[图书][B] SIP security

D Sisalem, J Floroiu, J Kuthan, U Abend, H Schulzrinne - 2009 - books.google.com
This book gives a detailed overview of SIP specific security issues and how to solve them
While the standards and products for VoIP and SIP services have reached market maturity …

Solution analysis for SIP security threats

W Werapun, A Abou El Kalam… - 2009 International …, 2009 - ieeexplore.ieee.org
Session Initial Protocol (SIP) is widely used for handling multimedia signaling. Because SIP
is widely used in many multimedia applications, it becomes an attractive target to attackers …

A cooperative sip infrastructure for highly reliable telecommunication services

A Fessi, H Niedermayer, H Kinkelin… - Proceedings of the 1st …, 2007 - dl.acm.org
Voice over IP (VoIP) has been a promising technology for several years. Although it has
become very popular, the vision to substitute the" good old" Public Switched Telephone …

[PDF][PDF] Identity management systems: A comparison of current solutions

A Myllyniemi - TKK T-110.5290 Seminar on Network Security, 2006 - Citeseer
Nowadays, there is a vast amount of work going on in the field of network identity
management. Many people in many organizations want to solve the problem of users having …

[PDF][PDF] The IETF Geopriv and presence architecture focusing on location privacy

H Tschofenig, H Schulzrinne, A Newton… - Position paper at W3C …, 2006 - w3.org
The Geographic Location/Privacy (Geopriv) work-ing group defines the concept of a'using
protocol', a protocol that carries Geopriv location objects. Geopriv also defines various …

Next steps for security assertion markup language (saml)

S Saklikar, S Saha - Proceedings of the 2007 ACM workshop on Secure …, 2007 - dl.acm.org
The Security Assertion Markup Language (SAML) has established itself as one of the most
advanced and popular standards in the Identity Federation and Assertion management …

Flexible single sign-on for SIP: bridging the identity chasm

P Nie, JM Tapio, S Tarkoma… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Identity federation is a key requirement for today's distributed services. This technology
allows managed sharing of users' identity information between identity providers (IDP), and …

Towards dynamic trust establishment for identity federation

F Almenárez, P Arias, A Marín, D Díaz - Proceedings of the 2009 Euro …, 2009 - dl.acm.org
Federation has emerged as a key concept for identity management, as it is the basis to
reduce complexity in the companies and improve user experience. However, the problem of …

Multi-domain authentication for IMS services

S Islam, JC Grégoire - Computer Networks, 2011 - Elsevier
This article proposes a novel unified IP Multimedia Subsystem (IMS) authentication
architecture that extends the scope of IMS by allowing it to offer users different IMS-based …

Identity federation for voip-based services

S Saklikar, S Saha - Proceedings of the 2007 ACM workshop on Digital …, 2007 - dl.acm.org
Identity Federation enables managing a single User's multiple Identities across
administrative domains. Instead of forcing a single Identity for the User, it leverages trust …