V18.0.0 (Wzip)
2023/09 13 p.
full Table of Contents for TR 33.892 Word version: 18.0.0
The present document analyses mechanisms to ensure the identity of a genuine application in order to apply the URSP rule accordingly, such that malicious applications cannot get access towards the operator regulated resources. The present document identifies key issues and develops solutions for enhancements that enables a URSP rule to securely identify the application for which the URSP rule should be applied.