Re: [Ace] New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt

"Kepeng Li" <kepeng.lkp@alibaba-inc.com> Thu, 09 July 2015 16:15 UTC

Return-Path: <kepeng.lkp@alibaba-inc.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 023D61B2A54 for <ace@ietfa.amsl.com>; Thu, 9 Jul 2015 09:15:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.45
X-Spam-Level:
X-Spam-Status: No, score=0.45 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bOuszj_WDqMW for <ace@ietfa.amsl.com>; Thu, 9 Jul 2015 09:15:01 -0700 (PDT)
Received: from out4133-114.mail.aliyun.com (out4133-114.mail.aliyun.com [42.120.133.114]) by ietfa.amsl.com (Postfix) with ESMTP id 1F8081A004A for <Ace@ietf.org>; Thu, 9 Jul 2015 09:15:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1436458499; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type; bh=QiA3O5IczgVMkVtMIoRu1Mn/4VhfRYsdEcwkgB+ysc8=; b=fPs3EvQTVCaoKORGNnYPL7r6dTwPZCU/BLYgmT9AIm5hRez0ON+U8VwvJNj9qTaSFYIvx7eIZvwCgh+hTy1Uum/0b4HbwICTlBGAlmMc07huUo0SO7RZArG6ndZNbsMxBNXQDiR7wWS7hFdzPv7r3DHb93uZIaPxJt8fMPkIFdg=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R171e4; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03309; MF=kepeng.lkp@alibaba-inc.com; NM=1; PH=DS; RN=3; SR=0;
Received: from 10.22.39.206(mailfrom:kepeng.lkp@alibaba-inc.com ip:42.120.73.207) by smtp.aliyun-inc.com(127.0.0.1); Fri, 10 Jul 2015 00:14:56 +0800
User-Agent: Microsoft-MacOutlook/14.4.8.150116
Date: Fri, 10 Jul 2015 00:14:50 +0800
From: Kepeng Li <kepeng.lkp@alibaba-inc.com>
To: Stefanie Gerdes <gerdes@tzi.de>, "Ace@ietf.org" <Ace@ietf.org>
Message-ID: <D1C4BE88.11C1D%kepeng.lkp@alibaba-inc.com>
Thread-Topic: New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt
References: <20150706230021.15054.17580.idtracker@ietfa.amsl.com> <559CFF31.4070201@tzi.de>
In-Reply-To: <559CFF31.4070201@tzi.de>
Mime-version: 1.0
Content-type: text/plain; charset="GB2312"
Content-transfer-encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/pgTBqEXJIQK4VbQ4geL4oq1sjSg>
Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Subject: Re: [Ace] New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2015 16:15:03 -0000

Hi Steffi,

> We would like to present this draft during the ACE Meeting in Prague.
> Could the chairs please reserve a slot for us?


It is on the agenda now.

Please send us your slides.

Thanks,

Kind Regards
Kepeng

在 8/7/15 6:45 pm, "Stefanie Gerdes" <gerdes@tzi.de> 写入:

>Hi all,
>
>we submitted a draft that will list examples for using DCAF with
>well-known protocols on the less constrained level. We started with an
>example that illustrates how DCAF can be used with OpenID Connect.
>
>Please refer to the PDF version [1] for illustrations.
>
>We would like to present this draft during the ACE Meeting in Prague.
>Could the chairs please reserve a slot for us?
>
>Thanks,
>Steffi
>
>[1] https://tools.ietf.org/pdf/draft-gerdes-ace-dcaf-examples-00.pdf
>
>
>-------- Forwarded Message --------
>Subject: New Version Notification for
>draft-gerdes-ace-dcaf-examples-00.txt
>Date: Mon, 06 Jul 2015 16:00:21 -0700
>From: internet-drafts@ietf.org
>To: Dr. Carsten Bormann <cabo@tzi.org>, Stefanie Gerdes
><gerdes@tzi.org>, Olaf Bergmann <bergmann@tzi.org>, Stefanie Gerdes
><gerdes@tzi.org>, Olaf Bergmann <bergmann@tzi.org>, Carsten Bormann
><cabo@tzi.org>
>
>
>A new version of I-D, draft-gerdes-ace-dcaf-examples-00.txt
>has been successfully submitted by Stefanie Gerdes and posted to the
>IETF repository.
>
>Name:		draft-gerdes-ace-dcaf-examples
>Revision:	00
>Title:		Examples for Using DCAF with less constrained devices
>Document date:	2015-07-06
>Group:		Individual Submission
>Pages:		5
>URL:
>https://www.ietf.org/internet-drafts/draft-gerdes-ace-dcaf-examples-00.txt
>Status:
>https://datatracker.ietf.org/doc/draft-gerdes-ace-dcaf-examples/
>Htmlized:
>https://tools.ietf.org/html/draft-gerdes-ace-dcaf-examples-00
>
>
>Abstract:
>   Constrained nodes are devices which are limited in terms of
>   processing power, memory, non-volatile storage and transmission
>   capacity.  Due to these constraints, commonly used security protocols
>   are not easily applicable.  Nevertheless, an authentication and
>   authorization solution is needed to ensure the security of these
>   devices.
>
>   The Delegated CoAP Authorization Framework (DCAF) specifies how
>   resource-constrained nodes can delegate defined authentication- and
>   authorization-related tasks to less-constrained devices called
>   Authorization Managers, thus limiting the hardware requirements of
>   the security solution for the constrained devices.
>
>   To realize the vision of "one Internet for all", constrained devices
>   need to securely establish trust relationships with less constrained
>   devices.  This document lists examples for using DCAF with less
>   constrained devices.
>
>
>
>
>
>Please note that it may take a couple of minutes from the time of
>submission
>until the htmlized version and diff are available at tools.ietf.org.
>
>The IETF Secretariat
>
>
>