{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:42:11Z","timestamp":1759092131335,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T00:00:00Z","timestamp":1246924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,7]]},"DOI":"10.1145\/1595637.1595653","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:37:23Z","timestamp":1253907443000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A policy framework for personalized and role-based SPIT prevention"],"prefix":"10.1145","author":[{"given":"Nico","family":"d'Heureuse","sequence":"first","affiliation":[{"name":"NEC Europe, Heidelberg, Germany"}]},{"given":"Jan","family":"Seedorf","sequence":"additional","affiliation":[{"name":"NEC Europe, Heidelberg, Germany"}]},{"given":"Saverio","family":"Niccolini","sequence":"additional","affiliation":[{"name":"NEC Europe, Heidelberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cisco Security Advisory: Multiple Product Vulnerabilities Found by PROTOS SIP Test Suite. avaliable online at http:\/\/www.cisco.com\/warp\/public\/707\/cisco-sa-20030221-protos.shtml.  Cisco Security Advisory: Multiple Product Vulnerabilities Found by PROTOS SIP Test Suite. avaliable online at http:\/\/www.cisco.com\/warp\/public\/707\/cisco-sa-20030221-protos.shtml."},{"key":"e_1_3_2_1_2_1","volume-title":"Social Networks and Global Reputation. In CEAS 2007 Fourth Conference on Email and AntiSpam","author":"Balasubramaniyan V. A.","year":"2007","unstructured":"V. A. Balasubramaniyan , M. Ahamad , and H. Park . CallRank: Combating SPIT Using Call Duration , Social Networks and Global Reputation. In CEAS 2007 Fourth Conference on Email and AntiSpam , 2007 . V. A. Balasubramaniyan, M. Ahamad, and H. Park. CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation. In CEAS 2007 Fourth Conference on Email and AntiSpam, 2007."},{"key":"e_1_3_2_1_3_1","volume-title":"Jan.","author":"Berners-Lee T.","year":"2005","unstructured":"T. Berners-Lee , R. Fielding , and L. Masinter . Uniform Resource Identifier (URI): Generic Syntax. RFC 3986 (Standard) , Jan. 2005 . T. Berners-Lee, R. Fielding, and L. Masinter. Uniform Resource Identifier (URI): Generic Syntax. RFC 3986 (Standard), Jan. 2005."},{"key":"e_1_3_2_1_4_1","first-page":"39","volume-title":"Proc. 8th International Conference on Feature Interaction","author":"Blair L.","year":"2005","unstructured":"L. Blair and K. J. Turner . Handling Policy Conflicts in Call Control . In Proc. 8th International Conference on Feature Interaction , pages 39 -- 57 . IOS Press, Amsterdam , June 2005 . L. Blair and K. J. Turner. Handling Policy Conflicts in Call Control. In Proc. 8th International Conference on Feature Interaction, pages 39--57. IOS Press, Amsterdam, June 2005."},{"key":"e_1_3_2_1_5_1","unstructured":"N. Damianou A. K. Bandara M. Sloman and E. C. Lupu. A Survey of Policy Specification Approaches. avaliable online at http:\/\/en.scientificcommons.org\/552923.  N. Damianou A. K. Bandara M. Sloman and E. C. Lupu. A Survey of Policy Specification Approaches. avaliable online at http:\/\/en.scientificcommons.org\/552923."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Proc. IEEE Global Telecommunications Conference IEEE GLOBECOM 2008","author":"Heureuse N.","year":"2008","unstructured":"N. d' Heureuse , J. Seedorf , S. Niccolini , and T. Ewald . Protecting SIP-Based Networks and Services from Unwanted Communications . In Proc. IEEE Global Telecommunications Conference IEEE GLOBECOM 2008 , pages 1 -- 5 , 2008 . N. d'Heureuse, J. Seedorf, S. Niccolini, and T. Ewald. Protecting SIP-Based Networks and Services from Unwanted Communications. In Proc. IEEE Global Telecommunications Conference IEEE GLOBECOM 2008, pages 1--5, 2008."},{"key":"e_1_3_2_1_7_1","first-page":"2506","author":"Duflos S.","year":"2002","unstructured":"S. Duflos , G. Diaz , V. Gay , and E. Horlait . A Comparative Study of Policy Specification Languages for Secure Distributed Applications. In Management Technologies for E-Commerce and E-Business Applications, LNCS 2506 , 2002 . S. Duflos, G. Diaz, V. Gay, and E. Horlait. A Comparative Study of Policy Specification Languages for Secure Distributed Applications. In Management Technologies for E-Commerce and E-Business Applications, LNCS 2506, 2002.","journal-title":"In Management Technologies for E-Commerce and E-Business Applications, LNCS"},{"key":"e_1_3_2_1_8_1","first-page":"554","volume-title":"In 15th NIST-NCSC National Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and R. Kuhn . Role-based access controls . In In 15th NIST-NCSC National Computer Security Conference , pages 554 -- 563 , 1992 . D. Ferraiolo and R. Kuhn. Role-based access controls. In In 15th NIST-NCSC National Computer Security Conference, pages 554--563, 1992."},{"key":"e_1_3_2_1_9_1","volume-title":"Internet Engineering Task Force","author":"Jennings C.","year":"2007","unstructured":"C. Jennings . Computational Puzzles for SPAM Reduction in SIP, draft-jennings-sip-hashcash (expired) . Internet Engineering Task Force , July 2007 . C. Jennings. Computational Puzzles for SPAM Reduction in SIP, draft-jennings-sip-hashcash (expired). Internet Engineering Task Force, July 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.07.004"},{"key":"e_1_3_2_1_11_1","volume-title":"Oct.","author":"Lennox J.","year":"2004","unstructured":"J. Lennox , X. Wu , and H. Schulzrinne . Call Processing Language (CPL): A Language for User Control of Internet Telephony Services. RFC 3880 (Proposed Standard) , Oct. 2004 . J. Lennox, X. Wu, and H. Schulzrinne. Call Processing Language (CPL): A Language for User Control of Internet Telephony Services. RFC 3880 (Proposed Standard), Oct. 2004."},{"key":"e_1_3_2_1_12_1","volume-title":"Internet Engineering Task Force","author":"Niccolini S.","year":"2008","unstructured":"S. Niccolini , K. Fischer , D. Wing , M. Stiemerling , and H. Tschofenig . Spam feedback for SIP, draft-niccolini-sipping-spam-feedback (expired) . Internet Engineering Task Force , Feb. 2008 . S. Niccolini, K. Fischer, D. Wing, M. Stiemerling, and H. Tschofenig. Spam feedback for SIP, draft-niccolini-sipping-spam-feedback (expired). Internet Engineering Task Force, Feb. 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4597108"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.329"},{"key":"e_1_3_2_1_15_1","volume-title":"Oct.","author":"Rosenberg J.","year":"2008","unstructured":"J. Rosenberg , G. Camarillo , and D. Willis . A Framework for Consent-Based Communications in the Session Initiation Protocol (SIP). RFC 5360 (Proposed Standard) , Oct. 2008 . J. Rosenberg, G. Camarillo, and D. Willis. A Framework for Consent-Based Communications in the Session Initiation Protocol (SIP). RFC 5360 (Proposed Standard), Oct. 2008."},{"key":"e_1_3_2_1_16_1","volume-title":"Feb.","author":"Schulzrinne H.","year":"2007","unstructured":"H. Schulzrinne , H. Tschofenig , J. Morris , J. Cuellar , J. Polk , and J. Rosenberg . Common Policy: A Document Format for Expressing Privacy Preferences. RFC 4745 (Proposed Standard) , Feb. 2007 . H. Schulzrinne, H. Tschofenig, J. Morris, J. Cuellar, J. Polk, and J. Rosenberg. Common Policy: A Document Format for Expressing Privacy Preferences. RFC 4745 (Proposed Standard), Feb. 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817695"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_29"},{"key":"e_1_3_2_1_19_1","volume-title":"Internet Engineering Task Force","author":"Tschofenig H.","year":"2008","unstructured":"H. Tschofenig , G. Dawirs , T. Froment , D. Wing , and H. Schulzrinne . Requirements for Authorization Policies to tackle Spam and Unwanted Communication for Internet Telephony, draft-froment-sipping-spit-requirements (expired) . Internet Engineering Task Force , July 2008 . H. Tschofenig, G. Dawirs, T. Froment, D. Wing, and H. Schulzrinne. Requirements for Authorization Policies to tackle Spam and Unwanted Communication for Internet Telephony, draft-froment-sipping-spit-requirements (expired). Internet Engineering Task Force, July 2008."},{"key":"e_1_3_2_1_20_1","volume-title":"Internet Engineering Task Force","author":"Tschofenig H.","year":"2008","unstructured":"H. Tschofenig , E. Leppanen , S. Niccolini , and M. Arumaithurai . Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) based Robot Challenges for SIP, draft-tschofenig-sipping-captcha (expired) . Internet Engineering Task Force , Feb. 2008 . H. Tschofenig, E. Leppanen, S. Niccolini, and M. Arumaithurai. Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) based Robot Challenges for SIP, draft-tschofenig-sipping-captcha (expired). Internet Engineering Task Force, Feb. 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"Internet Engineering Task Force","author":"Tschofenig H.","year":"2008","unstructured":"H. Tschofenig , D. Wing , H. Schulzrinne , T. Froment , and G. Dawirs . A Document Format for Expressing Authorization Policies to tackle Spam and Unwanted Communication for Internet Telephony, draft-tschofenig-sipping-spit-policy (expired) . Internet Engineering Task Force , July 2008 . H. Tschofenig, D. Wing, H. Schulzrinne, T. Froment, and G. Dawirs. A Document Format for Expressing Authorization Policies to tackle Spam and Unwanted Communication for Internet Telephony, draft-tschofenig-sipping-spit-policy (expired). Internet Engineering Task Force, July 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"Nov.","author":"Westerinen A.","year":"2001","unstructured":"A. Westerinen , J. Schnizlein , J. Strassner , M. Scherling , B. Quinn , S. Herzog , A. Huynh , M. Carlson , J. Perry , and S. Waldbusser . Terminology for Policy-Based Management. RFC 3198 (Informational) , Nov. 2001 . A. Westerinen, J. Schnizlein, J. Strassner, M. Scherling, B. Quinn, S. Herzog, A. Huynh, M. Carlson, J. Perry, and S. Waldbusser. Terminology for Policy-Based Management. RFC 3198 (Informational), Nov. 2001."},{"key":"e_1_3_2_1_23_1","volume-title":"Internet Engineering Task Force","author":"Wing D.","year":"2008","unstructured":"D. Wing , S. Niccolini , M. Stiemerling , and H. Tschofenig . Spam Score for SIP, draft-wing-sipping-spam-score (expired) . Internet Engineering Task Force , Feb. 2008 . D. Wing, S. Niccolini, M. Stiemerling, and H. Tschofenig. Spam Score for SIP, draft-wing-sipping-spam-score (expired). Internet Engineering Task Force, Feb. 2008."}],"event":{"name":"IPTComm '09: Principles, Systems and Applications of IP Telecommunications","sponsor":["ACM Association for Computing Machinery","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Atlanta Georgia","acronym":"IPTComm '09"},"container-title":["Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595637.1595653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1595637.1595653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:03Z","timestamp":1750249083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595637.1595653"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,7]]},"references-count":23,"alternative-id":["10.1145\/1595637.1595653","10.1145\/1595637"],"URL":"https:\/\/doi.org\/10.1145\/1595637.1595653","relation":{},"subject":[],"published":{"date-parts":[[2009,7,7]]},"assertion":[{"value":"2009-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}