Authentication and Authorization for Constrained Environments BOF WEDNESDAY, March 5, 2014 0900-1130 GMT Room: Balmoral BOF Chairs: - Kepeng Li - Hannes Tschofenig Agenda: 1. Constrained Node Networks - 15 min Presenter: Carsten Bormann. 2. Use Cases and Requirements - 30 min http://datatracker.ietf.org/doc/draft-seitz-ace-usecases/ http://tools.ietf.org/id/draft-garcia-core-security http://tools.ietf.org/id/draft-greevenbosch-core-authreq Presenter: Ludwig Seitz. 3. Architectural Design Choices - 30 min http://datatracker.ietf.org/doc/draft-seitz-ace-design-considerations/ Presenter: Goran Selander. 4. Gap Analysis - 30 min http://datatracker.ietf.org/doc/draft-tschofenig-ace-overview/ Presenter: Hannes Tschofenig. 5. Charter Discussion (Chairs) - 45 min http://trac.tools.ietf.org/wg/core/trac/wiki/ACE_charter Presenter: Chairs