@techreport{gerdes-ace-dcaf-authorize-04, number = {draft-gerdes-ace-dcaf-authorize-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-gerdes-ace-dcaf-authorize/04/}, author = {Stefanie Gerdes and Olaf Bergmann and Carsten Bormann}, title = {{Delegated CoAP Authentication and Authorization Framework (DCAF)}}, pagetotal = 46, year = 2015, month = oct, day = 19, abstract = {This specification defines a protocol for delegating client authentication and authorization in a constrained environment for establishing a Datagram Transport Layer Security (DTLS) channel between resource-constrained nodes. The protocol relies on DTLS to transfer authorization information and shared secrets for symmetric cryptography between entities in a constrained network. A resource- constrained node can use this protocol to delegate authentication of communication peers and management of authorization information to a trusted host with less severe limitations regarding processing power and memory.}, }