%% You should probably cite draft-selander-core-access-control-02 instead of this revision. @techreport{selander-core-access-control-01, number = {draft-selander-core-access-control-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-selander-core-access-control/01/}, author = {Göran Selander and Mohit Sethi and Ludwig Seitz}, title = {{Access Control Framework for Constrained Environments}}, pagetotal = 20, year = 2013, month = oct, day = 21, abstract = {The Constrained Application Protocol (CoAP) is a light-weight web transfer protocol designed to be used in constrained nodes and constrained networks. Communication security support for CoAP, including authentication, encryption, integrity protection, is specified by means of a DTLS binding for CoAP, but authorization and access control are not described in detail. This document describes a generic and dynamic access control framework suitable for constrained environments e.g. using CoAP. The framework builds on standards and well known paradigms for access control, externalizing authorization decision making to unconstrained nodes while performing authorization decision enforcement and verification of local conditions in constrained devices.}, }