Search results for "Security Assertion Markup Language"
showing 2 items of 2 documents
Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications
2013
Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…
Inter-provider AAA and Billing of VoIP Users with Token-based Method
2007
With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …