Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Characteristics and generation scenarios of SPIM    
 7     Functional IM architecture for countering SPIM        
        7.1     Overview       
        7.2     Components functionality      
 8     Working procedures             
        8.1     Working procedure of sending rate control     
        8.2     Working procedure of blacklists           
        8.3     Procedures of authorization management      
        8.4     Procedures of user registration management
        8.5     Procedures for SPIM complaints          
        8.6     Procedure of SPIM filtering    
Appendix I – Roles and functions of IM system    
Bibliography