[Ace] Fwd: New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt

Stefanie Gerdes <gerdes@tzi.de> Wed, 08 July 2015 10:45 UTC

Return-Path: <gerdes@tzi.de>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FFCD1B3439 for <ace@ietfa.amsl.com>; Wed, 8 Jul 2015 03:45:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.55
X-Spam-Level:
X-Spam-Status: No, score=-1.55 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wc2rqP05B_AX for <ace@ietfa.amsl.com>; Wed, 8 Jul 2015 03:45:16 -0700 (PDT)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01CCA1B343D for <Ace@ietf.org>; Wed, 8 Jul 2015 03:45:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [134.102.201.11]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id t68Aj51I016588; Wed, 8 Jul 2015 12:45:06 +0200 (CEST)
Received: from [IPv6:2001:638:708:30da:4c7:f948:fd9a:8102] (unknown [IPv6:2001:638:708:30da:4c7:f948:fd9a:8102]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3mRHMj45Mmz3GJb; Wed, 8 Jul 2015 12:45:05 +0200 (CEST)
Message-ID: <559CFF31.4070201@tzi.de>
Date: Wed, 08 Jul 2015 12:45:05 +0200
From: Stefanie Gerdes <gerdes@tzi.de>
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "Ace@ietf.org" <Ace@ietf.org>
References: <20150706230021.15054.17580.idtracker@ietfa.amsl.com>
In-Reply-To: <20150706230021.15054.17580.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20150706230021.15054.17580.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/HIFUKVSyrDgztr2jJszXtUqc7iQ>
Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Kepeng Li <kepeng.lkp@alibaba-inc.com>
Subject: [Ace] Fwd: New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jul 2015 10:45:18 -0000

Hi all,

we submitted a draft that will list examples for using DCAF with
well-known protocols on the less constrained level. We started with an
example that illustrates how DCAF can be used with OpenID Connect.

Please refer to the PDF version [1] for illustrations.

We would like to present this draft during the ACE Meeting in Prague.
Could the chairs please reserve a slot for us?

Thanks,
Steffi

[1] https://tools.ietf.org/pdf/draft-gerdes-ace-dcaf-examples-00.pdf


-------- Forwarded Message --------
Subject: New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt
Date: Mon, 06 Jul 2015 16:00:21 -0700
From: internet-drafts@ietf.org
To: Dr. Carsten Bormann <cabo@tzi.org>, Stefanie Gerdes
<gerdes@tzi.org>, Olaf Bergmann <bergmann@tzi.org>, Stefanie Gerdes
<gerdes@tzi.org>, Olaf Bergmann <bergmann@tzi.org>, Carsten Bormann
<cabo@tzi.org>


A new version of I-D, draft-gerdes-ace-dcaf-examples-00.txt
has been successfully submitted by Stefanie Gerdes and posted to the
IETF repository.

Name:		draft-gerdes-ace-dcaf-examples
Revision:	00
Title:		Examples for Using DCAF with less constrained devices
Document date:	2015-07-06
Group:		Individual Submission
Pages:		5
URL:
https://www.ietf.org/internet-drafts/draft-gerdes-ace-dcaf-examples-00.txt
Status:
https://datatracker.ietf.org/doc/draft-gerdes-ace-dcaf-examples/
Htmlized:
https://tools.ietf.org/html/draft-gerdes-ace-dcaf-examples-00


Abstract:
   Constrained nodes are devices which are limited in terms of
   processing power, memory, non-volatile storage and transmission
   capacity.  Due to these constraints, commonly used security protocols
   are not easily applicable.  Nevertheless, an authentication and
   authorization solution is needed to ensure the security of these
   devices.

   The Delegated CoAP Authorization Framework (DCAF) specifies how
   resource-constrained nodes can delegate defined authentication- and
   authorization-related tasks to less-constrained devices called
   Authorization Managers, thus limiting the hardware requirements of
   the security solution for the constrained devices.

   To realize the vision of "one Internet for all", constrained devices
   need to securely establish trust relationships with less constrained
   devices.  This document lists examples for using DCAF with less
   constrained devices.





Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat