Search results for "Security Assertion Markup Language"

showing 2 items of 2 documents

Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications

2013

Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…

10009 Department of InformaticsComputer scienceDistributed computingInternet of ThingsReal-time computingMonitoring and Accounting Infrastructure020206 networking & telecommunications02 engineering and technology000 Computer science knowledge & systemsSimple Network Management ProtocolConstrained Application ProtocolSecurity Assertion Markup Language[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Resource (project management)CoAPAccounting information system0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]esineiden internet020201 artificial intelligence & image processing1700 General Computer Science2614 Theoretical Computer ScienceWireless sensor networkProtocol (object-oriented programming)
researchProduct

Inter-provider AAA and Billing of VoIP Users with Token-based Method

2007

With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …

Session Initiation ProtocolAccess networkbusiness.product_categoryVoice over IPbusiness.industrycomputer.internet_protocolComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSService providerComputer securitycomputer.software_genreSecurity Assertion Markup LanguageInternet accessThe InternetRoamingbusinesscomputerComputer network2007 First International Global Information Infrastructure Symposium
researchProduct