tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here        Top        Up        Prev        None
part:    1     2     3     4     5     6

 

 

6   Conclusions
A   Focus areas, and rationales behind them   Word-p. 561
B   Guiding principles   Word-p. 562
C   Trust model study for network slicing   Word-p. 564
D   Prioritization of key issues   Word-p. 567
E   Questions and Interim Agreements   Word-p. 574
E.1   Questions and Interim Agreements for security area #1
E.1.1   Questions and Interim Agreements for Key Issue #1.1
E.1.2   Questions and Interim Agreements for Key Issue #1.2      Up
E.1.3   Questions and Interim Agreements for Key Issue #1.3      Up
E.1.4   Questions and Interim Agreements for Key Issue #1.4
E.1.5   Questions and Interim Agreements for Key Issue #1.5   Word-p. 576
E.1.6   Questions and Interim Agreements for Key Issue #1.6
E.1.7   Questions and Interim Agreements for Key Issue #1.7
E.1.8   Questions and Interim Agreements for Key Issue #1.8
E.1.9   Questions and Interim Agreements for Key Issue #1.9
E.1.10   Questions and Interim Agreements for Key Issue #1.10
E.1.11   Questions and Interim Agreements for Key Issue #1.11
E.1.12   Questions and Interim Agreements for Key Issue #1.12      Up
E.1.13   Questions and Interim Agreements for Key Issue #1.13
E.1.14   Questions and Interim Agreements for Key Issue #1.14      Up
E.1.15   Questions and Interim Agreements for Key Issue #1.15   Word-p. 582
E.1.16   Questions and Interim Agreements for Key Issue #1.16
E.1.18   Questions and Interim Agreements for Key Issue #1.18
E.1.19   Questions and Interim Agreements for Key Issue #1.19
E.1.20   Questions and Interim Agreements for Key Issue #1.20
E.1.21   Questions and Interim Agreements for Key Issue #1.21   Word-p. 584
E.2   Questions and Interim Agreements for security area #2
E.2.1   Questions and Agreements for Key Issue #2.1 Authentication Framework
E.2.2   Questions and Agreements for Key Issue #2.2 reducing the impact of secret key leakage
E.2.4   Questions and interim agreements for key issue #2.4
E.2.8   Questions and interim agreements for key issue #2.8
E.2.11   Questions and Agreements for Key Issue #2.11 "Increasing home control in roaming situations"
E.3   Questions and Interim Agreements for security area #3   Word-p. 588
E.4   Questions and Interim Agreements for security area #4
E.4.1   Questions and Interim Agreements for Key Issue #4.1
E.4.2   Questions and Interim Agreements for Key Issue #4.2
E.4.3   Questions and Interim Agreements for Key Issue #4.3
E.4.4   Questions and Interim Agreements for Key Issue #4.4
E.4.5   Questions and Interim Agreements for Key Issue #4.5      Up
E.4.6   Questions and Interim Agreements for Key Issue #4.6
E.4.7   Questions and Interim Agreements for Key Issue #4.7
E.4.8   Questions and Interim Agreements for Key Issue #4.8
E.4.9   Questions and Interim Agreements for Key Issue #4.9
E.4.10   Questions and interim agreements for key issue #4.10
E.4.11   Questions and interim agreements for key issue #4.11
E.4.12   Questions and interim agreements for key issue #4.12
E.4.13   Questions and interim agreements for key issue #4.13
E.4.14   Questions and interim agreements for key issue #4.14
E.4.15   Questions and interim agreements for key issue #4.15      Up
E.4.16   Questions and interim agreements for key issue #4.16
E.4.17   Questions and interim agreements for key issue #4.17
E.5   Questions and Interim Agreements for security area #5   Word-p. 592
E.7   Questions and Interim Agreements for security area #7
E.7.1   Questions and Interim Agreements for Key Issue #7.1
E.7.2   Questions and Interim Agreements for Key Issue #7.2
E.7.2.0   Questions in other clauses affecting this key issue
E.7.2.1   Concealing permanent subscription identifier   Word-p. 593
E.7.2.2   Using symmetric key (HN pseudonym) for permanent subscription identifier privacy
E.7.2.4   Using SN attributes (asymmetric key) and Tusted Authority TA(s) for permanent subscription identifier privacy
E.7.2.5   Using SN identity (asymmetric key) and Key Management Server (KMS) for permanent subscription identifier privacy
E.7.2.6   Using HN asymmetric key for permanent subscription identifier privacy   Word-p. 594
E.7.2.7   Support Subscriber Permanent Identifier (IMSI) Privacy
E.7.2.8   Synchronisation and recovery aspects      Up
E.7.2.9   Storage and provisioning of keys related to concealing the permanent subscription identifier
E.7.3   Questions and interim agreements for key issue #7.3
E.7.7   Questions and interim agreements for key issue #7.7      Up
E.7.8   Questions and interim agreements for key issue #7.8
E.7.9   Questions and interim agreements for key issue #7.9
E.7.10   Questions and interim agreements for key issue #7.10
E.8   Questions and Interim Agreements for security area #8
E.8.1   Questions and Interim Agreements for key issue #8.1 (Network Slice security isolation)
E.8.2   Questions and Interim Agreements for Key Issue #8.2
E.8.3   Questions and Interim Agreements for key issue #8.3 (Security on UEs' access to slices)   Word-p. 597
E.8.4   Interim Agreements for Security on Key Issue #8.4: Security on sensitive network elements   Word-p. 598
E.8.5   Interim Agreements for Security on Key Issue #8.5: Security on management of slicing      Up
E.8.7   Interim Agreements for Security on Key Issue #8.7: Security on inter-slice communications
E.17   Questions and Interim Agreements for security area #17
F   Comparison on non 3GPP access solutions   Word-p. 600
G   Overview of 5G security architecture   Word-p. 601

Up        Top