A Global
Partnership

The Mobile
Broadband
Standard

3GPP TDocs (written contributions) at meeting

Meeting: S3-78 - 2015-01-26 to 2015-01-30, Sorrento

meeting id: S3-78 (click id for more info on this meeting)

Click on the Tdoc to open its file.

TDoc Title Source Remarks
S3‑151000 Agenda WG Chairman -
S3‑151001 Report from last SA meeting WG Chairman -
S3‑151002 SA3 meeting calendar ETSI Secretariat -
S3‑151003 Report from last SA3 meeting ETSI Secretariat -
S3‑151004 SA3 WorkPlan ETSI Secretariat -
S3‑151005 Reply LS on UICC Access Optimization C6-140686 -
S3‑151006 LS on UE-based procedure with USAT application pairing C6-140730 -
S3‑151007 LS on Security Framework for Cellular IoT GP-140717 -
S3‑151008 Reply LS on new work item on simple encryption procedure for IoT device security GP-140967 -
S3‑151009 Potential collaboration on Mobile-Edge Computing ETSI ISG MEC -
S3‑151010 LS on TLS and DTLS terminology ITU-T Q3/16 -
S3‑151011 LS to SA3 on RAN2 agreements for Dual Connectivity R2-145367 -
S3‑151012 Reply LS on Transferring Security Information in the PDCP Header R2-145415 -
S3‑151013 LS on Network Access Algorithm Support for the Embedded UICC GSMA SIM Group and Security Group -
S3‑151014 Candidate Release Available OneM2M -
S3‑151015 LS on Establishment of new working group TSG SA WG6 SP-140884 -
S3‑151016 Liaison on Complete Platform Integrity for 3GPP Infrastructure TCG Trusted Mobility Solutions WG -
S3‑151017 Draft Reply LS to TCG Interdigital, Freescale Semiconductor -
S3‑151018 pCR SCAS Clarification/Improvements of logging requirements Ericsson -
S3‑151019 pCR SCAS Clarification/Improvements of traffic separation requirements Ericsson -
S3‑151020 Proposed TR skeleton for MCPTT Security Study CESG -
S3‑151021 pCR to TR 33.806 clause B.3.4.1 Deutsche Telekom AG -
S3‑151022 pCR to TR 33.806 clause B.3.4.2 Deutsche Telekom AG -
S3‑151023 pCR to TR 33.806 clause B.4.3 Deutsche Telekom AG -
S3‑151024 pCR to TR 33.806 clause B.4.2 Deutsche Telekom AG -
S3‑151025 Proposing a template to be used for test cases Telecom Italia S.p.A -
S3‑151026 Adding a new Annex (Annex D) to collect all test cases Telecom Italia S.p.A -
S3‑151027 Additions to Annex D related to new test cases Telecom Italia S.p.A -
S3‑151028 pCR on moving existing threats to the Tampering threat category Telecom Italia S.p.A -
S3‑151029 pCR on moving existing threats to the Denial of Service threat category Telecom Italia S.p.A -
S3‑151030 pCR on moving existing threats to the Elevation of Privilege threat category Telecom Italia S.p.A -
S3‑151031 pCR on moving existing threats to the Information Disclosure threat category Telecom Italia S.p.A -
S3‑151032 Proposed handling of requirements on authentication and authorization in Annex B.3.3.4 of TR 33.806 Alcatel-Lucent, Nokia Networks -
S3‑151033 pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Authentication policy Alcatel-Lucent, Nokia Networks -
S3‑151034 pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Authentication Attributes Alcatel-Lucent, Nokia Networks -
S3‑151035 pCR to TR 33.806 on merging requirements on password rules Nokia Networks, Alcatel-Lucent -
S3‑151036 pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Specific Authentication use cases Alcatel-Lucent, Nokia Networks -
S3‑151037 pCR to TR 33.806 on requirement on lock-out policy Nokia Networks, Alcatel-Lucent -
S3‑151038 pCR to TR 33.806 on merging requirements on authorization and access control Nokia Networks, Alcatel-Lucent -
S3‑151039 Discussion of requirements 3.01-15 and 3.01-19 in Annex C of TR 33.806 Nokia Networks, Alcatel-Lucent -
S3‑151040 pCR to TR 33.806 on modification of EditorĆs note Nokia Networks, Alcatel-Lucent -
S3‑151041 USAT Pairing update Gemalto, Morpho,Oberthur -
S3‑151042 Work Plan input from the Rapporteurs ETSI Secretariat -
S3‑151043 3GU overview ETSI Secretariat -
S3‑151044 Proposed Scope for MCPTT TR CESG -
S3‑151045 Security_requirements for MCPTT Airbus, CESG, French MoI, Harris, Motorola Solutions, Selex, Sepura, Telefonica UK, Thales -
S3‑151046 Security threats for MCPTT Airbus, Motorola Solutions, Sepura PLC, UK Home Office, CESG -
S3‑151047 Discussion on RAN2 LS S3-151011 Alcatel-Lucent -
S3‑151048 draft_ CR to 33.401 corresponding to RAN2 LS S3-151011 Alcatel-Lucent -
S3‑151049 Updated WebRTC WID:eWebRTCi Huawei -
S3‑151050 pCR to TR 33.872 Assessment of TURN authentication candidate solutions Huawei -
S3‑151051 Secure protection for unicast delivery of group message Huawei, HiSilicon -
S3‑151052 Security for T4 message delivery to a group of devices Huawei, HiSilicon -
S3‑151053 Authorisation for restricted ProSe direct discovery Huawei, HiSilicon -
S3‑151054 ProSe Counter Huawei, HiSilicon -
S3‑151055 Discovery Slot Clarification Huawei, HiSilicon -
S3‑151056 Discussion of integrity protection for cellular IoT UE Huawei, HiSilicon, China Unicom -
S3‑151057 Dicsussion of encryption algorithms for cellular IoT UE Huawei, HiSilicon, China Unicom -
S3‑151058 Discussion on SA5 related management security of virtualized networks China Mobile -
S3‑151059 Mandatory support of mutual authentication Huawei, HiSilicon,Vodafone -
S3‑151060 pCR to TR 33.806 on requirements for MME Management and Mainteance Interfaces Huawei, HiSilicon -
S3‑151061 Definitions of identity and identifiable China Unicom, ZTE Corporation -
S3‑151062 Condense existing threats to the Privacy guidelines for writing 3GPP TRs and TSs (in the new Annex F) China Unicom, ZTE Corporation -
S3‑151063 pCR to TR 33.806 on requirements for Log Protection and Management Huawei, HiSilicon -
S3‑151064 pCR to TR 33.806 on requirements for user identities Huawei, HiSilicon -
S3‑151065 pCR to TR 33.806 on requirements for MME user account and password management Huawei, HiSilicon -
S3‑151066 Privacy identification process China Unicom, ZTE Corporation -
S3‑151067 LS to SA5 on considerations for management security of virtualized networks China Mobile -
S3‑151068 Privacy guidelines for the third party service providers China Unicom, ZTE Corporation -
S3‑151069 Key issue- user privacy preference China Unicom, ZTE Corporation -
S3‑151070 Correntions on SCG security algorithm negotiation Huawei, HiSilicon -
S3‑151071 Solutions analysis of DOS attack in registration procedure China Mobile -
S3‑151072 LS_out_SA3 to RAN2_Reply LS on RAN2 agreements for Dual Connectivity Huawei, HiSilicon -
S3‑151073 Solutions accessment of DOS attack in registration procedure China Mobile -
S3‑151074 General security requirments for MCPTT Huawei, HiSilicon -
S3‑151075 [MTCe] Discussion about group authentication mechanism China Mobile -
S3‑151076 [MTCe] group authentication mechanism China Mobile -
S3‑151077 key issue on Authentication in ProSe Restricted Discovery ZTE Corporation, China Unicom -
S3‑151078 En on prevention against replay attacks in ProSe Restricted Discovery ZTE Corporation, China Unicom -
S3‑151079 key issue on Restricted ProSe Direct Discovery (Model B) ZTE Corporation, China Unicom -
S3‑151080 security for One-to-one Relays ZTE Corporation, China Unicom -
S3‑151081 MONTE-Requirement on Location Management ZTE Corporation -
S3‑151082 Summary of the IETF STIR group active drafts on spoofed call detection Alcatel Lucent -
S3‑151083 Clarifying PTK Identity description in TS 33.303 Ericsson -
S3‑151084 ProSe 33.833 Correction to Key Issue 7.1.2 ProSe UE-Network Relays Connection Nokia Networks -
S3‑151085 Solving the first Editor Note in section 6.3.2.2 of TR 33.872 Alcatel Lucent -
S3‑151086 ProSe 33 833 Clarification to traditional RN Nokia Networks -
S3‑151087 Solving the second Editor Note in section 6.3.2.2 of TR 33.872 Alcatel Lucent -
S3‑151088 SPI 33.849 Ed Note - Annex F Nokia Networks -
S3‑151089 Clarification of one-to-many requirements Ericsson -
S3‑151090 Discussion on some Cellular Internet of Things security requirements and solutions Ericsson -
S3‑151091 SPI 33.849 Mitigation techniques - Annex F Nokia Networks -
S3‑151092 Solving the third Editor Note in section 6.3.2.2 of TR 33.872 Alcatel Lucent -
S3‑151093 SPI 33.849 Threats - Annex F Nokia Networks -
S3‑151094 Update of SCEF security architecture figure in AESE, and addition of an editorĆs note on authorization in interface A1 Ericsson -
S3‑151095 SPI 33.849 Communication Model - Annex F Nokia Networks -
S3‑151096 Discussion on SA5 related management security of virtualized networks China Mobile -
S3‑151097 Removing all the Editor's notes in 6.3.2.2 of TR 33.872 Alcatel Lucent -
S3‑151098 LS to SA5 on considerations for management security of virtualized networks China Mobile -
S3‑151099 AESE: Solution for using OMA-ER-Autho4API for securing SCEF A2 and A3 interfaces Ericsson -
S3‑151100 Identity-based authentication and key agreement for IOPS System-in-a-Box Intel -
S3‑151101 UE-to-network relay security for ProSe Ericsson -
S3‑151102 One-to-one security for ProSe Ericsson -
S3‑151103 Key issue for MONTE on privacy of UE location information Ericsson -
S3‑151104 Study of the efficiency of AKA/SA procedures applied to C-IoT Vodafone -
S3‑151105 Key issues and security requirements proposals for C-IoT Vodafone -
S3‑151106 Aligning Network based protection for cell broadcast with SA2 TR 23.769 Samsung -
S3‑151107 Security information in PDCP Header Samsung -
S3‑151108 Security Requirements for Out-Of-Coverage Discovery Samsung -
S3‑151109 Solution for Out-Of-Coverage Discovery Samsung -
S3‑151110 New Study Item for Security Aspects of Isolated E-UTRAN Operation for Public Safety General Dynamics UK Ltd. -
S3‑151111 Security aspects of the SA2 study on Isolated E-UTRAN Operation for Public Safety (IOPS) General Dynamics UK Ltd. -
S3‑151112 Outline TR for Study on Isolated E-UTRAN Operation for Public Safety: Security aspects General Dynamics UK Ltd. -
S3‑151113 Text proposal for the outline TR for Study on Isolated E-UTRAN Operation for Public Safety General Dynamics UK Ltd. -
S3‑151114 Adding a MIC Check timer to direct discovery procedures Qualcomm Incorporated -
S3‑151115 Restricted Direct Discovery using Model B Ericsson -
S3‑151116 Adding a key issue for restricted direct discovery to TR 33.833 Qualcomm Incorporated -
S3‑151117 Adding a solution for restricted direct discovery to TR 33.833 Qualcomm Incorporated -
S3‑151118 pCR for a security solution for Restricted Direct Discovery using Model Ericsson -
S3‑151119 Some security analysis for GERAN CIoT Qualcomm Incorporated -
S3‑151120 Discussion of open issues in security for Cellular Internet of Things Nokia Networks -
S3‑151121 Study of the efficiency of AKA/SA procedures applied to C-IoT Vodafone -
S3‑151122 Update to living document on security enhancements for Cellular Internet of Things Nokia Networks -
S3‑151123 Draft reply LS to GERAN on security for Cellular Internet of Things Nokia Networks -
S3‑151124 Proposal to re-use security solution for ProSe Open Direct Discovery for Restricted Direct Discovery Ericsson -
S3‑151125 Discussion of optionality of Match Report in ProSe Direct Open Discovery (Model A) Ericsson -
S3‑151126 Identification of MCPTT Assets CESG -
S3‑151127 Comments to S3-151050 Alcatel Lucent -
S3‑151128 Comments to S3-151041 Gemalto -
S3‑151129 Adding a new Annex (Annex D) to collect all test cases - Updated Telecom Italia S.p.A -
S3‑151130 Reply LS on LI requirements for end-to-end WebRTC-IMS security S3i150060 -
S3‑151131 Agenda WG Chairman -
S3‑151132 LS related to Mobile VoIP IMS Roaming S3i150073 -
S3‑151133 MCPTT project plan SA2 Chairman -
S3‑151134 DT comments against S3-151129 Deutsche Telekom AG -
S3‑151135 SA3 Meeting calendar ETSI Secretariat -
S3‑151136 Nokia comments on 1027_TEST-CASES-SHEET Nokia Networks -
S3‑151137 Nokia comments on 1129_Update_of_S3-151026 Nokia Networks -
S3‑151138 Reply to: LS on TLS and DTLS terminology NTT-Docomo -
S3‑151139 Input to joint meeting on MCPTT CESG -
S3‑151140 Questions to SA2 regarding ProSe Rapporteur -
S3‑151141 Discussion of way forward for SCAS Nokia Networks -
S3‑151142 pCR on moving existing threats to the Tampering threat category Telecom Italia S.p.A -
S3‑151143 pCR on moving existing threats to the Denial of Service threat category Telecom Italia S.p.A -
S3‑151144 pCR on moving existing threats to the Information Disclosure threat category Telecom Italia S.p.A -
S3‑151145 pCR on moving existing threats to the Elevation of Privilege threat category Telecom Italia S.p.A -
S3‑151146 pCR to TR 33.806 on requirements for MME Management and Mainteance Interfaces Huawei, HiSilicon -
S3‑151147 pCR to TR 33.806 on merging requirements on Authentication and Authorisation ű Authentication Attributes Alcatel-Lucent, Nokia Networks -
S3‑151148 pCR to TR 33.806 on merging requirements on password rules Nokia Networks, Alcatel-Lucent -
S3‑151149 pCR to TR 33.806 on requirement on lock-out policy Nokia Networks, Alcatel-Lucent -
S3‑151150 pCR to TR 33.806 on merging requirements on authorization and access control Nokia Networks, Alcatel-Lucent -
S3‑151151 Draft TR 33.916 Rapporteur -
S3‑151152 Draft TR 33.806 Rapporteur -
S3‑151153 Correntions on SCG security algorithm negotiation Huawei, HiSilicon -
S3‑151154 Additions to Annex D related to new test cases Telecom Italia S.p.A -
S3‑151155 Adding a new Annex (Annex D) to collect all test cases - Updated Telecom Italia S.p.A -
S3‑151156 pCR to TR 33.806 clause B.3.4.1 Deutsche Telekom AG -
S3‑151157 pCR to TR 33.806 clause B.3.4.2 Deutsche Telekom AG -
S3‑151158 pCR SCAS Clarification/Improvements of logging requirements Ericsson -
S3‑151159 pCR SCAS Clarification/Improvements of traffic separation requirements Ericsson -
S3‑151160 Study item on Cellular IoT Vodafone -
S3‑151161 LS_out_SA3 to RAN2_Reply LS on RAN2 agreements for Dual Connectivity Huawei, HiSilicon -
S3‑151162 LS to SA1 on end-to-end WebRTC security requirements in LI specs Alcatel-Lucent -
S3‑151163 Solving the first Editor Note in section 6.3.2.2 of TR 33.872 Alcatel Lucent -
S3‑151164 Solving the third Editor Note in section 6.3.2.2 of TR 33.872 Alcatel Lucent -
S3‑151165 Removing all the Editor's notes in 6.3.2.2 of TR 33.872 Alcatel Lucent -
S3‑151166 Discovery Slot Clarification Huawei, HiSilicon -
S3‑151167 Security information in PDCP Header Samsung -
S3‑151168 new draft TR 33.872 WebRTC Rapporteur -
S3‑151169 new draft TR 33.833 ProSe Rapporteur -
S3‑151170 Authorisation for restricted ProSe direct discovery Huawei, HiSilicon -
S3‑151171 Adding a solution for restricted direct discovery to TR 33.833 Qualcomm Incorporated -
S3‑151172 pCR for a security solution for Restricted Direct Discovery using Model Ericsson -
S3‑151173 Proposal to re-use security solution for ProSe Open Direct Discovery for Restricted Direct Discovery Ericsson -
S3‑151174 Security Requirements for Out-Of-Coverage Discovery Samsung -
S3‑151175 Solution for Out-Of-Coverage Discovery Samsung -
S3‑151176 Solutions analysis of DOS attack in registration procedure China Mobile -
S3‑151177 Draft TR 33.879 MCPTT Rapporteur -
S3‑151178 Proposed Scope for MCPTT TR CESG -
S3‑151179 Identification of MCPTT Assets CESG -
S3‑151180 General security requirments for MCPTT Huawei, HiSilicon -
S3‑151181 Reply LS to TCG Interdigital -
S3‑151182 One-to-one security for ProSe Ericsson -
S3‑151183 Adding a MIC Check timer to direct discovery procedures Qualcomm Incorporated -
S3‑151184 ProSe 33 833 Clarification to traditional RN Nokia Networks -
S3‑151185 security for One-to-one Relays ZTE Corporation, China Unicom -
S3‑151186 UE-to-network relay security for ProSe Ericsson -
S3‑151187 Reply to: LS on UE-based procedure with USAT application pairing Ericsson -
S3‑151188 USAT Pairing update Gemalto, Oberthur -
S3‑151189 new draft TR 33.889 Rapporteur -
S3‑151190 AESE: Solution for using OMA-ER-Autho4API for securing SCEF A2 and A3 interfaces Ericsson -
S3‑151191 Key issue for MONTE on privacy of UE location information Ericsson -
S3‑151192 pCR to TR 33.806 on requirements for user identities Huawei, HiSilicon -
S3‑151193 [MTCe] group authentication mechanism China Mobile -
S3‑151194 Aligning Network based protection for cell broadcast with SA2 TR 23.769 Samsung -
S3‑151195 Living document on IoT Nokia Networks -
S3‑151196 Mandatory support of mutual authentication Huawei, HiSilicon,Vodafone -
S3‑151197 Dicsussion of encryption algorithms for cellular IoT UE Huawei, HiSilicon, China Unicom -
S3‑151198 LS on cellular IoT Qualcomm -
S3‑151199 Discussion of integrity protection for cellular IoT UE Huawei, HiSilicon, China Unicom -
S3‑151200 Update to living document on security enhancements for Cellular Internet of Things Nokia Networks -
S3‑151201 LS to SA on worksplit for cellular IoT study NTT-Docomo -
S3‑151202 New Study Item for Security Aspects of Isolated E-UTRAN Operation for Public Safety General Dynamics UK Ltd. -
S3‑151203 Outline TR for Study on Isolated E-UTRAN Operation for Public Safety: Security aspects General Dynamics UK Ltd. -
S3‑151204 Clarification of one-to-many requirements Ericsson -
S3‑151205 Definitions of identity and identifiable China Unicom, ZTE Corporation -
S3‑151206 Draft TR 33.849 Rapporteur -
S3‑151207 Key issue- user privacy preference China Unicom, ZTE Corporation -
S3‑151208 Privacy identification process China Unicom, ZTE Corporation -
S3‑151209 Privacy guidelines for the third party service providers China Unicom, ZTE Corporation -
S3‑151210 Work Plan input from the Rapporteurs ETSI Secretariat -

page generated from database: 2020-05-13 18:35:19