Skip to main content

References from draft-ietf-ace-actors

These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
draft-hardjono-oauth-umacore User-Managed Access (UMA) Profile of OAuth 2.0
References Referenced by
informatively references
draft-ietf-core-coap-pubsub A publish-subscribe architecture for the Constrained Application Protocol (CoAP)
References Referenced by
informatively references
draft-ietf-core-object-security Object Security for Constrained RESTful Environments (OSCORE)
References Referenced by
Proposed Standard informatively references
draft-irtf-t2trg-iot-seccons Internet of Things (IoT) Security: State of the Art and Challenges
References Referenced by
Informational informatively references
FYI 36
References Referenced by
informatively references
RFC 4120 The Kerberos Network Authentication Service (V5)
References Referenced by
Proposed Standard informatively references
RFC 4949 Internet Security Glossary, Version 2
References Referenced by
Informational informatively references
RFC 6347 Datagram Transport Layer Security Version 1.2
References Referenced by
Proposed Standard informatively references
RFC 6749 The OAuth 2.0 Authorization Framework
References Referenced by
Proposed Standard informatively references
RFC 7228 Terminology for Constrained-Node Networks
References Referenced by
Informational informatively references
RFC 7230 Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing
References Referenced by
Proposed Standard informatively references
RFC 7231 Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
References Referenced by
Proposed Standard informatively references
RFC 7252 The Constrained Application Protocol (CoAP)
References Referenced by
Proposed Standard informatively references
RFC 7744 Use Cases for Authentication and Authorization in Constrained Environments
References Referenced by
Informational informatively references
RFC 8246 HTTP Immutable Responses
References Referenced by
Proposed Standard informatively references