메뉴 건너뛰기




Volumn 6712 LNCS, Issue , 2011, Pages 128-139

A formally verified mechanism for countering SPIT

Author keywords

Formal verification; Model checking; Policy management; Spam over Internet Telephony (SPIT); Voice over IP (VoIP)

Indexed keywords

FORMAL VERIFICATIONS; KEY TECHNOLOGIES; POLICY BASED MANAGEMENT; POLICY MANAGEMENT; SESSION INITIATION PROTOCOL; SPAM OVER INTERNET TELEPHONY (SPIT); TELEPHONE CALLS; UPPER BOUND; VOICE OVER IP; VOICE OVER IP (VOIP);

EID: 84857378001     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21694-7_11     Document Type: Conference Paper
Times cited : (7)

References (23)
  • 2
    • 70350456979 scopus 로고    scopus 로고
    • The Session Initiation Protocol (SIP) and Spam
    • Network Working Group, January
    • Rosenberg, J., Jennings, C.: The Session Initiation Protocol (SIP) and Spam, Network Working Group, RFC 5039 (January 2008)
    • (2008) RFC , vol.5039
    • Rosenberg, J.1    Jennings, C.2
  • 4
    • 52049085901 scopus 로고    scopus 로고
    • A Sentinel to Screen Phone Calls Technology
    • accessed November 8, 2009
    • Graham-Rowe, D.: A Sentinel to Screen Phone Calls Technology. MIT Review (2006) (accessed November 8, 2009)
    • (2006) MIT Review
    • Graham-Rowe, D.1
  • 5
    • 57049086456 scopus 로고    scopus 로고
    • An adaptive policy-based approach to SPIT management
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Soupionis, Y., Dritsas, S., Gritzalis, D.: An adaptive policy-based approach to SPIT management. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 446-460. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 446-460
    • Soupionis, Y.1    Dritsas, S.2    Gritzalis, D.3
  • 8
    • 38349029320 scopus 로고    scopus 로고
    • Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
    • Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. Springer, Heidelberg
    • Basagiannis, S., Katsaros, P., Pombortsis, A.: Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 238-251. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4680 , pp. 238-251
    • Basagiannis, S.1    Katsaros, P.2    Pombortsis, A.3
  • 13
    • 13344283515 scopus 로고    scopus 로고
    • Session Initiation Protocol (SIP)
    • June
    • Rosenberg, J., et al.: Session Initiation Protocol (SIP), RFC 3261 (June 2002)
    • (2002) RFC , vol.3261
    • Rosenberg, J.1
  • 15
    • 84857413563 scopus 로고    scopus 로고
    • Cisco Systems, SIP Messages and Methods Overview, http://www.cisco.com/ univercd/cc/td/doc/product/software/ios122/rel-docs/sip-flo/preface.pdf
    • SIP Messages and Methods Overview
  • 16
    • 84857434662 scopus 로고    scopus 로고
    • version 2.0, retrieved March 20, 2009
    • SER server version 2.0, http://www.iptel.org/ser (retrieved March 20, 2009)
    • SER Server
  • 18
    • 81255207137 scopus 로고    scopus 로고
    • retrieved August 25
    • Twinkle softphone, http://www.twinklephone.com (retrieved August 25)
    • Twinkle Softphone
  • 20
    • 57349088245 scopus 로고    scopus 로고
    • Understanding SIP through model-checking
    • Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. Springer, Heidelberg
    • Zave, P.: Understanding SIP through model-checking. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol. 5310, pp. 256-279. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5310 , pp. 256-279
    • Zave, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.