I-D Action: draft-seitz-ace-usecases-02.txt

internet-drafts@ietf.org Mon, 27 October 2014 10:04 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietfa.amsl.com
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C7C81A8F4A for <i-d-announce@ietfa.amsl.com>; Mon, 27 Oct 2014 03:04:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KjbEbC9FBDta for <i-d-announce@ietfa.amsl.com>; Mon, 27 Oct 2014 03:04:04 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 99C451A8F43 for <i-d-announce@ietf.org>; Mon, 27 Oct 2014 03:04:04 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-seitz-ace-usecases-02.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 5.6.4.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20141027100404.26117.23959.idtracker@ietfa.amsl.com>
Date: Mon, 27 Oct 2014 03:04:04 -0700
Archived-At: http://mailarchive.ietf.org/arch/msg/i-d-announce/PXdDcctm_QDLKM7xqYWLXufbC4Q
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: internet-drafts@ietf.org
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Oct 2014 10:04:11 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : ACE use cases
        Authors         : Ludwig Seitz
                          Stefanie Gerdes
                          Goeran Selander
                          Mehdi Mani
                          Sandeep S. Kumar
	Filename        : draft-seitz-ace-usecases-02.txt
	Pages           : 24
	Date            : 2014-10-27

Abstract:
   Constrained devices are nodes with limited processing power, storage
   space and transmission capacities.  These devices in many cases do
   not provide user interfaces and are often intended to interact
   without human intervention.

   This document comprises a collection of representative use cases for
   the application of authentication and authorization in constrained
   environments.  These use cases aim at identifying authorization
   problems that arise during the lifecylce of a constrained device and
   are intended to provide a guideline for developing a comprehensive
   authentication and access control solution for this class of
   scenarios.

   Where specific details are relevant, it is assumed that the devices
   use the Constrained Application Protocol (CoAP) as communication
   protocol, however most conclusions apply generally.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-seitz-ace-usecases/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-seitz-ace-usecases-02

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-seitz-ace-usecases-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/