References to RFC 8392
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
draft-amsuess-t2trg-onion-coap |
Using onion routing with CoAP
References Referenced by |
normatively references | ||
draft-bormann-cbor-notable-tags |
Notable CBOR Tags
References Referenced by |
normatively references | ||
draft-ffm-rats-cca-token |
Arm's Confidential Compute Architecture Reference Attestation Token
References Referenced by |
normatively references | ||
draft-ietf-ace-authcred-dtls-profile |
Additional Formats of Authentication Credentials for the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)
References Referenced by |
normatively references | ||
draft-ietf-ace-coap-est-oscore |
Protecting EST Payloads with OSCORE
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-ace-coap-pubsub-profile |
CoAP Publish-Subscribe Profile for Authentication and Authorization for Constrained Environments (ACE)
References Referenced by |
normatively references | ||
draft-ietf-ace-edhoc-oscore-profile |
Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)
References Referenced by |
normatively references | ||
draft-ietf-ace-group-oscore-profile |
The Group Object Security for Constrained RESTful Environments (Group OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework
References Referenced by |
normatively references | ||
draft-ietf-ace-workflow-and-params |
Short Distribution Chain (SDC) Workflow and New OAuth Parameters for the Authentication and Authorization for Constrained Environments (ACE) Framework
References Referenced by |
normatively references | ||
draft-ietf-cdni-client-access-control-metadata |
CDNI Client Access Control Metadata
References Referenced by |
normatively references | ||
draft-ietf-jose-json-proof-token |
JSON Proof Token and CBOR Proof Token
References Referenced by |
normatively references | ||
draft-ietf-lake-authz |
Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)
References Referenced by |
normatively references | ||
draft-ietf-lake-edhoc-psk |
EDHOC Authenticated with Pre-Shared Keys (PSK)
References Referenced by |
normatively references | ||
draft-ietf-oauth-status-list |
Token Status List (TSL)
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-rats-ear |
EAT Attestation Results
References Referenced by |
normatively references | ||
draft-ietf-rats-epoch-markers |
Epoch Markers
References Referenced by |
normatively references | ||
draft-ietf-rats-posture-assessment |
Remote Posture Assessment for Systems, Containers, and Applications at Scale
References Referenced by |
normatively references | ||
draft-ietf-scitt-architecture |
An Architecture for Trustworthy and Transparent Digital Supply Chains
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-spice-oidc-cwt |
OpenID Connect Standard Claims Registration for CBOR Web Tokens
References Referenced by |
normatively references | ||
draft-ietf-spice-sd-cwt |
SPICE SD-CWT
References Referenced by |
normatively references | ||
draft-lemmons-cose-composite-claims |
Composite Token Claims
References Referenced by |
normatively references | ||
draft-pocero-authkem-edhoc |
KEM-based Authentication for EDHOC
References Referenced by |
normatively references | ||
draft-pocero-authkem-ikr-edhoc |
KEM-based Authentication for EDHOC in Initiator-Known Responder (IKR) Scenarios
References Referenced by |
normatively references | ||
draft-prorock-spice-cwt-traceability-claims |
Traceability Claims
References Referenced by |
normatively references | ||
draft-tiloca-ace-bidi-access-control |
Bidirectional Access Control in the Authentication and Authorization for Constrained Environments (ACE) Framework
References Referenced by |
normatively references | ||
draft-williams-netmod-lm-hierarchy-topology |
Hierarchical Topology for Language Model Coordination
References Referenced by |
normatively references | ||
RFC 8747 |
Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)
References Referenced by |
Proposed Standard | normatively references | |
RFC 9124 |
A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices
References Referenced by |
Informational | normatively references | |
RFC 9200 |
Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by |
Proposed Standard | normatively references | |
RFC 9202 |
Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)
References Referenced by |
Proposed Standard | normatively references | |
RFC 9203 |
The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework
References Referenced by |
Proposed Standard | normatively references | |
RFC 9334 |
Remote ATtestation procedureS (RATS) Architecture
References Referenced by |
Informational | normatively references | |
draft-baber-ianabis-rfc8126bis |
Guidelines for Writing an IANA Considerations Section in RFCs
References Referenced by |
Best Current Practice | informatively references | |
draft-bormann-cbor-edn-mapkey |
CBOR: Generating Numeric Map Labels from Textual EDN
References Referenced by |
informatively references | ||
draft-cds-rats-intel-corim-profile |
Intel Profile for Remote Attestation
References Referenced by |
informatively references | ||
draft-ietf-ace-key-groupcomm-oscore |
Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-ace-oscore-gm-admin |
Admin Interface for the OSCORE Group Manager
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-ace-oscore-gm-admin-coral |
Using the Constrained RESTful Application Language (CoRAL) with the Admin Interface for the OSCORE Group Manager
References Referenced by |
informatively references | ||
draft-ietf-anima-constrained-voucher |
Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-cbor-cde |
CBOR Common Deterministic Encoding (CDE)
References Referenced by |
Best Current Practice | informatively references | |
draft-ietf-core-observe-multicast-notifications |
Observe Notifications as CoAP Multicast Responses
References Referenced by |
informatively references | ||
draft-ietf-core-oscore-groupcomm |
Group Object Security for Constrained RESTful Environments (Group OSCORE)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-cose-merkle-tree-proofs |
COSE (CBOR Object Signing and Encryption) Receipts
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-emu-eap-edhoc |
Using the Extensible Authentication Protocol (EAP) with Ephemeral Diffie-Hellman over COSE (EDHOC)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-lake-edhoc-impl-cons |
Implementation Considerations for Ephemeral Diffie-Hellman Over COSE (EDHOC)
References Referenced by |
informatively references | ||
draft-ietf-lake-ra |
Remote attestation over EDHOC
References Referenced by |
informatively references | ||
draft-irtf-t2trg-rest-iot |
Guidance on RESTful Design for Internet of Things Systems
References Referenced by |
Informational | informatively references | |
draft-lenders-core-dnr |
Discovery of Network-designated OSCORE-based Resolvers: Problem Statement
References Referenced by |
informatively references | ||
draft-moskowitz-drip-stateless-nrid |
Secure UAS Stateless Network RID
References Referenced by |
informatively references | ||
draft-ritz-eca |
Ephemeral Compute Attestation (ECA) Protocol
References Referenced by |
informatively references | ||
draft-tiloca-core-oscore-discovery |
Discovery of OSCORE Groups with the CoRE Resource Directory
References Referenced by |
informatively references | ||
draft-wiethuechter-drip-det-tada |
Registration & Usage of DRIP Entity Tags for Trustworthy Air Domain Awareness
References Referenced by |
informatively references | ||
RFC 9191 |
Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods
References Referenced by |
Informational | informatively references | |
RFC 9360 |
CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates
References Referenced by |
Proposed Standard | informatively references | |
RFC 9431 |
Message Queuing Telemetry Transport (MQTT) and Transport Layer Security (TLS) Profile of Authentication and Authorization for Constrained Environments (ACE) Framework
References Referenced by |
Proposed Standard | informatively references |