@techreport{tschofenig-ace-overview-00, number = {draft-tschofenig-ace-overview-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-tschofenig-ace-overview/00/}, author = {Hannes Tschofenig}, title = {{Authentication and Authorization for Constrained Environments (ACE): Overview of Existing Security Protocols}}, pagetotal = 16, year = 2014, month = feb, day = 14, abstract = {This document surveys existing three party authentication and authorization protocols for use with Internet of Things use cases. The discussed protocol frameworks are Kerberos, OAuth, ABFAB, and the certificate model. The aim is to understand whether any of the available standardized security protocols are re-usable for constrained environments. A future version of this document will provide a more detailed analysis against the requirements.}, }