Action-90 Review

ACTION-90 [1] - Review Action 77 snapshot (document is at
http://tinyurl.com/yjpbyf 

Please find below suggestions to fix typos, grammar and spaces. I
request other editors to review Action 77 snapshot at
http://tinyurl.com/yjpbyf  

[1] http://www.w3.org/2005/06/tracker/wspolicyeds/actions/90 

Regards,
 
Asir S Vedamuthu
Microsoft Corporation


----- Notation Used -----

s/Mary/Marie/ Change most recent occurrence of "Mary" to "Marie". The
old string is currently treated as a literal string -- not a regex. 

s/Mary/Marie/G Change all previous and future occurrences of "Mary" to
"Marie" (within this document).


----- Typos, Grammar and Spaces for Action 77 -----

Table of Contents:

s/parameters vs nesting/parameters vs. nesting/


1. Introduction

s/consistent compinations/consistent combinations/
s/metadata exxpression/metadata expression/
s/Web Services Policy 1.5 - Guidelines for Policy Assertion Authors is a
resource primarily for assertion authors that provides guidelines on the
use of Web/Web Services Policy 1.5 - Guidelines for Policy Assertion
Authors is a resource primarily for assertion authors and provides
guidelines on the use of Web/


3.1.1 WS-Policy Authors

s/WS-SecurityPolicy pecification/WS-SecurityPolicy specification/


3.1.3 Providers

s/policies it is uesful/policies it is useful/


4. General Guidelines for WS-Policy Assertion Authors

s/validation in their desgin/validation in their design/
s/relies on the Qname/relies on the QName/
s/provides somes/provides some/


4.1 Assertions and Their Target Use

s/Once the range of policy subjects are/Once the range of policy
subjects is/
s/A eferencing mechanism/A referencing mechanism/


4.2 Authoring Styles

s/the @optional attribute/the wsp:optional attribute/


4.3.1 Minimal Approach

s/a way that eflects/a way that effects/


4.3.3 Self Describing Messages

s/when messages can not/when messages cannot/ 
s/Best practice:Policy/Best practice: Policy/


4.3.4 Single Domains

s/some might say its/some might say it is/


4.4.2 Nested Assertions

s/Thesp:AlgorithmSuite assertion/The sp:AlgorithmSuite assertion/
s/Setting aside the details of using transport-level security,,/Setting
aside the details of using transport-level security,/


4.4.3 Considerations for choosing parameters vs. nesting

s/for selecting parameters or nesting of assertions,/for selecting
parameters or nesting of assertions/


4.5.1 Optional behavior in Compact authoring

s/using wsp:optional attribute/using wsp:Optional attribute/


4.5.2 Optional behavior at runtime

s/Note that in order for an optional behaviors to be engaged/Note that
in order for an optional behavior to be engaged/
s/[4.3.3 Self Describing Messages ]/[4.3.3 Self Describing Messages]/
s/specific endpoint when optional behavior is engaged ./specific
endpoint when optional behavior is engaged./
s/Leaving the semantics undescribed/Leaving the semantics not or under
specified/
s/policy assertion authors should consider to describe/policy assertion
authors should consider describing/
s/See also 4.3.3 Self Describing Messages . /See also 4.3.3 Self
Describing Messages./


4.6 Typing Assertions

s/(endpoints) or artifacts ( messages)/(endpoints) or artifacts
(messages)/
s/indicates which Qnames/indicates which QNames/


4.7 Levels of Abstraction in WSDL

s/This resulted in the finer granularity of the assertion to apply at
the message policy subject, but the assertion semantics also indicates
that the if the senders choose to engage RM semantics (although not
specified via attachment in WSDL at incoming messages), the providers
will honor the engagement of RM./This resulted in the finer granularity
of the assertion to apply at the message policy subject, but the
assertion semantics also indicates that if a sender chose to engage RM
semantics (although not specified via attachment in WSDL at incoming
messages), the providers will honor the engagement of RM./

 
6. Inter-domain Policy and Composition Issues

s/, utilization of WS-Security Policy with other protocols affect/,
utilization of WS-Security Policy with other protocols affects/


7.3 Appropriate Attachment: Identifying Assertion Sources

s/( in WSDL, the source/(in WSDL, the source/
s/( using WS-Trust)/(using WS-Trust)/


8. Scenario and a worked example

s/CompanyA/Company A/G
s/( Policy, All and ExactlyOne)/(Policy, All and ExactlyOne)/
s/ProfileA/Profile A/G
s/( not expanded)/(not expanded)/
s/Since CompanyA has decided to use well known policy expressions that
are themselves part of a specification/Since CompanyA has decided to use
well known policy expressions that are part of a specification/

Received on Thursday, 30 November 2006 02:11:07 UTC