@techreport{greevenbosch-ace-pull-model-01, number = {draft-greevenbosch-ace-pull-model-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-greevenbosch-ace-pull-model/01/}, author = {Bert Greevenbosch and ana.hedanping@huawei.com and Dacheng Zhang and Ruinan Sun}, title = {{ACE Pull Model}}, pagetotal = 12, year = 2014, month = dec, day = 16, abstract = {This specification defines a protocol which enables resource constrained nodes to perform authentication and authorization operations in a constrained environment. By using this protocol, a resource constrained node can delegate the authentication of communication peers and management of authorization information to a trusted third party with less severe limitations regarding processing power and memory. This specification is based on the pull model architecture.}, }