview | ETSI Secretariat | - |
S3‑151044 | Proposed Scope for MCPTT TR | CESG | - |
S3‑151045 | Security_requirements for MCPTT | Airbus, CESG, French MoI, Harris, Motorola Solutions, Selex, Sepura, Telefonica UK, Thales | - |
S3‑151046 | Security threats for MCPTT | Airbus, Motorola Solutions, Sepura PLC, UK Home Office, CESG | - |
S3‑151047 | Discussion on RAN2 LS S3-151011 | Alcatel-Lucent | - |
S3‑151048 | draft_ CR to 33.401 corresponding to RAN2 LS S3-151011 | Alcatel-Lucent | - |
S3‑151049 | Updated WebRTC WID:eWebRTCi | Huawei | - |
S3‑151050 | pCR to TR 33.872 Assessment of TURN authentication candidate solutions | Huawei | - |
S3‑151051 | Secure protection for unicast delivery of group message | Huawei, HiSilicon | - |
S3‑151052 | Security for T4 message delivery to a group of devices | Huawei, HiSilicon | - |
S3‑151053 | Authorisation for restricted ProSe direct discovery | Huawei, HiSilicon | - |
S3‑151054 | ProSe Counter | Huawei, HiSilicon | - |
S3‑151055 | Discovery Slot Clarification | Huawei, HiSilicon | - |
S3‑151056 | Discussion of integrity protection for cellular IoT UE | Huawei, HiSilicon, China Unicom | - |
S3‑151057 | Dicsussion of encryption algorithms for cellular IoT UE | Huawei, HiSilicon, China Unicom | - |
S3‑151058 | Discussion on SA5 related management security of virtualized networks | China Mobile | - |
S3‑151059 | Mandatory support of mutual authentication | Huawei, HiSilicon,Vodafone | - |
S3‑151060 | pCR to TR 33.806 on requirements for MME Management and Mainteance Interfaces | Huawei, HiSilicon | - |
S3‑151061 | Definitions of identity and identifiable | China Unicom, ZTE Corporation | - |
S3‑151062 | Condense existing threats to the Privacy guidelines for writing 3GPP TRs and TSs (in the new Annex F) | China Unicom, ZTE Corporation | - |
S3‑151063 | pCR to TR 33.806 on requirements for Log Protection and Management | Huawei, HiSilicon | - |
S3‑151064 | pCR to TR 33.806 on requirements for user identities | Huawei, HiSilicon | - |
S3‑151065 | pCR to TR 33.806 on requirements for MME user account and password management | Huawei, HiSilicon | - |
S3‑151066 | Privacy identification process | China Unicom, ZTE Corporation | - |
S3‑151067 | LS to SA5 on considerations for management security of virtualized networks | China Mobile | - |
S3‑151068 | Privacy guidelines for the third party service providers | China Unicom, ZTE Corporation | - |
S3‑151069 | Key issue- user privacy preference | China Unicom, ZTE Corporation | - |
S3‑151070 | Correntions on SCG security algorithm negotiation | Huawei, HiSilicon | - |
S3‑151071 | Solutions analysis of DOS attack in registration procedure | China Mobile | - |
S3‑151072 | LS_out_SA3 to RAN2_Reply LS on RAN2 agreements for Dual Connectivity | Huawei, HiSilicon | - |
S3‑151073 | Solutions accessment of DOS attack in registration procedure | China Mobile | - |
S3‑151074 | General security requirments for MCPTT | Huawei, HiSilicon | - |
S3‑151075 | [MTCe] Discussion about group authentication mechanism | China Mobile | - |
S3‑151076 | [MTCe] group authentication mechanism | China Mobile | - |
S3‑151077 | key issue on Authentication in ProSe Restricted Discovery | ZTE Corporation, China Unicom | - |
S3‑151078 | En on prevention against replay attacks in ProSe Restricted Discovery | ZTE Corporation, China Unicom | - |
S3‑151079 | key issue on Restricted ProSe Direct Discovery (Model B) | ZTE Corporation, China Unicom | - |
S3‑151080 | security for One-to-one Relays | ZTE Corporation, China Unicom | - |
S3‑151081 | MONTE-Requirement on Location Management | ZTE Corporation | - |
S3‑151082 | Summary of the IETF STIR group active drafts on spoofed call detection | Alcatel Lucent | - |
S3‑151083 | Clarifying PTK Identity description in TS 33.303 | Ericsson | - |
S3‑151084 | ProSe 33.833 Correction to Key Issue 7.1.2 ProSe UE-Network Relays Connection | Nokia Networks | - |
S3‑151085 | Solving the first Editor Note in section 6.3.2.2 of TR 33.872 | Alcatel Lucent | - |
S3‑151086 | ProSe 33 833 Clarification to traditional RN | Nokia Networks | - |
S3‑151087 | Solving the second Editor Note in section 6.3.2.2 of TR 33.872 | Alcatel Lucent | - |
S3‑151088 | SPI 33.849 Ed Note - Annex F | Nokia Networks | - |
S3‑151089 | Clarification of one-to-many requirements | Ericsson | - |
S3‑151090 | Discussion on some Cellular Internet of Things security requirements and solutions | Ericsson | - |
S3‑151091 | SPI 33.849 Mitigation techniques - Annex F | Nokia Networks | - |
S3‑151092 | Solving the third Editor Note in section 6.3.2.2 of TR 33.872 | Alcatel Lucent | - |
S3‑151093 | SPI 33.849 Threats - Annex F | Nokia Networks | - |
S3‑151094 | Update of SCEF security architecture figure in AESE, and addition of an editorĆs note on authorization in interface A1 | Ericsson | - |
S3‑151095 | SPI 33.849 Communication Model - Annex F | Nokia Networks | - |
S3‑151096 | Discussion on SA5 related management security of virtualized networks | China Mobile | - |
S3‑151097 | Removing all the Editor's notes in 6.3.2.2 of TR 33.872 | Alcatel Lucent | - |
S3‑151098 | LS to SA5 on considerations for management security of virtualized networks | China Mobile | - |
S3‑151099 | AESE: Solution for using OMA-ER-Autho4API for securing SCEF A2 and A3 interfaces | Ericsson | - |
S3‑151100 | Identity-based authentication and key agreement for IOPS System-in-a-Box | Intel | - |
S3‑151101 | UE-to-network relay security for ProSe | Ericsson | - |
S3‑151102 | One-to-one security for ProSe | Ericsson | - |
S3‑151103 | Key issue for MONTE on privacy of UE location information | Ericsson | - |
S3‑151104 | Study of the efficiency of AKA/SA procedures applied to C-IoT | Vodafone | - |
S3‑151105 | Key issues and security requirements proposals for C-IoT | Vodafone | - |
S3‑151106 | Aligning Network based protection for cell broadcast with SA2 TR 23.769 | Samsung | - |
S3‑151107 | Security information in PDCP Header | Samsung | - |
S3‑151108 | Security Requirements for Out-Of-Coverage Discovery | Samsung | - |
S3‑151109 | Solution for Out-Of-Coverage Discovery | Samsung | - |
S3‑151110 | New Study Item for Security Aspects of Isolated E-UTRAN Operation for Public Safety | General Dynamics UK Ltd. | - |
S3‑151111 | Security aspects of the SA2 study on Isolated E-UTRAN Operation for Public Safety (IOPS) | General Dynamics UK Ltd. | - |
S3‑151112 | Outline TR for Study on Isolated E-UTRAN Operation for Public Safety: Security aspects | General Dynamics UK Ltd. | - |
S3‑151113 | Text proposal for the outline TR for Study on Isolated E-UTRAN Operation for Public Safety | General Dynamics UK Ltd. | - |
S3‑151114 | Adding a MIC Check timer to direct discovery procedures | Qualcomm Incorporated | - |
S3‑151115 | Restricted Direct Discovery using Model B | Ericsson | - |
S3‑151116 | Adding a key issue for restricted direct discovery to TR 33.833 | Qualcomm Incorporated | - |
S3‑151117 | Adding a solution for restricted direct discovery to TR 33.833 | Qualcomm Incorporated | - |
S3‑151118 | pCR for a security solution for Restricted Direct Discovery using Model | Ericsson | - |
S3‑151119 | Some security analysis for GERAN CIoT | Qualcomm Incorporated | - |
S3‑151120 | Discussion of open issues in security for Cellular Internet of Things | Nokia Networks | - |
S3‑151121 | Study of the efficiency of AKA/SA procedures applied to C-IoT | Vodafone | - |
S3‑151122 | Update to living document on security enhancements for Cellular Internet of Things | Nokia Networks | - |
S3‑151123 | Draft reply LS to GERAN on security for Cellular Internet of Things | Nokia Networks | - |
S3‑151124 | Proposal to re-use security solution for ProSe Open Direct Discovery for Restricted Direct Discovery | Ericsson | - |
S3‑151125 | Discussion of optionality of Match Report in ProSe Direct Open Discovery (Model A) | Ericsson | - |
S3‑151126 | Identification of MCPTT Assets | CESG | - |
S3‑151127 | Comments to S3-151050 | Alcatel Lucent | - |
S3‑151128 | Comments to S3-151041 | Gemalto | - |
S3‑151129 | Adding a new Annex (Annex D) to collect all test cases - Updated | Telecom Italia S.p.A | - |
S3‑151130 | Reply LS on LI requirements for end-to-end WebRTC-IMS security | S3i150060 | - |
S3‑151131 | Agenda | WG Chairman | - |
S3‑151132 | LS related to Mobile VoIP IMS Roaming | S3i150073 | - |
S3‑151133 | MCPTT project plan | SA2 Chairman | - |
S3‑151134 | DT comments against S3-151129 | Deutsche Telekom AG | - |
S3‑151135 | SA3 Meeting calendar | ETSI Secretariat | - |
S3‑151136 | Nokia comments on 1027_TEST-CASES-SHEET | Nokia Networks | - |
S3‑151137 | Nokia comments on 1129_Update_of_S3-151026 | Nokia Networks | - |
S3‑151138 | Reply to: LS on TLS and DTLS terminology | NTT-Docomo | - |
S3‑151139 | Input to joint meeting on MCPTT | CESG | - |
S3‑151140 | Questions to SA2 regarding ProSe | Rapporteur | - |
S3‑151141 | Discussion of way forward for SCAS | Nokia Networks | - |
S3‑151142 | pCR on moving existing threats to the Tampering threat category | Telecom Italia S.p.A | - |
S3‑151143 | pCR on moving existing threats to the Denial of Service threat category | Telecom Italia S.p.A | - |
S3‑151144 | pCR on moving existing threats to the Information Disclosure threat category | Telecom Italia S.p.A | - |
S3‑151145 | pCR on moving existing threats to the Elevation of Privilege threat category | Telecom Italia S.p.A | - |
S3‑151146 | pCR to TR 33.806 on requirements for MME Management and Mainteance Interfaces | Huawei, HiSilicon | - |
S3‑151147 | pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Authentication Attributes | Alcatel-Lucent, Nokia Networks | - |
S3‑151148 | pCR to TR 33.806 on merging requirements on password rules | Nokia Networks, Alcatel-Lucent | - |
S3‑151149 | pCR to TR 33.806 on requirement on lock-out policy | Nokia Networks, Alcatel-Lucent | - |
S3‑151150 | pCR to TR 33.806 on merging requirements on authorization and access control | Nokia Networks, Alcatel-Lucent | - |
S3‑151151 | Draft TR 33.916 | Rapporteur | - |
S3‑151152 | Draft TR 33.806 | Rapporteur | - |
S3‑151153 | Correntions on SCG security algorithm negotiation | Huawei, HiSilicon | - |
S3‑151154 | Additions to Annex D related to new test cases | Telecom Italia S.p.A | - |
S3‑151155 | Adding a new Annex (Annex D) to collect all test cases - Updated | Telecom Italia S.p.A | - |
S3‑151156 | pCR to TR 33.806 clause B.3.4.1 | Deutsche Telekom AG | - |
S3‑151157 | pCR to TR 33.806 clause B.3.4.2 | Deutsche Telekom AG | - |
S3‑151158 | pCR SCAS Clarification/Improvements of logging requirements | Ericsson | - |
S3‑151159 | pCR SCAS Clarification/Improvements of traffic separation requirements | Ericsson | - |
S3‑151160 | Study item on Cellular IoT | Vodafone | - |
S3‑151161 | LS_out_SA3 to RAN2_Reply LS on RAN2 agreements for Dual Connectivity | Huawei, HiSilicon | - |
S3‑151162 | LS to SA1 on end-to-end WebRTC security requirements in LI specs | Alcatel-Lucent | - |
S3‑151163 | Solving the first Editor Note in section 6.3.2.2 of TR 33.872 | Alcatel Lucent | - |
S3‑151164 | Solving the third Editor Note in section 6.3.2.2 of TR 33.872 | Alcatel Lucent | - |
S3‑151165 | Removing all the Editor's notes in 6.3.2.2 of TR 33.872 | Alcatel Lucent | - |
S3‑151166 | Discovery Slot Clarification | Huawei, HiSilicon | - |
S3‑151167 | Security information in PDCP Header | Samsung | - |
S3‑151168 | new draft TR 33.872 WebRTC | Rapporteur | - |
S3‑151169 | new draft TR 33.833 ProSe | Rapporteur | - |
S3‑151170 | Authorisation for restricted ProSe direct discovery | Huawei, HiSilicon | - |
S3‑151171 | Adding a solution for restricted direct discovery to TR 33.833 | Qualcomm Incorporated | - |
S3‑151172 | pCR for a security solution for Restricted Direct Discovery using Model | Ericsson | - |
S3‑151173 | Proposal to re-use security solution for ProSe Open Direct Discovery for Restricted Direct Discovery | Ericsson | - |
S3‑151174 | Security Requirements for Out-Of-Coverage Discovery | Samsung | - |
S3‑151175 | Solution for Out-Of-Coverage Discovery | Samsung | - |
S3‑151176 | Solutions analysis of DOS attack in registration procedure | China Mobile | - |
S3‑151177 | Draft TR 33.879 MCPTT | Rapporteur | - |
S3‑151178 | Proposed Scope for MCPTT TR | CESG | - |
S3‑151179 | Identification of MCPTT Assets | CESG | - |
S3‑151180 | General security requirments for MCPTT | Huawei, HiSilicon | - |
S3‑151181 | Reply LS to TCG | Interdigital | - |
S3‑151182 | One-to-one security for ProSe | Ericsson | - |
S3‑151183 | Adding a MIC Check timer to direct discovery procedures | Qualcomm Incorporated | - |
S3‑151184 | ProSe 33 833 Clarification to traditional RN | Nokia Networks | - |
S3‑151185 | security for One-to-one Relays | ZTE Corporation, China Unicom | - |
S3‑151186 | UE-to-network relay security for ProSe | Ericsson | - |
S3‑151187 | Reply to: LS on UE-based procedure with USAT application pairing | Ericsson | - |
S3‑151188 | USAT Pairing update | Gemalto, Oberthur | - |
S3‑151189 | new draft TR 33.889 | Rapporteur | - |
S3‑151190 | AESE: Solution for using OMA-ER-Autho4API for securing SCEF A2 and A3 interfaces | Ericsson | - |
S3‑151191 | Key issue for MONTE on privacy of UE location information | Ericsson | - |
S3‑151192 | pCR to TR 33.806 on requirements for user identities | Huawei, HiSilicon | - |
S3‑151193 | [MTCe] group authentication mechanism | China Mobile | - |
S3‑151194 | Aligning Network based protection for cell broadcast with SA2 TR 23.769 | Samsung | - |
S3‑151195 | Living document on IoT | Nokia Networks | - |
S3‑151196 | Mandatory support of mutual authentication | Huawei, HiSilicon,Vodafone | - |
S3‑151197 | Dicsussion of encryption algorithms for cellular IoT UE | Huawei, HiSilicon, China Unicom | - |
S3‑151198 | LS on cellular IoT | Qualcomm | - |
S3‑151199 | Discussion of integrity protection for cellular IoT UE | Huawei, HiSilicon, China Unicom | - |
S3‑151200 | Update to living document on security enhancements for Cellular Internet of Things | Nokia Networks | - |
S3‑151201 | LS to SA on worksplit for cellular IoT study | NTT-Docomo | - |
S3‑151202 | New Study Item for Security Aspects of Isolated E-UTRAN Operation for Public Safety | General Dynamics UK Ltd. | - |
S3‑151203 | Outline TR for Study on Isolated E-UTRAN Operation for Public Safety: Security aspects | General Dynamics UK Ltd. | - |
S3‑151204 | Clarification of one-to-many requirements | Ericsson | - |
S3‑151205 | Definitions of identity and identifiable | China Unicom, ZTE Corporation | - |
S3‑151206 | Draft TR 33.849 | Rapporteur | - |
S3‑151207 | Key issue- user privacy preference | China Unicom, ZTE Corporation | - |
S3‑151208 | Privacy identification process | China Unicom, ZTE Corporation | - |
S3‑151209 | Privacy guidelines for the third party service providers | China Unicom, ZTE Corporation | - |
S3‑151210 | Work Plan input from the Rapporteurs | ETSI Secretariat | - |
page generated from database: 2024-07-20 12:15:34