%% You should probably cite draft-ietf-ace-actors instead of this I-D. @techreport{gerdes-ace-actors-00, number = {draft-gerdes-ace-actors-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-gerdes-ace-actors/00/}, author = {Stefanie Gerdes}, title = {{Actors in the ACE Architecture}}, pagetotal = 8, year = 2014, month = may, day = 30, abstract = {Constrained nodes are small devices which are limited in terms of processing power, memory, non-volatile storage and transmission capacity. Due to these constraints, commonly used security protocols are not easily applicable. Nevertheless, an authentication and authorization solution is needed to ensure the security of these devices. This document defines actors in the security architecture for authentication and authorization, analyzes the relationships between them, and describes their respective tasks and characteristics. This knowledge will then be used to derive requirements for the communication between the actors.}, }