@techreport{ietf-ace-actors-07, number = {draft-ietf-ace-actors-07}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-ace-actors/07/}, author = {Stefanie Gerdes and Ludwig Seitz and Göran Selander and Carsten Bormann}, title = {{An architecture for authorization in constrained environments}}, pagetotal = 31, year = 2018, month = oct, day = 22, abstract = {Constrained-node networks are networks where some nodes have severe constraints on code size, state memory, processing capabilities, user interface, power and communication bandwidth (RFC 7228). This document provides terminology, and identifies the elements that an architecture needs to address, providing a problem statement, for authentication and authorization in these networks.}, }