A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Authorization-Related Tasks in Constrained Environments Author : Stefanie Gerdes Filename : draft-gerdes-ace-tasks-00.txt Pages : 20 Date : 2015-09-29 Abstract: Constrained nodes are small devices which are limited in terms of processing power, memory, non-volatile storage and transmission capacity. Due to these constraints, commonly used security protocols are not easily applicable. Nevertheless, an authentication and authorization solution is needed to ensure the security of these devices. Due to the limitations of the constrained nodes it is especially important to develop a light-weight security solution which is adjusted to the relevant security objectives of each participating party in this environment. Necessary security measures must be identified and applied where needed. In this document, the required security related tasks are identified as guidance for the development of authentication and authorization solutions for constrained environments. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-gerdes-ace-tasks/ There's also a htmlized version available at: https://tools.ietf.org/html/draft-gerdes-ace-tasks-00 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ I-D-Announce mailing list I-D-Announce@ietf.org https://www.ietf.org/mailman/listinfo/i-d-announce Internet-Draft directories: http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt