[9] “SIP Extension for Instant Messaging” by B. Campbell et al. RFC 3428, IETF,
December 2002.
[10] See for example http://www.xten.com.
[11] “SIP Basic Call Flow Examples” by A. Johnston et al. IETF, RFC 3665,
December 2005.
[12] “SIP-PSTN Call Flows” by A. Johnston et al. IETF, RFC 3666, December
2005.
[13] “SIP Service Examples” by A. Johnston et al. Internet draft, work in
progress, IETF 2005. http://www1.ietf.org/internet-drafts/
draft-ietf-sipping-service-examples-09.txt.
[14] “Programming Internet Telephony Services” by J. Rosenberg, J. Lennox,
and H. Schulzrinne. Columbia University Tech/Report CUCS-010-99, 1999.
[15] “CPL: A Language for User Control of Internet Telephony Services” by
J. Lennox and H. Schulzrinne. IETF, October 2004.
[16] “Common Gateway Interface for SIP” by J. Lennox et al. RFC 3050. IETF,
January 2001.
[17] “SIP Specifications and the Java Platforms” P. O’Doherty et al. SUN
Microsystems, 2003.
[18] “The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation
Discovery System (DDDS) Application (ENUM)” by P. Fallstrom et al. RFC
3761, IETF, April 2004.
[19] “SIP-H.323 Interworking Requirements” RFC 4123 by H. Schulzrinne and
C. Agboh. IETF, July 2005.
[20] “Interworking SIP and IN Applications”, RFC 3976 by V. K. Gurbani et al.
IETF, January 2005.
[21] “MIME media types for ISUP and QSIG Objects”, RFC 3204 by E. Zim-
merer et al. IETF, December 2001.
[22] “SIP for Telephones: Context and Architectures”, RFC 3372 by A. Vemuri,
IETF, December 2002.
[23] “SIP and SOAP”. White paper by N. Deason, http://www.ubiquitysoftware
.com/pdf/SIP_and_SOAP_1-3.pdf.
[24] “Toward the PSTN/Internet Inter-Networking—Pre-PINT Implementa-
tions” by H. Lu et al. RFC 2458, IETF, November 1998.
[25] “The SPIRITS (Services in PSTN requesting Internet Services) Protocol” by
V. Gurbani et al. RFC 3910, IETF, October 2004.
[26] “Telephony Routing over IP (TRIP)” by J. Rosenberg et al., January 2002.
[27] “SIP and SPAM” by J. Rosenberg. Internet draft, IETF, February 2005.
[28] “A Minimalist Security Framework for SIP” by H. Schulzrinne. Internet
draft, IETF, November 2001.
[29] See the Jericho Forum atwww.opengroup.org/jericho.
[30] “The Art of SIP fuzzing and the Vulnerabilities found in VoIP” by M. Var-
piola. The Blackhat Briefings Conference, 2005. http://www.codenomicon.com/
media/white-papers/bh-us-05-nuwere-varpiola.pdf.
36 Chapter 2