IEEE Transactions on Software Engineering - Special issue on formal methods in software practice
Partial-Order Methods for the Verification of Concurrent Systems: An Approach to the State-Explosion Problem
Embedding Policy Rules for Software-Based Systems in a Requirements Context
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
An Adaptive Policy-Based Approach to SPIT Management
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Understanding SIP through Model-Checking
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Verification of Policy-Based Self-Managed Cell Interactions Using Alloy
POLICY '09 Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks
Verification of the SIP transaction using coloured petri nets
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Security and management policy specification
IEEE Network: The Magazine of Global Internetworking
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |
Voice over IP (VoIP) is a key technology, which provides new ways of communication. It enables the transmission of telephone calls over the Internet, which delivers economical telephony that can clearly benefit both consumers and businesses, but it also provides a cheap method of mass advertising. Those bulks unsolicited calls are known as SPam over Internet Telephony (SPIT). In this paper we illustrate an anti-SPIT policy-based management (aSPM) mechanism which can handle the SPIT phenomenon. Moreover, we introduce a formal verification as a mean for validating the effectiveness of the aSPM against its intended goals. We provide model checking results that report upper bounds in the duration of call session establishment for the analyzed anti-SPIT policy over the Session Initiation Protocol (SIP) and prove the absence of deadlocks.