I-D Action: draft-gerdes-ace-dcaf-examples-00.txt

internet-drafts@ietf.org Mon, 06 July 2015 23:00 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietfa.amsl.com
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5E791A0115 for <i-d-announce@ietfa.amsl.com>; Mon, 6 Jul 2015 16:00:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K3g2EjY7f913 for <i-d-announce@ietfa.amsl.com>; Mon, 6 Jul 2015 16:00:21 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D7531A00EE for <i-d-announce@ietf.org>; Mon, 6 Jul 2015 16:00:21 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-gerdes-ace-dcaf-examples-00.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 6.0.4.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150706230021.15054.26650.idtracker@ietfa.amsl.com>
Date: Mon, 06 Jul 2015 16:00:21 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/i-d-announce/9QeD5SF09DnSxdlNNPC7hm4k6zU>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: internet-drafts@ietf.org
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2015 23:00:22 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Examples for Using DCAF with less constrained devices
        Authors         : Stefanie Gerdes
                          Olaf Bergmann
                          Carsten Bormann
	Filename        : draft-gerdes-ace-dcaf-examples-00.txt
	Pages           : 5
	Date            : 2015-07-06

Abstract:
   Constrained nodes are devices which are limited in terms of
   processing power, memory, non-volatile storage and transmission
   capacity.  Due to these constraints, commonly used security protocols
   are not easily applicable.  Nevertheless, an authentication and
   authorization solution is needed to ensure the security of these
   devices.

   The Delegated CoAP Authorization Framework (DCAF) specifies how
   resource-constrained nodes can delegate defined authentication- and
   authorization-related tasks to less-constrained devices called
   Authorization Managers, thus limiting the hardware requirements of
   the security solution for the constrained devices.

   To realize the vision of "one Internet for all", constrained devices
   need to securely establish trust relationships with less constrained
   devices.  This document lists examples for using DCAF with less
   constrained devices.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-gerdes-ace-dcaf-examples/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-gerdes-ace-dcaf-examples-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/