%% You should probably cite draft-ietf-ace-aif instead of this I-D. @techreport{bormann-core-ace-aif-05, number = {draft-bormann-core-ace-aif-05}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-bormann-core-ace-aif/05/}, author = {Carsten Bormann}, title = {{An Authorization Information Format (AIF) for ACE}}, pagetotal = 7, year = 2018, month = jan, day = 18, abstract = {Constrained Devices as they are used in the "Internet of Things" need security. One important element of this security is that devices in the Internet of Things need to be able to decide which operations requested of them should be considered authorized, need to ascertain that the authorization to request the operation does apply to the actual requester, and need to ascertain that other devices they place requests on are the ones they intended. On the ACE mailing list, an activity to create specifications for such authenticated authorization for constrained devices is contemplated, leading to protocol proposals such as {[}I-D.ietf-ace-dtls-authorize{]} or {[}I-D.seitz-ace-oscoap-profile{]}. One potential work item complementing this protocol work is an Authorization Information Format (AIF). This document provides a strawman for such a format that should enable further discussion of the objectives for its development.}, }