[Ace] ace - Requested session has been scheduled for IETF 106

"\"IETF Secretariat\"" <agenda@ietf.org> Fri, 25 October 2019 21:12 UTC

Return-Path: <agenda@ietf.org>
X-Original-To: ace@ietf.org
Delivered-To: ace@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CF5681209D2; Fri, 25 Oct 2019 14:12:16 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Secretariat\"" <agenda@ietf.org>
To: ietf@augustcellars.com, ace-chairs@ietf.org
Cc: kaduk@mit.edu, ace@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.108.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <157203793684.2724.3227595647367376701.idtracker@ietfa.amsl.com>
Date: Fri, 25 Oct 2019 14:12:16 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/rPn0zmp_AM2Ti5xjp6wO47DubcQ>
Subject: [Ace] ace - Requested session has been scheduled for IETF 106
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Oct 2019 21:14:09 -0000

Dear Jim Schaad,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 


    ace Session 1 (1:30 requested)
    Tuesday, 19 November 2019, Afternoon Session II 1520-1650
    Room Name: Olivia size: 150
    ---------------------------------------------


iCalendar: https://datatracker.ietf.org/meeting/106/sessions/ace.ics

Request Information:


---------------------------------------------------------
Working Group Name: Authentication and Authorization for Constrained Environments
Area Name: Security Area
Session Requester: Jim Schaad

Number of Sessions: 1
Length of Session(s):  1.5 Hours
Number of Attendees: 50
Conflicts to Avoid: 
 Chair Conflict: ipsecme saag tls secdispatch cbor core lamps cose
 Technology Overlap: teep homenet cfrg lwig emu t2trg suit oauth
 Key Participant Conflict: anima 6tisch gendispatch


People who must be present:
  Daniel Migault
  Jim Schaad
  Benjamin Kaduk

Resources Requested:

Special Requests:
  
---------------------------------------------------------