3GPP TDocs (written contributions) at meeting
Meeting: S3-71 - 2013-04-08 to 2013-04-12, Valencia
meeting id: S3-71 (click id for more info on this meeting)Click on the Tdoc to open its file.
TDoc | Title | Source | Remarks |
---|---|---|---|
S3‑130300 | Agenda | WG Chairman | imported from 3GU |
S3‑130301 | Report from last SA meeting | WG Chairman | imported from 3GU |
S3‑130302 | Reply LS to Normative work plan (stage 2 and stage 3) for UE Services over Restrictive Access Networks work item | C1-130773 | imported from 3GU |
S3‑130303 | LS on Applying user consent for SON use cases (resubmitted) | S5-130356 | imported from 3GU |
S3‑130304 | LS on Proximity Services and Lawful Interception | SA3LI13_033r1 | imported from 3GU |
S3‑130305 | LS on enhancing IMEI based Lawful Interception in IMS | SA3LI13_034r2 | imported from 3GU |
S3‑130306 | LS on MS response to a request for an unsupported ciphering algorithm | GP-130327 | imported from 3GU |
S3‑130307 | LS on HeNB access control Verification | R3-130419 | imported from 3GU |
S3‑130308 | Response LS on Withdrawal of GEA1 from Mobile Devices | R5-130688 | imported from 3GU |
S3‑130309 | LS Reply on iFIRE and SMURF Architecture and Requirements | S2-130722 | imported from 3GU |
S3‑130310 | LS on confidentiality protection for Associated Delivery Procedures | S4-130280 | imported from 3GU |
S3‑130311 | Clarification re. self-certification | Ericsson, Deutsche Telekom | imported from 3GU |
S3‑130312 | Report from last SA3 meeting | ETSI Secretariat | imported from 3GU |
S3‑130313 | 3GPP Network Products Security Assurance Specifications | China Unicom | imported from 3GU |
S3‑130314 | Processes and Documentation for Methodologies | China Unicom | imported from 3GU |
S3‑130315 | Security assurance process | China Unicom | imported from 3GU |
S3‑130316 | Threat and attacker model | China Unicom, China Mobile | imported from 3GU |
S3‑130317 | Clarification to chapter 7.3 of TR 33.869 | ZTE Corporation | imported from 3GU |
S3‑130318 | SA3 Meeting Calendar | ETSI Secretariat | imported from 3GU |
S3‑130319 | Ua security protocol identifier | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130320 | Removal of editor's note Release 12 - 33.220 | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130321 | Removal of editor's note Release 11 - 33.220 | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130322 | Removal of editor's note Release 11 - 33.804 | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130323 | Correction of Ua security protocol identifier text | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130324 | Missing reference added | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130325 | Clarification on usage of confidentiality and integrity for TLS tunnel | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130326 | Removal of editor's note - 33.222 | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130327 | Combination of Channel Binding Methods | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130328 | Addition of details on API | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130329 | Clarification on usage of confidentiality and integrity for TLS tunnel | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130330 | Combination of Channel Binding Methods | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130331 | Removal of editor's note - 33.823 | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130332 | draft LS on Applying user consent for SON use cases | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130333 | SECAM - Clarification on Assurance and Security levels in section 4.5 | Orange, Juniper Networks, Deutsche Telekom, BT Group, Telecom Italia, InterDigital | imported from 3GU |
S3‑130334 | SECAM - Methodology 2 - Scheme building and expected SECAM deliverables | Orange, Telecom Italia | imported from 3GU |
S3‑130335 | SECAM - Methodology 2 - Clarification on Target of Evaluation | Orange | imported from 3GU |
S3‑130336 | SECAM - Discussion on SECAM conclusions and next steps | Orange | imported from 3GU |
S3‑130337 | SECAM - Methodology 2 - Discussion and example of application to eNB and MME | Orange | imported from 3GU |
S3‑130338 | Discussion Paper: Two factor authentication call flow | Interdigital | imported from 3GU |
S3‑130339 | PCR to 33.SSO: Call flow for Section 8.3.2 | Interdigital | imported from 3GU |
S3‑130340 | CR-Clarification for handover from UTRAN to E-UTRAN-R12 | Huawei, HiSilicon | imported from 3GU |
S3‑130341 | CR-Clarification for handover from UTRAN to E-UTRAN-R11 | Huawei, HiSilicon | imported from 3GU |
S3‑130342 | CR-Clarification for handover from UTRAN to E-UTRAN-R10 | Huawei, HiSilicon | imported from 3GU |
S3‑130343 | Analysis of cryptographic algorithms in PWS | Huawei, Hisilicon, ZTE | imported from 3GU |
S3‑130344 | Restructure NAS based Solution | Huawei, HiSilicon | imported from 3GU |
S3‑130345 | Analysis of MDT anonymization | Huawei, HiSilicon | imported from 3GU |
S3‑130346 | Solution of supporting security parameters of selection policies | Huawei, HiSilicon | imported from 3GU |
S3‑130347 | Security analysis of UE Power Consumption Optimizations solutions | Huawei, HiSilicon | imported from 3GU |
S3‑130348 | Title correction and editor's notes deletion in small data transmission | Huawei, HiSilicon | imported from 3GU |
S3‑130349 | Security Requirements of Security Study on Spoofed Call Detection and Prevention | China Mobile | imported from 3GU |
S3‑130350 | Confidentiality Protection of Associated Delivery Procedure Messages | Qualcomm Incorporated, Telefon AB LM Ericsson, ST-Ericsson SA, Huawei Technologies | imported from 3GU |
S3‑130351 | SECAM add DRA in SAS scope | China Unicom | imported from 3GU |
S3‑130352 | SECAM interworking through DRA | China Unicom | imported from 3GU |
S3‑130353 | Privacy Study discussion | Huawei, HiSilicon, CATR, TeliaSonera, InterDigital, Intel, AT&T | imported from 3GU |
S3‑130354 | Privacy Study SID | Huawei, HiSilicon, CATR, TeliaSonera, InterDigital, Intel, AT&T | imported from 3GU |
S3‑130355 | D2D Security Requirement | Huawei, HiSilicon | imported from 3GU |
S3‑130356 | D2D Keys | Huawei, HiSilicon | imported from 3GU |
S3‑130357 | pCR IMSI-IMEI Binding Editorials | Alcatel-Lucent | imported from 3GU |
S3‑130358 | MTCE Connectionless Security Aspects | Alcatel-Lucent | imported from 3GU |
S3‑130359 | pCR MTCE Connectionless Security Solution | Alcatel-Lucent | imported from 3GU |
S3‑130360 | pCR MTCE Connectionless Threats | Alcatel-Lucent | imported from 3GU |
S3‑130361 | pCR MTCE Connectionless Evaluation | Alcatel-Lucent | imported from 3GU |
S3‑130362 | Architecture and Procedure Discussion on iFire/SMURFs | Radisys | imported from 3GU |
S3‑130363 | Discussion on LS in SA3-130309/SA2-130722 | Radisys | imported from 3GU |
S3‑130364 | Questions and Notifications on Firewall Traversal from LS Reply SA2-130309 | Radisys | imported from 3GU |
S3‑130365 | Device triggering indication in SM | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130366 | pCR to TR 33.868: Device trigger indication in SMS | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130367 | Discussion of channel binding for GBA_Digest and GBA_Web | Nokia Corporation, Nokia Siemens Networks, Ericsson, ST-Ericsson | imported from 3GU |
S3‑130368 | Considerations on channel binding and GBA_Digest | Nokia Corporation, Nokia Siemens Networks, Ericsson, ST-Ericsson | imported from 3GU |
S3‑130369 | Discussion of the security of 2G GBA | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130370 | Correction of 2G GBA | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130371 | IMS end-to-access-edge security for MSRP media and compatibility with RCS | Nokia Corporation, Nokia Siemens Networks, Orange | imported from 3GU |
S3‑130372 | Editorial modification to security for conferencing based on SIP signalling security | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130373 | Access mode verification for H(e)NBs | Nokia Corporation, Nokia Siemens Networks, Alcatel-Lucent, Ericsson, ST-Ericsson | imported from 3GU |
S3‑130374 | iFire:Discussion on Access Types | Acme Packet, Vodafone | imported from 3GU |
S3‑130375 | iFire: TSCF and IMS-AGW | Acme Packet, Vodafone | imported from 3GU |
S3‑130376 | iFire: TSCF Editor's notes removal | Acme Packet, Vodafone | imported from 3GU |
S3‑130377 | iFire: Clarification on Fixed and Mobile Terminal | Acme Packet, Vodafone | imported from 3GU |
S3‑130378 | iFire: WID modification | Acme Packet, Vodafone | imported from 3GU |
S3‑130379 | iFire: TS requirement | Acme Packet, Vodafone | imported from 3GU |
S3‑130380 | iFire: TS Architecture | Acme Packet, Vodafone | imported from 3GU |
S3‑130381 | iFire: TS Procedure | Acme Packet, Vodafone | imported from 3GU |
S3‑130382 | Security analysis of small data transmission solutions | China Mobile | imported from 3GU |
S3‑130383 | Discussion of ProSe security consideration | China Mobile | imported from 3GU |
S3‑130384 | Clarification to chapter 7.3 of TR 33.869 | ZTE Corporation, China Unicom, HUAWEI | imported from 3GU |
S3‑130385 | ProSe identity privacy | China Mobile | imported from 3GU |
S3‑130386 | Security Requirement for WLAN selection | China Mobile | imported from 3GU |
S3‑130387 | Clarification to Chapter 7.5 of TR 33.869 for Further Study | ZTE Corporation, China Unicom | imported from 3GU |
S3‑130388 | WLAN interworking solution to the key issues | China Mobile | imported from 3GU |
S3‑130389 | Comparison Between the Two Kinds of Certificate Based Solutions | ZTE Corporation, China Unicom | imported from 3GU |
S3‑130390 | Considerations on threat analysis frameworks | China Mobile, Orange, China Unicom | imported from 3GU |
S3‑130391 | SAS division | China Mobile, China Unicom | imported from 3GU |
S3‑130392 | Definition of Network Product | China Mobile, China Unicom | imported from 3GU |
S3‑130393 | clarification for the SECAM | China Mobile | imported from 3GU |
S3‑130394 | Evaluation | China Mobile | imported from 3GU |
S3‑130395 | Notifications on Firewall Traversal from LS Reply SA2-130722 and CT1 C1-130773 | Radisys | imported from 3GU |
S3‑130396 | Notifications on Firewall Traversal from LS Reply SA2-130722 and CT1 C1-130773 | Radisys | imported from 3GU |
S3‑130397 | Removal of editor notes in TR 33.830 | Huawei, HiSilicon | imported from 3GU |
S3‑130398 | P-CR Clarification of Functional Requirements for TR 33.830 | Huawei, HiSilicon | imported from 3GU |
S3‑130399 | Update on the 'Media Tunneling' Solution in TR33.830 | Huawei, HiSilicon | imported from 3GU |
S3‑130400 | Small data fast path security threats | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130401 | MTC small data fast path security solution | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130402 | PWS Limiting the impact of a CA or CBE compromise | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130403 | pCR on PWS Limiting impact of a CA or CBE compromise | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130404 | Reliable PWS status information of a network | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130405 | pCR on Reliable PWS status information of a network | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130406 | pCR PWS threats and analysis | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130407 | Discussion on Sensitive Data Management in Methodology 2 | China Mobile | imported from 3GU |
S3‑130408 | PWS security: Limited service state and lack of integrity protection | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130409 | Network based method for privacy concern | China Unicom | imported from 3GU |
S3‑130410 | PWS security: pCR on Limited service state and lack of integrity protection | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130411 | PWS security: pCR on Considerations on networks in disaster areas | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130412 | CR 33.220: Mandating encryption in the TLS profile for 2G GBA | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130413 | CR 33.220: Removal of realm check in 2G GBA | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130414 | pCR TR 33.869: Limited solution for PWS security based on SIM OTA | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130415 | CR 33.402: Specification of Tunnelling of UE Services over Restrictive Access Networks | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130416 | Discussion on LS in SA3-130309/SA2-130722 | Radisys | imported from 3GU |
S3‑130417 | Notifications on Firewall Traversal from LS Reply SA2-130722 and CT1 C1-130773 | Radisys | imported from 3GU |
S3‑130418 | Disc. paper: Specification of Tunnelling of UE Services over Restrictive Access Networks | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130419 | Disc. paper: Limited solution for PWS security based on SIM OTA | Ericsson, ST-Ericsson | imported from 3GU |
S3‑130420 | Clarification on Description of Key Issues | China Unicom | imported from 3GU |
S3‑130421 | Clarifications on Implicit Certificate approach | Research In Motion UK Ltd. | imported from 3GU |
S3‑130422 | pCR: Clarifications of Implicit Certificate approach | Research In Motion UK Ltd. | imported from 3GU |
S3‑130423 | Key issue- Interaction between WLAN network selection and network-provided policies for WLAN selection | China Unicom | imported from 3GU |
S3‑130424 | Key issue- Use WLAN load Information for network selection | China Unicom | imported from 3GU |
S3‑130425 | Security requirements for Support WLAN access through roaming agreements | China Unicom | imported from 3GU |
S3‑130426 | Security requirements for Use Type and Venue Information for network selection | China Unicom | imported from 3GU |
S3‑130427 | MTC Small Data Transmission Overall Evaluation | Intel | imported from 3GU |
S3‑130428 | Study on privacy assurance methodology for 3GPP networks | China Unicom, ZTE Corporation, CATT | imported from 3GU |
S3‑130429 | Study on privacy assurance methodology for 3GPP networks | China Unicom, ZTE Corporation, CATT, China Telecom, Samsung | imported from 3GU |
S3‑130430 | Clarification of self-declaration | Ericsson | imported from 3GU |
S3‑130431 | SECAM hardening | Ericsson | imported from 3GU |
S3‑130432 | Reuse of existing methodology components | Ericsson | imported from 3GU |
S3‑130433 | Methodology 1, introduction | Ericsson | imported from 3GU |
S3‑130434 | Methodology 1, SAS structure | Ericsson | imported from 3GU |
S3‑130435 | Considerations on threat analysis frameworks | China Mobile, Orange, China Unicom, Telecom Italia | imported from 3GU |
S3‑130436 | Pseudo-CR: Present only trusted Calling Line Identifiers | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130437 | Methodology 1, Requirements identification | Ericsson | imported from 3GU |
S3‑130438 | Response LS to RAN3 on H(e)NB Access Control Verification | Alcatel-Lucent | imported from 3GU |
S3‑130439 | Security analysis of Small Data Transmission solutions | Nokia Corporation, Nokia Siemens Networks^^ | imported from 3GU |
S3‑130440 | Unclear issues of PWS and PWS security | Nokia Corporation, Nokia Siemens Networks^^ | imported from 3GU |
S3‑130441 | UE-based solution to enhance IMEI based LI for IMS | Gemalto, Morpho Cards | imported from 3GU |
S3‑130442 | Security analysis of Small Data Fast Path Solution | Nokia Corporation, Nokia Siemens Networks | imported from 3GU |
S3‑130443 | Tunnel termination point for iFIRE / SMURF | Qualcomm Incorporated | imported from 3GU |
S3‑130444 | Selective tunnelling of IP traffic | Qualcomm Incorporated | imported from 3GU |
S3‑130445 | Proposed TR skeleton for Proximity Service Security | Qualcomm Incorporated | imported from 3GU |
S3‑130446 | Proposed scope for Proximity Service Security TR | Qualcomm Incorporated | imported from 3GU |
S3‑130447 | Proposed definitions for Proximity Service Security TR | Qualcomm Incorporated | imported from 3GU |
S3‑130448 | Key issues: Use WLAN RSN element information or Network authentication type information for network selection | Samsung | imported from 3GU |
S3‑130449 | Key issues: Use WLAN RSN element information or Network authentication type information for network selection | Samsung | imported from 3GU |
S3‑130450 | Key issues: Use WLAN NAI realm list or Roaming Consortium element for network selection | Samsung | imported from 3GU |
S3‑130451 | MTCe TS Skeleton | Rapporteur | imported from 3GU |
S3‑130452 | MTCe TS 33.abc Scope | Samsung | imported from 3GU |
S3‑130453 | [pCR TS 33.abc] Security Requirements on MTCe | Samsung | imported from 3GU |
S3‑130454 | [pCR TS 33.abc] MTCe Security Procedures | Samsung | imported from 3GU |
S3‑130455 | MTCe way forward for Rel-12 | Samsung | imported from 3GU |
S3‑130456 | Discussion Paper: Two factor authentication call flow | Interdigital, AT&T | imported from 3GU |
S3‑130457 | PCR to 33.SSO: Call flow for Section 8.3.2 | Interdigital, AT&T | imported from 3GU |
S3‑130458 | Overview: MTC-IWF based security solution for small data transmission | NEC Corporation | imported from 3GU |
S3‑130459 | Detail: MTC-IWF security solution for small data transmission | NEC Corporation | imported from 3GU |
S3‑130460 | pCR: MTC-IWF based security solution for small data transmission | NEC Corporation | imported from 3GU |
S3‑130461 | Comments on S3-130430: Clarification of self-declaration | Orange, Telecom Italia | imported from 3GU |
S3‑130462 | Comments on S3-130313: GPP Network Products Security Assurance Specifications | Orange, Telecom Italia | imported from 3GU |
S3‑130463 | Comments on S3-130314: Processes and Documentation for Methodologies | Orange | imported from 3GU |
S3‑130464 | Comments on S3-130315: Security assurance process | Orange, Telecom Italia | imported from 3GU |
S3‑130465 | Comments on S3-130316: Threat and attacker model | Orange, Telecom Italia | imported from 3GU |
S3‑130466 | SECAM - Methodology 2 - Scheme building and expected SECAM deliverables (update with editorial and cosigner list - same as S3-130334) | Orange, Telecom Italia, BT Group, Alcatel-Lucent, Juniper Networks | imported from 3GU |
S3‑130467 | Comments on S3-130352: Interworking through DRA | Orange, Telecom Italia | imported from 3GU |
S3‑130468 | Comments on S3-130391: SAS division | Orange | imported from 3GU |
S3‑130469 | Comments on S3-130392: Definition of Network Product | Orange | imported from 3GU |
S3‑130470 | Comments on S3-130393: clarification for the SECAM | Orange | imported from 3GU |
S3‑130471 | Comments on S3-130394: Evaluation | Orange | imported from 3GU |
S3‑130472 | Comments on S3-130432: Reuse of existing methodology components | Orange | imported from 3GU |
S3‑130473 | Comments on S3-130434: Methodology 1, SAS structure | Orange | imported from 3GU |
S3‑130474 | Comments on S3-130437: Methodology 1, Requirements identification | Orange | imported from 3GU |
S3‑130475 | Comments on S3-130343: Analysis of cryptographic algorithms in PWS | Research In Motion UK Ltd. | imported from 3GU |
S3‑130476 | Comments on S3-130431: SECAM hardening | TeliaSonera, Telecom Italia | imported from 3GU |
S3‑130477 | Comments on methodology building for methodology 2 ÔÇô S3-130334 | Alcatel-Lucent | imported from 3GU |
S3‑130478 | Comments on S3-130472 (SECAM Clarification of input on methodology 1) | Ericsson | imported from 3GU |
S3‑130479 | Commenting Contribution for 130415 | Acme Packet | imported from 3GU |
S3‑130480 | Commenting contribution for 130418 | Acme Packet | imported from 3GU |
S3‑130481 | Commenting contribution on 130416 | Acme Packet | imported from 3GU |
S3‑130482 | Commenting contribution for 130443 | Acme Packet | imported from 3GU |
S3‑130483 | Commenting contribution for 130399 | Acme Packet | imported from 3GU |
S3‑130484 | TI comments to S3-130432 | Telecom Italia | imported from 3GU |
S3‑130485 | ALU comments to Security analysis of Small Data Transmission solutions S3-130439 | Alcatel-Lucent | imported from 3GU |
S3‑130486 | Telecom Italia comments to S3-130433 | Telecom Italia | imported from 3GU |
S3‑130487 | Telecom Italia comments to S3-130434 | Telecom Italia | imported from 3GU |
S3‑130488 | Telecom Italia Comments to S3-130437 | Telecom Italia | imported from 3GU |
S3‑130489 | MTC Small Data Transmission Evaluation | Intel | imported from 3GU |
S3‑130490 | TCG progress report in the areas of TNC and MPWG | Interdigital | imported from 3GU |
S3‑130491 | TCG progress report in the areas of TNC and MPWG | Interdigital | imported from 3GU |
S3‑130492 | IMS end-to-access-edge security for MSRP media and compatibility with RCS | Nokia Corporation, Nokia Siemens Networks, Orange | revised |
S3‑130493 | Editorial modification to security for conferencing based on SIP signalling security | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130494 | Considerations on channel binding and GBA_Digest | Nokia Corporation, Nokia Siemens Networks, Ericsson, ST-Ericsson | revised |
S3‑130495 | Correction of 2G GBA | Nokia Corporation, Nokia Siemens Networks | revised |
S3‑130496 | CR 33.220: Mandating encryption in the TLS profile for 2G GBA | Ericsson, ST-Ericsson | agreed |
S3‑130497 | CR 33.220: Removal of realm check in 2G GBA | Ericsson, ST-Ericsson | agreed |
S3‑130498 | Confidentiality Protection of Associated Delivery Procedure Messages | Qualcomm Incorporated, Telefon AB LM Ericsson, ST-Ericsson SA, Huawei Technologies | revised |
S3‑130499 | Access mode verification for H(e)NBs | Nokia Corporation, Nokia Siemens Networks, Alcatel-Lucent, Ericsson, ST-Ericsson | postponed |
S3‑130500 | CR 33.402: Specification of Tunnelling of UE Services over Restrictive Access Networks | Ericsson, ST-Ericsson | noted |
S3‑130501 | Device triggering indication in SM | Ericsson, ST-Ericsson | revised |
S3‑130502 | SA3 Meeting Calendar | ETSI Secretariat | noted |
S3‑130503 | LS Reply to ITU-T | BT | approved |
S3‑130504 | LS on enhancing IMEI based Lawful Interception in IMS | SA3LI13_034r2 | replied to |
S3‑130505 | Reply to: LS on enhancing IMEI based Lawful Interception in IMS | Sprint | approved |
S3‑130506 | Ua security protocol identifier | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130507 | Missing reference added | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130508 | Correction of Ua security protocol identifier text | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130509 | Combination of Channel Binding Methods | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130510 | Combination of Channel Binding Methods | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130511 | Addition of details on API | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130512 | Correction of 2G GBA | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130513 | Confidentiality Protection of Associated Delivery Procedure Messages | Qualcomm Incorporated, Telefon AB LM Ericsson, ST-Ericsson SA, Huawei Technologies | agreed |
S3‑130514 | CR-Clarification for handover from UTRAN to E-UTRAN-R10 | Huawei, HiSilicon | agreed |
S3‑130515 | CR-Clarification for handover from UTRAN to E-UTRAN-R11 | Huawei, HiSilicon | agreed |
S3‑130516 | CR-Clarification for handover from UTRAN to E-UTRAN-R12 | Huawei, HiSilicon | agreed |
S3‑130517 | Removal of editor's note Release 11 - 33.804 | Nokia Corporation, Nokia Siemens Networks | agreed |
S3‑130518 | Access mode verification for H(e)NBs | Nokia Corporation, Nokia Siemens Networks, Alcatel-Lucent, Ericsson, ST-Ericsson | withdrawn |
S3‑130519 | LS to SA2 on Device triggering indication in SM | Ericsson | approved |
S3‑130520 | Device triggering indication in SM | Ericsson, ST-Ericsson | agreed |
S3‑130521 | Draft TR 33.868 (MTC) | Rapporteur | approved |
S3‑130522 | correction and editor's notes deletion in small data transmission | Huawei, HiSilicon | approved |
S3‑130523 | Privacy Study SID | Huawei, HiSilicon, CATR, TeliaSonera, InterDigital, Intel, AT&T | noted |
S3‑130524 | pCR MTCE Connectionless Threats | Alcatel-Lucent | approved |
S3‑130525 | pCR: MTC-IWF based security solution for small data transmission | NEC Corporation | approved |
S3‑130526 | pCR: Clarifications of Implicit Certificate approach | Research In Motion UK Ltd. | noted |
S3‑130527 | Clarifications on roaming for implicit certificate approach | Research In Motion UK Ltd. | noted |
S3‑130528 | Clarifications on timestamps and CA identifier of implicit certificate approach | Research In Motion UK Ltd. | noted |
S3‑130529 | Assurance level and security baseline // merge of S3-130333, S3-130393 and S3-130470 | Orange, Juniper Networks, Deutsche Telekom, BT Group, Telecom Italia, InterDigital, China Mobile | approved |
S3‑130530 | SAS division // Merge of S3-130391 and S3-130468 | China Mobile, China Unicom, Orange | approved |
S3‑130531 | Definition of Network Product // merge of S3-130392 and S3-130469 | China Mobile, China Unicom, Orange | approved |
S3‑130532 | Clarification of self-declaration // merge of S3-130430 and S3-130461 | Ericsson, Orange | approved |
S3‑130533 | Security analysis of small data transmission solutions | China Mobile | approved |
S3‑130534 | MTC Small Data Transmission Evaluation | Intel | approved |
S3‑130535 | Draft TS MTCe | Rapporteur | approved |
S3‑130536 | Update of the WID MTCe | Samsung | approved |
S3‑130537 | Draf TR PWS | Rapporteur | Left for email approval |
S3‑130538 | Considerations on threat analysis frameworks // merge of S3-130316 and_S3-130465_in_S3-130435 | China Mobile, Orange, China Unicom, Telecom Italia | approved |
S3‑130539 | PWS security: pCR on Limited service state and lack of integrity protection | Nokia Corporation, Nokia Siemens Networks | approved |
S3‑130540 | 3GPP Network Products Security Assurance Specifications | China Unicom,Orange, Telecom Italia | approved |
S3‑130541 | Processes and Documentation for Methodologies | China Unicom,Orange | approved |
S3‑130542 | Security assurance process | China Unicom,Orange, Telecom Italia | approved |
S3‑130543 | pCR TR 33.869: Limited solution for PWS security based on SIM OTA | Ericsson, ST-Ericsson | approved |
S3‑130544 | Ericsson's comments to Telecom Italia comments to Methodology 1, introduction | Ericsson | approved |
S3‑130545 | Clarification to Chapter 7.5 of TR 33.869 for Further Study | ZTE Corporation, China Unicom | approved |
S3‑130546 | pCR: Clarifications of Implicit Certificate approach | Research In Motion UK Ltd. | approved |
S3‑130547 | pCR on PWS Limiting impact of a CA or CBE compromise | Nokia Corporation, Nokia Siemens Networks | approved |
S3‑130548 | Comparison Between the Two Kinds of Certificate Based Solutions | ZTE Corporation, China Unicom | approved |
S3‑130549 | Analysis of cryptographic algorithms in PWS | Huawei, Hisilicon, ZTE,Research In Motion UK Ltd. | approved |
S3‑130550 | Considerations on channel binding and GBA_Digest | Nokia Corporation, Nokia Siemens Networks, Ericsson, ST-Ericsson | agreed |
S3‑130551 | Draft TR on WLAN NS | Rapporteur | approved |
S3‑130552 | Solution of supporting security parameters of selection policies | Huawei, HiSilicon | approved |
S3‑130553 | Draft TR Proximity Services | Rapporteur | approved |
S3‑130554 | D2D Security Requirement | Huawei, HiSilicon | approved |
S3‑130555 | Specification of Tunnelling of UE Services over Restrictive Access Networks | Ericsson,ST-Ericsson | agreed |
S3‑130556 | Specification of Tunnelling of UE Services over Restrictive Access Networks - IMS | Ericsson,ST-Ericsson | agreed |
S3‑130557 | Update to WID on Tunnelling of UE Services over Restrictive Access Networks | Acme Packet, Vodafone | approved |
S3‑130558 | LS on Notifications on Firewall Traversal from LS Reply SA2-130722 and CT1 C1-130773 | Ericsson | approved |
S3‑130559 | LS on Applying user consent for SON use cases | Nokia Corporation, Nokia Siemens Networks | approved |
S3‑130560 | New draft TR for iFire and SMURF | Rapporteur | approved |
S3‑130561 | iFire: Clarification on Fixed and Mobile Terminal | Acme Packet, Vodafone | approved |
S3‑130562 | Comments on S3-130434: Methodology 1, SAS structure | Orange | approved |
S3‑130563 | Comments on S3-130437: Methodology 1, Requirements identification | Orange | approved |
S3‑130564 | Evening session notes on SECAM | Rapporteur | withdrawn |
S3‑130565 | Draft TR on SECAM | Rapporteur | Left for email approval |
S3‑130566 | IMS end-to-access-edge security for MSRP media and compatibility with RCS | Nokia Corporation, Nokia Siemens Networks, Orange | agreed |
S3‑130567 | SECAM - Methodology 2 - Clarification on Target of Evaluation | Orange | approved |
S3‑130568 | SECAM - Methodology 2 - Scheme building and expected SECAM deliverables (update with editorial and cosigner list - same as S3-130334) | Orange, Telecom Italia, BT Group, Alcatel-Lucent, Juniper Networks | approved |
S3‑130569 | Evaluation | China Mobile,Orange | withdrawn |
S3‑130570 | Draft TR on SSO | Rapporteur | Left for email approval |
S3‑130571 | Draft TR on Spoofed Call Detection and Prevention | Rapporteur | Left for email approval |
S3‑130572 | - | - | - |
page generated from database: 2024-07-20 12:15:34