SPAM for Internet Telephony (SPIT) Prevention using the Security Assertion Markup Language (SAML)
draft-schwartz-sipping-spit-saml-01
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Author | David Schwartz | ||
| Last updated | 2006-06-29 | ||
| Stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-schwartz-sipping-spit-saml-01.txt
Abstract
Limiting and preventing SPAM for Internet Telephony (SPIT) is seen as an important task for future security work in the Voice over IP environment. This document addresses the problem by utilizing the concept introduced by the SIP Identity Framework in combination with the Security Assertion Markup Language (SAML) to warrant certain security relevant attributes from one administrative domain to another. This approach allows the destination domain to make intelligent filtering decisions when receiving voice calls.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)