nication sessions to be supported yet limits the us-
age of communication resources to one Web page at a
time. The endpoint will provide its services for other
Web pages if the current using Web app does have no
open sessions and will detect crashes of a Web page or
the browser automatically as reserving the communi-
cation stack is tied to keeping the Websocket session
open.
Unlike other approaches, the APSINT architecture
offers the possibility to communicate with clients of
other type and via telco network features protocols
and networks of other kind. With an APSINT en-
abled Web page one can communicate with any other
SIP client reachable in the network or via breakout
functionality of telco providers with any other party
in the mobile or fixed line network. These solutions
are standardized and available worldwide.
5.1 Security Issues
Security issues have a paramount importance for the
all parties involved in consuming and providing ser-
vices build on top of APSINT architecture. This is
because of the specific setup which allows a Web page
to take control over audio and video sessions started
from the users devices like Smartphone. Hence on the
usability level security requirements revolve around
achieving trust in this new functionality by providing
a reliable solution in term of authentication and au-
thorization of communication sessions started by the
Web pages, as well as, providing privacy and confi-
dentiality. Security measures need to address specific
focus of all parties involved, as discussed below.
Users may be accustomed to the dangers of the
internet and accept the risks because of vital impor-
tance of this platform. However, they may be difficult
to persuade to grant control over their phones to an in-
ternet application unless they can trust their security
requirements are met. The users requirements cover
different areas which stretch from preventing of start-
ing unsolicited communication sessions and possibly
turning their devices to spy on users communication
or hijacking them for SPIT attacks, securing privacy
of communication, up to mitigation of phishing, e.g.
in form of persuading users to call a costly service
numbers.
Similarly, network providers are interested in pre-
venting SPIT or DoS attacks on their customers which
may be caused when malicious Web pages could ob-
tain control over devices connected to the providers
network. They would as well prefer situation when
they could unambiguously identify sessions origi-
nated by the Web pages and associate them with
the specific page. This may be especially important
when APSINT architecture capable devices would be
branded by the operator. In this case users would
surely expect the operator to take at least partial re-
sponsibility in case when allowing Web pages to con-
trol communication sessions would inflict substantial
cost s to the user, e.g. due to phishing attack.
For the owners of the Web pages with capabilities
to control communication sessions on the APSINT
devices winning user trust is very important. User
need to have a guarantee that they do not give con-
trol to start audio or video sessions to the malicious
Web page. Therefore stealing the functionality for
controlling APSINT terminals embedded in a specific
Web page and reusing it in the context of a different
Web page should be prevented. If the revenues from
the voice and video traffic generated by the Web page
need to be shared with the network operator, then un-
ambiguous identification of such sessions is needed.
Traditional architecture for Web-IMS conver-
gence is based on Parlay X interface in the IMS
application server and it has well defined security
framework. Critics of the efficiency of the Parlay X
based architecture brought alternative proposal based
on new functional entity on the IMS network border
named Web Session Controller which shields the IMS
terminal from direct interaction with Web application.
APSINT project gives a new concept to Web and IMS
convergence which takes place mainly in users ter-
minal. Direct interactions between IMS terminal and
Web applications require to explore ways of combin-
ing security solutions for Web applications with IMS
security standards applicable for this novel architec-
ture. Approach taken by the APSINT team tries to
flexibly adapt security restrictions in consuming Web
applications to the degree of trust that user expresses
against a Web page with embedded APSINT applica-
tion. Web applications being consumed in the users
browser will be secured by the known technologies
like SSH or digital signatures, however, user will be
allowed to grant his permit to specific Web pages for
establishing audio and video sessions either perma-
nent or for the actual session only depending on his
trust toward this Web page. IMS security standards
will be fully supported. Additionally a new secu-
rity measure is studied for providing to IMS identity
of Web application which was allowed to start au-
dio/video session from the particular IMS terminal.
6 CONCLUSIONS AND FUTURE
WORK
As the APSINT solution integrates the endpoint on
local device the browser communicates with the end-
WEBIST2012-8thInternationalConferenceonWebInformationSystemsandTechnologies
760