Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere          
        3.2     Terms defined in this Recommendation              
 4     Abbreviations and acronyms              
 5     Conventions             
 6     Technical methods for countering IP multimedia spam             
        6.1     Source analysis method            
        6.2     Characteristics analysis method             
        6.3     Content analysis method          
 7     Framework for countering IP multimedia spam           
        7.1     Spammer        
        7.2     SAS functions 
        7.3     RAS functions
        7.4     CAS functions
        7.5     SR functions   
        7.6     Reference points in the framework       
Appendix I – Countering spam by imposing spamming difficulties    
Appendix II – Security and practical considerations in using the framework    
       II.1     Security considerations              
       II.2     Practical considerations             
Bibliography