ACE use cases
draft-seitz-ace-usecases-02

Document Type Replaced Internet-Draft (individual)
Last updated 2014-10-27
Replaced by draft-ietf-ace-usecases
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-ace-usecases
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-seitz-ace-usecases-02.txt

Abstract

Constrained devices are nodes with limited processing power, storage space and transmission capacities. These devices in many cases do not provide user interfaces and are often intended to interact without human intervention. This document comprises a collection of representative use cases for the application of authentication and authorization in constrained environments. These use cases aim at identifying authorization problems that arise during the lifecylce of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and access control solution for this class of scenarios. Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as communication protocol, however most conclusions apply generally.

Authors

Ludwig Seitz (ludwig@sics.se)
Stefanie Gerdes (gerdes@tzi.org)
Göran Selander (goran.selander@ericsson.com)
Mehdi Mani (mehdi.mani@itron.com)
Sandeep Kumar (sandeep.kumar@philips.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)