This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 240 lines
!!! Overview
[{$pagename}] ([ACE]) is an [IETF] [Working Group] which works to developed protocols for use in [Constrained environments|Constrained Networks], where network nodes are limited in CPU, memory and power.
[REST] architecture is widely used for such constrained environments.
However it has been observed that Internet protocols can be applied to these constrained environments, often only requiring minor tweaking and profiling. In other cases, new protocols have been defined to address the specific requirements of constrained environments. An example of such a protocol is the [Constrained Application Protocol] ([CoAP]).
Authentication and Authorization for Constrained Environments (ACE) using the [OAuth 2.0] [Framework] ([ACE-OAuth])
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]