[Ace] Fwd: New Version Notification for draft-ietf-ace-usecases-00.txt

Ludwig Seitz <ludwig@sics.se> Thu, 04 December 2014 14:07 UTC

Return-Path: <ludwig@sics.se>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0724F1AD3A1 for <ace@ietfa.amsl.com>; Thu, 4 Dec 2014 06:07:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.26
X-Spam-Level:
X-Spam-Status: No, score=-2.26 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m1jeO1iuPDcR for <ace@ietfa.amsl.com>; Thu, 4 Dec 2014 06:07:24 -0800 (PST)
Received: from outbox.sics.se (outbox.sics.se [193.10.64.137]) by ietfa.amsl.com (Postfix) with ESMTP id 299691AD3AC for <ace@ietf.org>; Thu, 4 Dec 2014 06:07:12 -0800 (PST)
Received: from e-mailfilter01.sunet.se (e-mailfilter01.sunet.se [192.36.171.201]) by outbox.sics.se (Postfix) with ESMTPS id D4B2D626 for <ace@ietf.org>; Thu, 4 Dec 2014 15:07:10 +0100 (CET)
Received: from letter.sics.se (letter.sics.se [193.10.64.6]) by e-mailfilter01.sunet.se (8.14.4/8.14.4/Debian-4) with ESMTP id sB4E7AFA003999 for <ace@ietf.org>; Thu, 4 Dec 2014 15:07:10 +0100
Received: from norm.sics.se (norm.sics.se [193.10.64.192]) by letter.sics.se (Postfix) with ESMTPS id BB46B40118 for <ace@ietf.org>; Thu, 4 Dec 2014 15:07:10 +0100 (CET)
Received: from [192.168.0.108] (unknown [85.235.11.178]) by norm.sics.se (Postfix) with ESMTPSA id 13CAC20B for <ace@ietf.org>; Thu, 4 Dec 2014 15:07:10 +0100 (CET)
Message-ID: <54806A87.6050707@sics.se>
Date: Thu, 04 Dec 2014 15:07:03 +0100
From: Ludwig Seitz <ludwig@sics.se>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "ace@ietf.org" <ace@ietf.org>
References: <20141204135611.7629.62021.idtracker@ietfa.amsl.com>
In-Reply-To: <20141204135611.7629.62021.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20141204135611.7629.62021.idtracker@ietfa.amsl.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="------------ms050009050503010106040702"
X-Bayes-Prob: 0.0001 (Score 0, tokens from: outbound, outbound-sics-se:default, sics-se:default, base:default, @@RPTN)
X-p0f-Info: os=Solaris 10, link=Ethernet or modem
X-CanIt-Geo: ip=85.235.11.178; country=SE; region=Skåne; city=Lund; latitude=55.7028; longitude=13.1927; http://maps.google.com/maps?q=55.7028,13.1927&z=6
X-CanItPRO-Stream: outbound-sics-se:outbound (inherits from outbound-sics-se:default, sics-se:default, base:default)
X-Canit-Stats-ID: 09Nnq7au8 - 8a3e5e2d5679 - 20141204
X-Antispam-Training-Forget: https://canit.sunet.se/canit/b.php?i=09Nnq7au8&m=8a3e5e2d5679&t=20141204&c=f
X-Antispam-Training-Nonspam: https://canit.sunet.se/canit/b.php?i=09Nnq7au8&m=8a3e5e2d5679&t=20141204&c=n
X-Antispam-Training-Spam: https://canit.sunet.se/canit/b.php?i=09Nnq7au8&m=8a3e5e2d5679&t=20141204&c=s
X-CanIt-Archive-Cluster: PfMRe/vJWMiXwM2YIH5BVExnUnw
X-Scanned-By: CanIt (www . roaringpenguin . com) on 192.36.171.201
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/8FMsU6qwpV-lgHENQ4VNk1knNj8
Subject: [Ace] Fwd: New Version Notification for draft-ietf-ace-usecases-00.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Dec 2014 14:07:29 -0000

Hello all,

I have just re-submitted draft-seitz-ace-usecases as 
draft-ietf-ace-usecases, as by the WG chair's instructions.

Currently the only change is one line added in the acknowledgments. 
However as was stressed in the ACE session at IETF 91, this doesn't mean 
we consider the document to be finished.

I encourage everyone to review the document and suggest changes and 
improvements, so that we can move forward with it quickly.

Perhaps the WG chairs can give the IETF newbies among us a short 
overview of how the document update procedure is going to be handled 
from now on?

Regards,

Ludwig


-------- Forwarded Message --------
Subject: New Version Notification for draft-ietf-ace-usecases-00.txt
Date: Thu, 04 Dec 2014 05:56:11 -0800
From: internet-drafts@ietf.org
To: Mehdi Mani <mehdi.mani@itron.com>, Sandeep Kumar 
<sandeep.kumar@philips.com>, Goeran Selander 
<goran.selander@ericsson.com>, Sandeep S. Kumar 
<sandeep.kumar@philips.com>, Ludwig Seitz <ludwig@sics.se>, Goran 
Selander <goran.selander@ericsson.com>, Stefanie Gerdes 
<gerdes@tzi.org>, Stefanie Gerdes <gerdes@tzi.org>, Ludwig Seitz 
<ludwig@sics.se>, Mehdi Mani <mehdi.mani@itron.com>


A new version of I-D, draft-ietf-ace-usecases-00.txt
has been successfully submitted by Ludwig Seitz and posted to the
IETF repository.

Name:		draft-ietf-ace-usecases
Revision:	00
Title:		ACE use cases
Document date:	2014-12-02
Group:		ace
Pages:		24
URL: 
http://www.ietf.org/internet-drafts/draft-ietf-ace-usecases-00.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/
Htmlized:       http://tools.ietf.org/html/draft-ietf-ace-usecases-00


Abstract:
    Constrained devices are nodes with limited processing power, storage
    space and transmission capacities.  These devices in many cases do
    not provide user interfaces and are often intended to interact
    without human intervention.

    This document comprises a collection of representative use cases for
    the application of authentication and authorization in constrained
    environments.  These use cases aim at identifying authorization
    problems that arise during the lifecylce of a constrained device and
    are intended to provide a guideline for developing a comprehensive
    authentication and access control solution for this class of
    scenarios.

    Where specific details are relevant, it is assumed that the devices
    use the Constrained Application Protocol (CoAP) as communication
    protocol, however most conclusions apply generally.

 



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat