I-D Action: draft-tschofenig-ace-overview-00.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Authentication and Authorization for Constrained Environments (ACE): Overview of Existing Security Protocols
        Author          : Hannes Tschofenig
	Filename        : draft-tschofenig-ace-overview-00.txt
	Pages           : 16
	Date            : 2014-02-14

Abstract:
   This document surveys existing three party authentication and
   authorization protocols for use with Internet of Things use cases.
   The discussed protocol frameworks are Kerberos, OAuth, ABFAB, and the
   certificate model.  The aim is to understand whether any of the
   available standardized security protocols are re-usable for
   constrained environments.  A future version of this document will
   provide a more detailed analysis against the requirements.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-tschofenig-ace-overview/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-tschofenig-ace-overview-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt




[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux