References
- IETF Constrained RESTful Environments (core) Working Group. (http://datatracker.ietf.org/wg/core/)
- Z. Shelby, et. al., "The Constrained Application Protocol," IETF RFC7252, June 2014.
- H. Tschofenig, et. al., "Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things," IETF RFC 7925, July 2016
- C. Bormann, et. al., "Terminology for Constrained-Node Networks," IETF RFC7228, May 2014.
- G. Selander, et. al., "Requirements for CoAP End-To-End Security," IETF draft, July 6, 2016
- A. Rahman, et. al., "Group Communication for the Constrained Application Protocol (CoAP)," IETF RFC 7390, October, 2014
- S. Keoh, et. al., "DTLS-based Multicast Security in Constrained Environments," IETF draft, July 03, 2014
- A. Somaraju, et. al., "Security for Low-Latency Group Communication," IETF draft, January 15, 2016
- K. Hartke, "Observing Resources in the Constrained Application Protocol (CoAP)," IETF RFC 7641, September, 2015
- C. Bormann, et. al., "Block-Wise Transfers in the Constrained Application Protocol (CoAP)," IETF RFC 7959, August, 2016
- C. Bormann, et. al., "Concise Binary Object Representation (CBOR)," IETF RFC 7049, October 2013
- CBORE Object Signing and Encryption (COSE) Working Group. (http://datatracker.ietf.org/wg/cose/)
- G. Selander, et. al., "Object Security of CoAP (OSCOAP)," IETF draft, October 11, 2016
- Authentication and Authorization for Constrained Environments (ace) Working Group. (http://datatracker.ietf.org/wg/ace/)
- L. Seitz, et. al., "Use Cases for Authentication and Authorization," IETF RFC 7744, January 2016
- S. Gerdes, et, al., "An architecture for authorization in constrained environments," IETF draft, August 31, 2016
- E. Wahlstroem, et, al., "CBOR Web Token (CWT)," IETF draft, July 7, 2016