“A presence based multimedia call screening service” Egil C. Østhus, now with TANDBERG Lill Kristiansen, Dept of Telematics, NTNU.

Slides:



Advertisements
Similar presentations
A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
Advertisements

Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Vishal K. Singh, Henning Schulzrinne
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
Extensibility, Safety and Performance in the SPIN Operating System Department of Computer Science and Engineering, University of Washington Brian N. Bershad,
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Dynamic Agent-Based Prioritized Connection Admission for Stressed Network Cory C. Beard and Victor S. Frost Information and Telecommunication Technology.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Computer Science 1 Providing QoS through Active Domain Management Liang Guo, Ibrahim Matta Quality-of-Service Networking Lab CS Department Boston University.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
WebInSight Goals Automatically add alt text to webpages Coordinate multiple labeling sources Receive and process labeling requests Do all without harming.
Context Awareness System and Service SCENE JS Lee 1 UbiPhone:Human-Centered Ubiquitous Phone System.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
Location Aware Social Network Group 2 CS Team Introduction Prasun Johari M.S. ECE Ankur Aggarwal M.S. CS Gurlal Kahlon M.S. CS Shobith Alva M.S.
Service Mobility Project Status Report Henning Schulzrinne Ron Shacham Columbia University Collaboration Meeting DoCoMo Eurolabs, Munich July 28, 2005.
CHAPTER 15 & 16 Service Provider VoIP Applications and Services Advanced Enterprise Applications.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Graduate Programs in Computer Science Design of cyber security awareness game utilizing a social media framework WA Labuschagne.
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
MOBILE CLOUD COMPUTING
1 NGN Issues - Numbering and Addressing Peter Darling ACIF NGN FOG No. 3.
CINEMA’s UbiComp Subsystem Stefan Berger and Henning Schulzrinne Department of Computer Science Columbia University
Assessing the Suitability of UML for Modeling Software Architectures Nenad Medvidovic Computer Science Department University of Southern California Los.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Software Design The Dynamic Model Design Sequence Diagrams and Communication Diagrams Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Multilevel Secure Database.
Adaptive Web-Based Leveling Courses Shunichi Toida, Chris Wild, M. Zubair Li Li, Chunxiang Xu Computer Science Department Old Dominion University.
1 ENME: An ENriched MEdia application utilizing context for session mobility; technical and human issues Lill Kristiansen, Prof. Dr. Scient Dept. of Telematics,
Delivering business value through Context Driven Content Management Karsten Fogh Ho-Lanng, CTO.
Draft-khan-ip-serv-peer-arch-03.txt SPEERMINT Peering Architecture IETF-66, Montreal, Canada Sohel Khan, Ph.D. Technology Strategist.
Vkg/Jan. 2003/SIP 2003 Internet Services for PSTN Sessions Presented by: J M van Schaick January.
A Comparative Study of Signaling Protocols for Data Management and Synchronization # Department of Computer Engineering, Kocaeli University.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
Lecture 1: Overview of CSCI 485 Notes: I presented parts of this lecture as a keynote at Educator’s Symposium of OOPSLA Shahram Ghandeharizadeh Associate.
Perils of Transitive Trust in the Domain Name System Chen Xi Chen Xi.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Multilevel Secure Data Management.
TOOL5100: CSCL Issues in CSCW and groupware A. Mørch, Issues in CSCW and Groupware: Anders Mørch TOOL 5100,
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
IP Columbia Prof. Henning Schulzrinne Internet Real-Time Laboratory Department of Computer Science Columbia University.
ICalendar Compatible Collaborative Calendar- Server (CCS) Web Services Ahmet Fatih Mustacoglu Indiana University Computer Science Department Community.
1 Ubiquitous Computing in Home Networks Henning Schulzrinne, Columbia University Stefan Berger, IBM Research IEEE Communication Magazine 2003.
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.
1 Services shared between network and endpoints Lill Kristiansen Prof. Dr.Scient, Telematics, NTNU Norway.
August 2005IETF 63 - SIPPING Specifying Media Privacy Requirements in SIP Ron Shacham Henning Schulzrinne Dept. of Computer.
Architecture for Context-Aware Services in Gaia Anand Ranganathan.
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing December 9, 2009 Project Presentation.
Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application Emiliano Miluzzo†, Nicholas D. Lane†, Kristóf.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
17 February 2016 SIPPING - IEPREP Joint Meeting Fred Baker - IEPREP co-chair Rohan Mahy - SIPPING co-chair.
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
IP Columbia Internet Real-Time Laboratory Department of Computer Science Columbia University.
Franco Travostino and Admela Jukan jukan at uiuc.edu June 30, 2005 GGF 14, Chicago Grid Network Services Architecture (GNSA) draft-ggf-ghpn-netserv-2.
SIP6 Platform Updates Based on CNGI-CERNET2 Network Research Center Tsinghua University.
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Literature by S. Demetriou et al. Presented.
Dept. Computer Science, Korea Univ. Intelligent Information System Lab. 1 In-Jeong Chung Intelligent Information System lab. Department.
Automation Technologies SCADA SENSORS HMI
SIP for Grid networks Franco Callegati, Aldo Campi, Walter Cerroni
Instructor: Dr. Hany H. Ammar
Institute for Cyber Security
eduTEAMS Roadmap and Timeline,
Tools for Memory: Database Management Systems
Prof. Henning Schulzrinne Internet Real-Time Laboratory
Presentation transcript:

“A presence based multimedia call screening service” Egil C. Østhus, now with TANDBERG Lill Kristiansen, Dept of Telematics, NTNU

Outline  Motivation  PreMuMex – The architecture  Advantages  Challenges  Future work MATA05 Norwegian University of Technology and Science Department of Telematics

Motivation  More powerful endpoints Phone is a computer  Add context awareness to the call setup  Provide rejected callers with rich feedback  How to implement in SIP MATA05 Norwegian University of Technology and Science Department of Telematics

PreMuMex – The architecture MATA05 Norwegian University of Technology and Science Department of Telematics

PreMuMex – The architecture MATA05 Norwegian University of Technology and Science Department of Telematics

PreMuMex – The architecture MATA05 Norwegian University of Technology and Science Department of Telematics

PreMuMex – The architecture MATA05 Norwegian University of Technology and Science Department of Telematics

PreMuMex – The architecture MATA05 Norwegian University of Technology and Science Department of Telematics

PreMuMex – The architecture MATA05 Norwegian University of Technology and Science Department of Telematics

PreMuMex – The architecture MATA05 Norwegian University of Technology and Science Department of Telematics

Advantages  Intelligent policy based call screening is possible Calendar data System status Personal presence Could be extended with other parameters  Dynamic failure response More info than the POTS “unavailable tone” Different response to different callers Response could include Click-to-dial or similar technologies MATA05 Norwegian University of Technology and Science Department of Telematics

Challenges  Support of REFER SIP extension, not mandatory to support  Accessing the collaboration data Control unit and collaboration server likely to be in different business domains A trust relationship is needed between the calendar data provider and the sip proxy provider MATA05 Norwegian University of Technology and Science Department of Telematics

Future work  New security issues is introduced Potential DoS attacks Should be studied in greater detail  Privacy issues To what extend does the average Joe what to reveal his context information? MATA05 Norwegian University of Technology and Science Department of Telematics