%% You should probably cite rfc7744 instead of this I-D. @techreport{ietf-ace-usecases-08, number = {draft-ietf-ace-usecases-08}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/08/}, author = {Ludwig Seitz and Stefanie Gerdes and Göran Selander and Mehdi Mani and Sandeep Kumar}, title = {{ACE use cases}}, pagetotal = 29, year = 2015, month = oct, day = 7, abstract = {Constrained devices are nodes with limited processing power, storage space and transmission capacities. These devices in many cases do not provide user interfaces and are often intended to interact without human intervention. This document includes a collection of representative use cases for authentication and authorization in constrained environments. These use cases aim at identifying authorization problems that arise during the lifecycle of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and authorization solution for this class of scenarios. Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as communication protocol, however most conclusions apply generally.}, }