[Ace] Fwd: New Version Notification for draft-seitz-ace-usecases-02.txt

Ludwig Seitz <ludwig@sics.se> Mon, 27 October 2014 10:11 UTC

Return-Path: <ludwig@sics.se>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E64C1A9033 for <ace@ietfa.amsl.com>; Mon, 27 Oct 2014 03:11:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.26
X-Spam-Level:
X-Spam-Status: No, score=-2.26 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sIIf4p9ySZ8n for <ace@ietfa.amsl.com>; Mon, 27 Oct 2014 03:11:08 -0700 (PDT)
Received: from outbox.sics.se (outbox.sics.se [193.10.64.137]) by ietfa.amsl.com (Postfix) with ESMTP id 1DAA21A901E for <ace@ietf.org>; Mon, 27 Oct 2014 03:11:08 -0700 (PDT)
Received: from e-mailfilter01.sunet.se (e-mailfilter01.sunet.se [192.36.171.201]) by outbox.sics.se (Postfix) with ESMTPS id 9DD15196F for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100 (CET)
Received: from letter.sics.se (letter.sics.se [193.10.64.6]) by e-mailfilter01.sunet.se (8.14.4/8.14.4/Debian-4) with ESMTP id s9RAB5RU025194 for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100
Received: from norm.sics.se (norm.sics.se [193.10.64.192]) by letter.sics.se (Postfix) with ESMTPS id E143240126 for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100 (CET)
Received: from [192.168.0.108] (unknown [85.235.11.178]) by norm.sics.se (Postfix) with ESMTPSA id 35F55A1 for <ace@ietf.org>; Mon, 27 Oct 2014 11:11:05 +0100 (CET)
Message-ID: <544E1A38.1070901@sics.se>
Date: Mon, 27 Oct 2014 11:11:04 +0100
From: Ludwig Seitz <ludwig@sics.se>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: "ace@ietf.org" <ace@ietf.org>
References: <20141027100404.26117.25685.idtracker@ietfa.amsl.com>
In-Reply-To: <20141027100404.26117.25685.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20141027100404.26117.25685.idtracker@ietfa.amsl.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="------------ms080106000102030809050207"
X-Bayes-Prob: 0.5 (Score 0, tokens from: outbound, outbound-sics-se:default, sics-se:default, base:default, @@RPTN)
X-p0f-Info: os=Solaris 10, link=Ethernet or modem
X-CanIt-Geo: ip=85.235.11.178; country=SE; region=Skåne; city=Lund; latitude=55.7028; longitude=13.1927; http://maps.google.com/maps?q=55.7028,13.1927&z=6
X-CanItPRO-Stream: outbound-sics-se:outbound (inherits from outbound-sics-se:default, sics-se:default, base:default)
X-Canit-Stats-ID: 09N8ab52G - 109897e974f1 - 20141027 (trained as not-spam)
X-Antispam-Training-Forget: https://canit.sunet.se/canit/b.php?i=09N8ab52G&m=109897e974f1&t=20141027&c=f
X-Antispam-Training-Nonspam: https://canit.sunet.se/canit/b.php?i=09N8ab52G&m=109897e974f1&t=20141027&c=n
X-Antispam-Training-Spam: https://canit.sunet.se/canit/b.php?i=09N8ab52G&m=109897e974f1&t=20141027&c=s
X-CanIt-Archive-Cluster: PfMRe/vJWMiXwM2YIH5BVExnUnw
X-Scanned-By: CanIt (www . roaringpenguin . com) on 192.36.171.201
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/EIE8X7QhnLVP3oFheIsoFDJgybs
Subject: [Ace] Fwd: New Version Notification for draft-seitz-ace-usecases-02.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Oct 2014 10:11:14 -0000

Hello,

here is an updated version of our use-case draft. We have tried to 
integrate all comments we have received and we have also tried to 
simplify the document. Furthermore we have shifted focus from 
"requirements" (which some didn't like) to "authorization problems that 
need to be solved". The idea behind this change was to make the use 
cases even more solution independent, and just highlight the problems 
that solutions need to address.

We also added two new use cases and expanded the smart metering use case.


Regards,

Ludwig Seitz


-------- Forwarded Message --------
Subject: New Version Notification for draft-seitz-ace-usecases-02.txt
Date: Mon, 27 Oct 2014 03:04:04 -0700
From: internet-drafts@ietf.org
To: Mehdi Mani <mehdi.mani@itron.com>, Sandeep Kumar 
<sandeep.kumar@philips.com>, Goeran Selander 
<goran.selander@ericsson.com>, Sandeep S. Kumar 
<sandeep.kumar@philips.com>, Ludwig Seitz <ludwig@sics.se>, Goran 
Selander <goran.selander@ericsson.com>, Stefanie Gerdes 
<gerdes@tzi.org>, Stefanie Gerdes <gerdes@tzi.org>, Ludwig Seitz 
<ludwig@sics.se>, Mehdi Mani <mehdi.mani@itron.com>


A new version of I-D, draft-seitz-ace-usecases-02.txt
has been successfully submitted by Ludwig Seitz and posted to the
IETF repository.

Name:		draft-seitz-ace-usecases
Revision:	02
Title:		ACE use cases
Document date:	2014-10-27
Group:		Individual Submission
Pages:		24
URL: 
http://www.ietf.org/internet-drafts/draft-seitz-ace-usecases-02.txt
Status:         https://datatracker.ietf.org/doc/draft-seitz-ace-usecases/
Htmlized:       http://tools.ietf.org/html/draft-seitz-ace-usecases-02
Diff:           http://www.ietf.org/rfcdiff?url2=draft-seitz-ace-usecases-02

Abstract:
    Constrained devices are nodes with limited processing power, storage
    space and transmission capacities.  These devices in many cases do
    not provide user interfaces and are often intended to interact
    without human intervention.

    This document comprises a collection of representative use cases for
    the application of authentication and authorization in constrained
    environments.  These use cases aim at identifying authorization
    problems that arise during the lifecylce of a constrained device and
    are intended to provide a guideline for developing a comprehensive
    authentication and access control solution for this class of
    scenarios.

    Where specific details are relevant, it is assumed that the devices
    use the Constrained Application Protocol (CoAP) as communication
    protocol, however most conclusions apply generally.

 



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat