[Ace] Fwd: New Version Notification for draft-seitz-ace-usecases-02.txt
Ludwig Seitz <ludwig@sics.se> Mon, 27 October 2014 10:11 UTC
Return-Path: <ludwig@sics.se>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E64C1A9033 for <ace@ietfa.amsl.com>; Mon, 27 Oct 2014 03:11:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.26
X-Spam-Level:
X-Spam-Status: No, score=-2.26 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sIIf4p9ySZ8n for <ace@ietfa.amsl.com>; Mon, 27 Oct 2014 03:11:08 -0700 (PDT)
Received: from outbox.sics.se (outbox.sics.se [193.10.64.137]) by ietfa.amsl.com (Postfix) with ESMTP id 1DAA21A901E for <ace@ietf.org>; Mon, 27 Oct 2014 03:11:08 -0700 (PDT)
Received: from e-mailfilter01.sunet.se (e-mailfilter01.sunet.se [192.36.171.201]) by outbox.sics.se (Postfix) with ESMTPS id 9DD15196F for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100 (CET)
Received: from letter.sics.se (letter.sics.se [193.10.64.6]) by e-mailfilter01.sunet.se (8.14.4/8.14.4/Debian-4) with ESMTP id s9RAB5RU025194 for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100
Received: from norm.sics.se (norm.sics.se [193.10.64.192]) by letter.sics.se (Postfix) with ESMTPS id E143240126 for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100 (CET)
Received: from [192.168.0.108] (unknown [85.235.11.178]) by norm.sics.se (Postfix) with ESMTPSA id 35F55A1 for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100 (CET)
Message-ID: <544E1A38.1070901@sics.se>
Date: Mon, 27 Oct 2014 11:11:04 +0100
From: Ludwig Seitz <ludwig@sics.se>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: "ace@ietf.org" <ace@ietf.org>
References: <20141027100404.26117.25685.idtracker@ietfa.amsl.com>
In-Reply-To: <20141027100404.26117.25685.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20141027100404.26117.25685.idtracker@ietfa.amsl.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="------------ms080106000102030809050207"
X-Bayes-Prob: 0.5 (Score 0, tokens from: outbound, outbound-sics-se:default, sics-se:default, base:default, @@RPTN)
X-p0f-Info: os=Solaris 10, link=Ethernet or modem
X-CanIt-Geo: ip=85.235.11.178; country=SE; region=Skåne; city=Lund; latitude=55.7028; longitude=13.1927; http://maps.google.com/maps?q=55.7028,13.1927&z=6
X-CanItPRO-Stream: outbound-sics-se:outbound (inherits from outbound-sics-se:default, sics-se:default, base:default)
X-Canit-Stats-ID: 09N8ab52G - 109897e974f1 - 20141027 (trained as not-spam)
X-Antispam-Training-Forget: https://canit.sunet.se/canit/b.php?i=09N8ab52G&m=109897e974f1&t=20141027&c=f
X-Antispam-Training-Nonspam: https://canit.sunet.se/canit/b.php?i=09N8ab52G&m=109897e974f1&t=20141027&c=n
X-Antispam-Training-Spam: https://canit.sunet.se/canit/b.php?i=09N8ab52G&m=109897e974f1&t=20141027&c=s
X-CanIt-Archive-Cluster: PfMRe/vJWMiXwM2YIH5BVExnUnw
X-Scanned-By: CanIt (www . roaringpenguin . com) on 192.36.171.201
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/EIE8X7QhnLVP3oFheIsoFDJgybs
Subject: [Ace] Fwd: New Version Notification for draft-seitz-ace-usecases-02.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Oct 2014 10:11:14 -0000
Hello, here is an updated version of our use-case draft. We have tried to integrate all comments we have received and we have also tried to simplify the document. Furthermore we have shifted focus from "requirements" (which some didn't like) to "authorization problems that need to be solved". The idea behind this change was to make the use cases even more solution independent, and just highlight the problems that solutions need to address. We also added two new use cases and expanded the smart metering use case. Regards, Ludwig Seitz -------- Forwarded Message -------- Subject: New Version Notification for draft-seitz-ace-usecases-02.txt Date: Mon, 27 Oct 2014 03:04:04 -0700 From: internet-drafts@ietf.org To: Mehdi Mani <mehdi.mani@itron.com>, Sandeep Kumar <sandeep.kumar@philips.com>, Goeran Selander <goran.selander@ericsson.com>, Sandeep S. Kumar <sandeep.kumar@philips.com>, Ludwig Seitz <ludwig@sics.se>, Goran Selander <goran.selander@ericsson.com>, Stefanie Gerdes <gerdes@tzi.org>, Stefanie Gerdes <gerdes@tzi.org>, Ludwig Seitz <ludwig@sics.se>, Mehdi Mani <mehdi.mani@itron.com> A new version of I-D, draft-seitz-ace-usecases-02.txt has been successfully submitted by Ludwig Seitz and posted to the IETF repository. Name: draft-seitz-ace-usecases Revision: 02 Title: ACE use cases Document date: 2014-10-27 Group: Individual Submission Pages: 24 URL: http://www.ietf.org/internet-drafts/draft-seitz-ace-usecases-02.txt Status: https://datatracker.ietf.org/doc/draft-seitz-ace-usecases/ Htmlized: http://tools.ietf.org/html/draft-seitz-ace-usecases-02 Diff: http://www.ietf.org/rfcdiff?url2=draft-seitz-ace-usecases-02 Abstract: Constrained devices are nodes with limited processing power, storage space and transmission capacities. These devices in many cases do not provide user interfaces and are often intended to interact without human intervention. This document comprises a collection of representative use cases for the application of authentication and authorization in constrained environments. These use cases aim at identifying authorization problems that arise during the lifecylce of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and access control solution for this class of scenarios. Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as communication protocol, however most conclusions apply generally. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat
- [Ace] Fwd: New Version Notification for draft-sei… Ludwig Seitz