2006/ws/policy ws-policy-guidelines.html,1.3,1.4

Update of /sources/public/2006/ws/policy
In directory hutz:/tmp/cvs-serv31927

Modified Files:
	ws-policy-guidelines.html 
Log Message:
apply Maryann's last two commits. 

Index: ws-policy-guidelines.html
===================================================================
RCS file: /sources/public/2006/ws/policy/ws-policy-guidelines.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- ws-policy-guidelines.html	14 Oct 2006 03:25:49 -0000	1.3
+++ ws-policy-guidelines.html	19 Oct 2006 23:53:35 -0000	1.4
@@ -1,4 +1,6 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html lang="en-US"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><title>Web Services Policy 1.5 - Guidelines for Policy Assertion Authors</title><style type="text/css">
+<!DOCTYPE html
+  PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<html lang="en-US"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><title>Web Services Policy 1.5 - Guidelines for Policy Assertion Authors</title><style type="text/css">
 code           { font-family: monospace; }
 
 div.constraint,
@@ -48,8 +50,11 @@
                     margin: 4px}
 </style><link rel="stylesheet" type="text/css" href="http://www.w3.org/StyleSheets/TR/base.css"><link rel="contents" href="#contents"></head><body><div class="head">
 <h1>Web Services Policy 1.5 - Guidelines for Policy Assertion Authors</h1>
-<h2>Editors' copy $Date$ @@ @@@@ @@@@</h2><dl><dt>This version:</dt><dd><a href="ws-policy-guidelines.html">ws-policy-guidelines.html</a></dd><dt>Latest version:</dt><dd><a href="http://dev.w3.org/cvsweb/~checkout~/2006/ws/policy/ws-policy-guidelines.html?content-type=text/html;charset=utf-8">http://dev.w3.org/cvsweb/~checkout~/2006/ws/policy/ws-policy-guidelines.html?content-type=text/html;charset=utf-8</a></dd><dt>Editors:</dt><dd>Maryann Hondo, IBM Corporation</dd><dd>Umit Yalcinalp, SAP AG.</dd></dl><p class="copyright"><a href="http://www.w3.org/Consortium/Legal/ipr-notice#Copyright">Copyright</a> © @@@@ <a href="http://www.w3.org/"><acronym title="World Wide Web Consortium">W3C</acronym></a><sup>®</sup> (<a href="http://www.csail.mit.edu/"><acronym title="Massachusetts Institute of Technology">MIT</acronym></a>, <a href="http://www.ercim.org/"><acronym title="European Research Consortium for Informatics and Mathematics">ERCIM</acronym></a>, <a href="http://www.keio.ac.jp/">Keio</a>), All Rights eserved. W3C <a href="http://www.w3.org/Consortium/Legal/ipr-notice#Legal_Disclaimer">liability</a>, <a href="http://www.w3.org/Consortium/Legal/ipr-notice#W3C_Trademarks">trademark</a> and <a href="http://www.w3.org/Consortium/Legal/copyright-documents">document use</a> rules apply.</p></div><hr><div>
-<h2><a name="abstract">Abstract</a></h2><p><em>Web Services Policy 1.5 - Guidelines for Policy Assertion Authors</em> is a
+<h2>Editors' copy $Date$ @@ @@@@ @@@@</h2><dl><dt>This version:</dt><dd>
+      <a href="ws-policy-guidelines.html">ws-policy-guidelines.html</a>
+    </dd><dt>Latest version:</dt><dd><a href="http://dev.w3.org/cvsweb/~checkout~/2006/ws/policy/ws-policy-guidelines.html?content-type=text/html;charset=utf-8">http://dev.w3.org/cvsweb/~checkout~/2006/ws/policy/ws-policy-guidelines.html?content-type=text/html;charset=utf-8</a></dd><dt>Editors:</dt><dd>Maryann Hondo, IBM Corporation</dd><dd>Umit Yalcinalp, SAP AG.</dd></dl><p class="copyright"><a href="http://www.w3.org/Consortium/Legal/ipr-notice#Copyright">Copyright</a>&nbsp;©&nbsp;@@@@&nbsp;<a href="http://www.w3.org/"><acronym title="World Wide Web Consortium">W3C</acronym></a><sup>®</sup> (<a href="http://www.csail.mit.edu/"><acronym title="Massachusetts Institute of Technology">MIT</acronym></a>, <a href="http://www.ercim.org/"><acronym title="European Research Consortium for Informatics and Mathematics">ERCIM</acronym></a>, <a href="http://www.keio.ac.jp/">Keio</a>), All Rights Reserved. W3C <a href="http://www.w3.org/Consortium/Legal/ipr-notice#Legal_Disclaimer">liability</a>, <a href="http://wwww3.org/Consortium/Legal/ipr-notice#W3C_Trademarks">trademark</a> and <a href="http://www.w3.org/Consortium/Legal/copyright-documents">document use</a> rules apply.</p></div><hr><div>
+<h2><a name="abstract">Abstract</a></h2><p>
+        <em>Web Services Policy 1.5 - Guidelines for Policy Assertion Authors</em> is a
         guideline for assertion authors that will work with the
         Web Services Policy 1.5 - Framework and Web Services Policy 1.5 - Attachment specifications to
         create domain specific assertions. The focus of this document
@@ -58,8 +63,8 @@
         best possible results for interoperability. It is a
         complementary guide to using the specifications. </p></div><div>
 <h2><a name="status">Status of this Document</a></h2><p><strong>This document is an editors' copy that has
-        no official standing.</strong></p><p /></div><hr><div class="toc">
-<h2><a name="contents">Table of Contents</a></h2><p class="toc">1. <a href="#introduction">Introduction</a><br>2. <a href="#Assertions">Basic Concepts: What is an Assertion</a><br>    2.1 <a href="#assertion-roles">Roles and Responsibilities in Utilizing Policy Assertions</a><br>        2.1.1 <a href="#domain-owners"> Domain Owners/WS-Policy Authors</a><br>        2.1.2 <a href="#consumers">Consumers</a><br>        2.1.3 <a href="#providers">Providers</a><br>3. <a href="#general-guidelines">General Guidelines for WS-Policy Assertion Authors</a><br>    3.1 <a href="#assertion-target">Assertions and Their Target Use</a><br>4. <a href="#compact-full">Authoring Styles </a><br>5. <a href="#modeling-guidelines">Guidelines for Modeling New Assertions</a><br>    5.1 <a href="#single-domains">Single Domains</a><br>    5.2 <a href="#new-domains">New Policy Domains</a><br>    5.3 <a href="#nested-assertions">Nested Assertions</a><br>    5.4 <a href="#parametrized-assertons">Assertions with Parameters</a><br>    5.5 <a href="#comparison">Comparison of Nested and Parametrized Assertions</a><br>    5.6 <a href="#self-describing"> Self Describing Messages </a><br>    5.7 <a href="#optional-policy-assertion">Optional Policy Assertion</a><br>    5.8 <a href="#considerations-for-intersection"> Considerations for Intersection and Merging </a><br>    5.9 <a href="#typing-assertions">Typing Assertions</a><br>    5.10 <a href="#subject-scoping-considerations">Subject Scoping Considerations</a><br>    5.11 <a href="#levels-of-abstraction">Levels of Abstraction in WSDL </a><br>    5.12 <a href="#lifecycle">Lifecycle of Assertions</a><br>        5.12.1 <a href="#Referencing_Policy_Expressions">Referencing Policy Expressions</a><br>        5.12.2 <a href="#extending-assertions"> Factors in Extending Assertions within a Domain </a><br>        5.12.3 <a href="#assertion-evolution">Evolution of Assertions (Versioning and Compatibility</a><br>6. <a href="#inter-policy">Inter-domain Policy and Composition Issues</a><br>7. <a href="#best-practices-attachment">Applying Best Practices for  Policy Attachment</a><br>    7.1 <a href="#context-free-policies">Appropriate Attachment: Preserving Context-Free Policies</a><br>    7.2 <a href="#appropriate-attachment-assertion-subjects">Appropriate Attachment: Identifying Assertion Subjects</a><br>        7.2.1 <a href="#interaction">Interaction between Subjects</a><br>    7.3 <a href="#identifying-assertion-sources">Appropriate Attachment: Identifying Assertion Sources </a><br>8. <a href="#scenerio">Scenario and a worked example</a><br></p>
+        no official standing.</strong></p><p></p></div><hr><div class="toc">
+<h2><a name="contents">Table of Contents</a></h2><p class="toc">1. <a href="#introduction">Introduction</a><br>2. <a href="#Assertions">Basic Concepts: What is an Assertion</a><br>&nbsp;&nbsp;&nbsp;&nbsp;2.1 <a href="#assertion-roles">Roles and Responsibilities in Utilizing Policy Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;2.1.1 <a href="#domain-owners"> WS-Policy Authors</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;2.1.2 <a href="#consumers">Consumers</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;2.1.3 <a href="#providers">Providers</a><br>3. <a href="#general-guidelines">General Guidelines for WS-Policy Assertion Authors</a><br>&nbsp;&nbsp;&nbsp;&nbsp;3.1 <a href="#assertion-target">Assertions and Their Target Use</a><br>4. <a href="#compact-full">Authoring Styles </a><br>5. <a href="#modeling-guidelines">Guidelines for Modeling New Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.1 <a href="#new-domains">New Policy Domains</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.2 <a href="single-domains">Single Domains</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.3 <a href="#nested-assertions">Nested Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.4 <a href="#parametrized-assertions">Assertions with Parameters</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.5 <a href="#comparison">Comparison of Nested and Parametrized Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.6 <a href="#self-describing"> Self Describing Messages </a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.7 <a href="#optional-policy-assertion">Optional Policy Assertion</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.8 <a href="#considerations-for-intersection"> Considerations for Intersection and Merging </a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.9 <a href="#typing-assertions">Typing Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.10 <a href="#levels-of-abstraction">Levels of Abstraction in WSDL </a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.11 <a href="#lifecycle">Lifecycle of Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;5.11.1 <a href="#Referencing_Policy_Expressions">Referencing Policy Expressios</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;5.11.2 <a href="#extending-assertions"> Factors in Extending Assertions within a Domain </a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;5.11.3 <a href="#assertion-evolution">Evolution of Assertions (Versioning and Compatibility)</a><br>6. <a href="#inter-policy">Inter-domain Policy and Composition Issues</a><br>7. <a href="#best-practices-attachment">Applying Best Practices for  Policy Attachment</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.1 <a href="#context-free-policies">Appropriate Attachment: Preserving Context-Free Policies</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.2 <a href="#appropriate-attachment-assertion-subjects">Appropriate Attachment: Identifying Assertion Subjects</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;7.2.1 <a href="#interaction">Interaction between Subjects</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.3 <a href="#identifying-assertion-sources">Appropriate Attachment: Identifying Assertion Sources </a><br>8. <a href="#scenerio">Scenario and a orked example</a><br></p>
 <h3><a name="appendix" id="appendix">Appendices</a></h3><p class="toc">A. <a href="#security-considerations">Security Considerations</a><br>B. <a href="#xml-namespaces">XML Namespaces</a><br>C. <a href="#references">References</a><br>D. <a href="#acknowledgments">Acknowledgements</a> (Non-Normative)<br>E. <a href="#change-description">Changes in this Version of
           the Document</a> (Non-Normative)<br>F. <a href="#change-log">Web Services Policy 1.5 - Guidelines for Policy Assertion Authors Change Log</a> (Non-Normative)<br></p></div><hr><div class="body"><div class="div1">
 <h2><a name="introduction"></a>1. Introduction</h2><p>WS-Policy specification defines a policy to be a collection
@@ -139,25 +144,32 @@
         </p><p>Below we capture some of the characteristics of the roles
         and responsibilities for the authors, consumers and providers.
         </p><div class="div3">
-<h4><a name="domain-owners"></a>2.1.1  Domain Owners/WS-Policy Authors</h4><p> WS-Policy Domain owners (or WS-Policy authors) are defined
+<h4><a name="domain-owners"></a>2.1.1  WS-Policy Authors</h4><p> WS-Policy Domain owners or WS-Policy authors are defined
         by the WS-Policy Framework to be a community that chooses to
         exploit the WS-Policy Framework by creating their own
         specification to define a set of assertions that express the
         capabilities and constraints of that target domain. The
         WS-Policy Framework is based on a declarative model, meaning
-        that it is incumbent on the WS-Policy authors to define the
+        that it is incumbent on the WS-Policy authors to define both the semantics of 
+        the assertions as well as the
         scope of their target domain in their specification. The set
-        of metadata will vary in the granularity of assertion
-        specification, and it is therefore important for WS-Policy
-        authors to clearly identify their scope (i.e, the variables of
-        the WS-ReliableMessaging specification). It is the intent of
-        this primer to help communities utilize the framework in such
+        of metadata for any particular domain will vary in the granularity of assertion
+        specification required.  It is the intent of
+        this document to help communities utilize the framework in such
         a way that multiple WS-Policy domains can co-exist and
         consumers and providers can utilize the framework consistently
         across domains.
-	</p><p>An example of this can be seen in the WS-SecurityPolicy
+	</p><p>In order to take advantage of the WS-Policy Framework, any
+        domain author attempting to define new WS-Policy assertions
+        must adhere to the MUST's and SHOULD's in the specifications
+        and should review the conformance section of the
+        specification. </p><p>WS-Policy Domain authors must also specify how to associate
+	the assertions they have defined with the policy subjects
+	identified by the WS-PolicyAttachment specification</p><p>An example of a domain specificatin that includes these properties 
+        can be seen in the WS-SecurityPolicy
         specification. The WS-Security authors have defined their
-        scope as follows: </p><p><em>"This document [WS-SecurityPolicy] defines a set of
+        scope as follows: </p><p>
+						<em>"This document [WS-SecurityPolicy] defines a set of
         security policy assertions for use with the WS-Policy
         framework with respect to security features provided in WSS:
         SOAP Message Security, WS-Trust and
@@ -170,19 +182,14 @@
         information for compatibility and interoperability to be
         determined by web service participants along with all
         information necessary to actually enable a participant to
-        engage in a secure exchange of messages." </em></p><p>In order to take advantage of the WS-Policy Framework, any
-        domain author attempting to define new WS-Policy assertions
-        must adhere to the MUST's and SHOULD's in the specifications
-        and should review the conformance section of the
-        specification. </p><p>WS-Policy Domain authors must also specify how to associate
-	the assertions they have defined with the policy subjects
-	identified by the WS-PolicyAttachment specification</p><p>An example of this is also provided by the WS-Security
+        engage in a secure exchange of messages." </em>
+					</p><p>An example of scoping individual assertions to policy subjects is also provided by the WS-Security
 	Policy specification in Appendix A.</p></div><div class="div3">
-<h4><a name="consumers"></a>2.1.2 Consumers</h4><p>Consumers of WS-Policy Assertions can be any entity that is
+<h4><a name="consumers"></a>2.1.2 Consumers</h4><p>A consumer of WS-Policy Assertions can be any entity that is
 	capable of parsing a WS-Policy xml element, and selecting one
-	alternative from the policy, that it then uses to govern its
-	creation of a message to send to the subject that advertised
-	the WS-Policy expression. The WS-Policy Attachment
+	alternative from the policy, that it then uses to govern the
+	creation of a message to send to the subject to which the policy alternative
+	was attached.  The WS-Policy Attachment
 	specification defines a set of attachment models for use with
 	common web service subjects: WSDL definitions, UDDI directory
 	entries, and WS-Addressing endpoints.
@@ -197,8 +204,8 @@
         expressed in a WS-Policy document and modifying their own
         configurations dynamically.
         </p></div><div class="div3">
-<h4><a name="providers"></a>2.1.3 Providers</h4><p>Providers of WS-Policy Assertions can be any web service
-	   implementation that can specify its on the wire message
+<h4><a name="providers"></a>2.1.3 Providers</h4><p>A provider of WS-Policy Assertions can be any web service
+	   implementation that can reflect its on the wire message
 	   behavior as an XML expression that conforms to the
 	   WS-PolicyFramework and WS-PolicyAssertions
 	   specifications. The WS-PolicyAttachment specification has
@@ -208,24 +215,21 @@
 	   constraints available, it may also need to conform to
 	   requirements of other policy specifications it utilizes (
 	   i.e., WS-SecurityPolicy).
-           </p><p>Also it is useful for providers to take into account how
-           to evolve their services capabilities.  If forward
+           </p><p>Whe deploying services with policies it is uesful for providers to anticipate how
+           to evolve their services capabilities over time.  If forward
            compatibility is a concern in order to accommodate
            compatibility with different and potentially new clients,
-           providers should refer to <a href="#lifecycle"><b>5.12 Lifecycle of Assertions</b></a> and
+           providers should refer to <a href="#lifecycle"><b>5.11 Lifecycle of Assertions</b></a> and
            <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite> that describes service and
            policy assertion evolution.
            </p></div></div></div><div class="div1">
 <h2><a name="general-guidelines"></a>3. General Guidelines for WS-Policy Assertion Authors</h2><div class="div2">
-<h3><a name="assertion-target"></a>3.1 Assertions and Their Target Use</h3><p>When a community of WS-Policy authors decides to define
-           a set of WS-Policy assertions they should understand what
-           functionality the framework provides and apply the
+<h3><a name="assertion-target"></a>3.1 Assertions and Their Target Use</h3><p>WS-Policy authors need to have some definition of what the goal is for the assertions
+				they author. WS-Policy authors should also understand the
+           functionality the WS-Policy framework provides and apply the
            knowledge of framework processing when defining the set of
-           assertions. This will require the WS-Policy authors to have
-           some definition and/or understanding of what the goal is
-           for the use of the assertions.
-           </p><p>Assertions can be simple or they can be complex. A set
-           of WS-Policy authors may choose to specify one or two
+           assertions. 
+           </p><p>Assertions can be simple or they can be complex. WS-Policy authors may choose to specify one or two
            assertions or they may choose to specify many assertion
            elements that require parameters or other nested
            assertions. There are advantages to simplifying the set of
@@ -237,18 +241,14 @@
            to combine individual assertions may also need to be
            considered.
 	   </p><p>The number of different subjects to which an assertion
-           can be associated is also a factor when defining an
-           assertion. It is possible that WS-Policy assertions will be
-           consumed by a wide range of client configurations, from
+           can be attached is also a factor when defining an
+           assertion. Determining the appropriate policy subjects can sometimes
+           involve understanding the requirements of  wide range of client configurations, from
            stand alone client applications to "active" web service
-           requestors that are capable of adapting to constraints and
-           capabilities modifying their own configurations
-           dynamically.  If the assertion is intended to be consumed
-           by a broad range of clients, then the behavior should be
-           simple for all of these clients to understand and
-           implement.
-	   </p><p> Once the subjects are identified, one way of attaching
-           multiple instances of a simple policy assertion is to
+           requestors that are capable of modifying their own configurations
+           dynamically.
+	   </p><p> Once the range of policy subjects are identified, there are choices for ways of attaching
+		multiple instances of a simple policy assertion to multiple subjects. One way is to
            utilize the referencing mechanism that is present in the
            framework. By defining the assertion once and using it in
            different policies (e.g. with different alternatives) via
@@ -258,11 +258,12 @@
            creating a domain specific attachment in multiple WSDL
            files, EPRs, in which the same set of policies are expected
            to be applied.
-	   </p><p>WS-Policy domain authors should consider the following
+	   </p><p>In summary, WS-Policy domain authors should consider the following
 	   factors when composing the set of domain assertions as it
 	   may make sense to factor out some assertions that can be
 	   used by multiple subjects:
-           </p><ul><li><p><em>The definition of the
+           </p><ul><li><p>
+							<em>The definition of the
             assertion</em>. Does the assertion pertain to a specific
             behavior that is tied to a context or is the behavior
             different in each possible context? For example an
@@ -270,7 +271,8 @@
             message exchange or for all message exchanges that pertain
             to an endpoint would probably be represented by separate
             assertions.
-	    </p></li><li><p><em>Scoping of the assertion</em>. Where
+	    </p></li><li><p>
+							<em>Scoping of the assertion</em>. Where
             does the assertion apply? Is the assertion about a
             specific description in WSDL? Is the assertion about a
             specific aspect of protocol? Is the assertion about a
@@ -278,7 +280,8 @@
             the subject of an assertion is helpful in specifying the
             different scopes and subjects that it applies to.
  
-            </p></li><li><p><em>Composition</em>. If the assertion is
+            </p></li><li><p>
+							<em>Composition</em>. If the assertion is
             used with other assertions in a context, it is necessary
             to consider how the assertion may or may not affect
             the composition. For example, if an assertion applies to
@@ -345,32 +348,15 @@
  &lt;/wsp:ExactlyOne&gt;
 &lt;/wsp:Policy&gt;</pre></div></div><p> Note that both authoring styles are equivalent, however
            there may be reasons to choose one form over another
-           depending on the use. The compact form is more
+           depending on the use. For example, when multiple alternatives are present
+           in a policy, the normal form may express the choices more explicitly.
+           On the other hand, the compact form is more
            readable for humans when an assertion is marked as optional
            using the <code>@optional</code>attribute as our example
            illustrates above. 
       </p></div><div class="div1">
 <h2><a name="modeling-guidelines"></a>5. Guidelines for Modeling New Assertions</h2><div class="div2">
-<h3><a name="single-domains"></a>5.1 Single Domains</h3><p>When considering the creation of a new domain of policy
-        assertions, it is important to identify whether or not the
-        domain is self contained or can be well defined.  A domain
-        that expresses a broad set of capabilities will need to have
-        community support to provide value to the consumers.
-        Ultimately it is the consumers and providers that will
-        determine whether a particular set of assertions correctly
-        characterize the domain.  A community should avoid duplicating
-        assertions that have already been defined as this will create
-        ambiguity not clarification and focus on creating assertions
-        for those specific constraints and capabilities that do not
-        overlap with other domains but that communicate new
-        functionality. </p><p>The model advocated is an "opt-in" model. Namely, the
-        providers of services should invest to find the set of
-        assertions useful to improve interoperability of services or
-        they will not include the assertions in their service
-        descriptions. </p><p>A review by a broad community is the best way to ensure
-        that the granularity of a set of domain assertions is
-        appropriate. </p></div><div class="div2">
-<h3><a name="new-domains"></a>5.2 New Policy Domains</h3><p>When creating a new policy domain, it is important to
+<h3><a name="new-domains"></a>5.1 New Policy Domains</h3><p>When creating a new policy domain, it is important to
          understand how policy expressions are used by the
          framework. Some WS-Policy domains represent infrastructure
          efforts like WS-SecurityPolicy and WS-RM Policy. We also
@@ -399,6 +385,26 @@
          domain that has been decomposed into a set of policy
          expressions.
          </p></div><div class="div2">
+<h3><a name="single-domains"></a>5.2 Single Domains</h3><p>When considering the creation of a new domain of policy
+        assertions, it is important to identify whether or not the domain is self  containted 
+        or at least if a subset of the domain can be well defined.  A domain
+        that expresses a broad set of capabilities will also need to have
+        community supportin implementation to provide value to the consumers.
+        Ultimately it is the consumers and providers that will
+        determine whether a particular set of assertions correctly
+        characterize a domain.  A  new community should avoid duplicating
+        assertions that have already been defined as this will create
+        ambiguity not clarification. New WS-Policy authors should focus on creating assertions
+        for those specific constraints and capabilities that do not
+        overlap with other domains but that communicate new
+        functionality. </p><p>The model advocated for new assertion development is a cooperative marketplace 
+		[some might say its an "opt-in" model]. The
+        providers of services need to find value in the set of
+        assertions or
+        they will not include the assertions in their service
+        descriptions. </p><p>A review by a broad community is the best way to ensure
+        that the granularity of a set of domain assertions is
+        appropriate. </p></div><div class="div2">
 <h3><a name="nested-assertions"></a>5.3 Nested Assertions</h3><p>The framework provides the ability to "nest" policy
         assertions. For domains with a complex set of options, nesting
         provides one way to indicate dependent elements within a
@@ -454,7 +460,8 @@
 &lt;/sp:TransportBinding&gt;</pre></div></div><p>The <code>sp:AlgorithmSuite</code> is a nested policy assertion of
             the<code>sp:TransportBinding</code> policy assertion. The<code>sp:AlgorithmSuite</code>
           assertion requires the use of the algorithm suite identified by its nested policy
-          assertion (<code>sp:Basic256Rsa15</code><em>in the example above</em>) and further qualifies the behavior of the
+          assertion (<code>sp:Basic256Rsa15</code>
+					<em>in the example above</em>) and further qualifies the behavior of the
             <code>sp:TransportBinding</code> policy assertion.</p><p>Setting aside the details of using transport-level
         security,, a policy-aware client that recognizes this policy
         assertion can engage transport-level security and its
@@ -465,7 +472,7 @@
 <h3><a name="parametrized-assertions"></a>5.4 Assertions with Parameters</h3><p>The framework provides an alternative approach for
         providing additional information for an assertion beyond its
         type.  The framework allows WS-Policy domain authors to define
-        name value pairs to qualify an assertion.  For some domains it
+        name value pairs, for example,  to qualify an assertion.  For some domains it
         will be appropriate to specify these parameters instead of
         nesting elements. </p><p> Note that parameters of assertions include the following:</p><ul><li><p> Complex elements that have element children which can not be policy assertions.  </p></li><li><p> Elements that have attributes </p></li></ul></div><div class="div2">
 <h3><a name="comparison"></a>5.5 Comparison of Nested and Parametrized Assertions</h3><p>The main consideration for selecting parameters or nesting
@@ -487,13 +494,18 @@
         delegated to the specific domain handlers that are not visible
         to the WS-Policy framework. The tradeoff is the generality
         vs. the flexibility and complexity of the comparison expected
-        for a domain.
-
-	</p></div><div class="div2">
+        for a domain. </p><p>In the example below, <code>sp:Body</code> and <code>sp:Header</code> elements are the
+            two assertion parameters of the <code>sp:SignedParts</code> policy assertion (this
+            assertion requires the parts of a message to be protected). </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 5-2. </span>Policy Assertion with Assertion Parameters</i></p><div class="exampleInner"><pre>&lt;Policy&gt;
+  &lt;sp:SignedParts&gt;
+    &lt;sp:Body /&gt;
+    &lt;sp:Header /&gt;
+  &lt;/sp:SignedParts&gt;
+&lt;/Policy&gt;</pre></div></div></div><div class="div2">
 <h3><a name="self-describing"></a>5.6  Self Describing Messages </h3><p>WS-Policy is intended to communicate the requirements,
-     capabilities, preferences and behaviors of nodes on the message's
-     path, not specifically declare properties of the messages
-     themselves. One of the advantages of Web services is that an XML
+     capabilities, preferences and behaviors of nodes that provide the message's
+     path, not specifically to declare properties of the message semantics.
+     One of the advantages of Web services is that an XML
      message can be stored and later examined (e.g. as a record of a
      business transaction) or interpreted by an intermediary; however,
      if information that is necessary to understand a message is not
@@ -506,24 +518,20 @@
      required in a particular message; the latter are the intended
      uses of the Ws-Policy framework.
      </p><p>The assertion authors should take into account that there are
-     two important concepts when designing assertions. Firstly, an
+     two important concepts when designing assertions and documenting the semantics of the
+     assertion types. Firstly, an
      assertion type indicates a <em>runtime</em> behavior.  Secondly,
      an assertion should also indicate how the assertion type can be
-     inferred or indicated from a message, if there is a need for the
-     behavior to be represented in a persistent way by additional data
-     or metadata that is present in a message. If such a relationship
-     exists, it should be incorporated into an assertion design
-     document that illustrates the disambiguation of the usage of the
-     policy at runtime and in the message if that message is
-     persisted. 
+     inferred or indicated from a message.  If there is a need for the
+     behavior to be represented in a persistent way or if there s a need for additional data
+     or metadata that is present in a message to be persisted, it should be incorporated
+     into the assertion design or in the message iteself. 
      </p><p>As a result, Policy assertions should not be used to express
-     what otherwise should be part of the message. If a property is
+     the semantics of a message. If a property is
      required to understand a message, it should be communicated in
-     the message, or made available to in a message (e.g., being
+     the message, or be made available by some other means(e.g., being
      referenced by a URI in the message) rather than communicated as a
-     policy element. Thus, the assertion definition should specify how
-     the presence of the property will determine the engagement of the
-     behavior indicated by the assertion.
+     policy element. 
      </p><p>If the messages could not be made self describing by utilizing
     additional properties present in the message as required by the assertion, it would be
     necessary to determine the behaviors engaged at runtime by
@@ -643,13 +651,13 @@
           not limited to the subjects defined in WSDL</em>.  The
           external attachment model in WS-PolicyAttachment allows for
           the definition of other domain expressions to be policy
-          subjects. More of this topic is covered in the <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite></p><div class="exampleOuter"><p>EXAMPLE</p></div></div><div class="div2">
-<h3><a name="subject-scoping-considerations"></a>5.10 Subject Scoping Considerations</h3><p> Appendix A. Which assertions </p><p>Enabled versioning. Conservative composites. </p><p> Anti patterns. Interaction between the subjects and interaction between different attachment points. How you can get into trouble. </p><p>Give wS-RX as example. </p><p>Give examples for WSDL 1.0. </p></div><div class="div2">
-<h3><a name="levels-of-abstraction"></a>5.11 Levels of Abstraction in WSDL </h3><p>A behavior identified by a policy assertion applies to the
+          subjects. More of this topic is covered in the <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite>
+				</p><div class="exampleOuter"><p>EXAMPLE</p></div></div><div class="div2">
+<h3><a name="levels-of-abstraction"></a>5.10 Levels of Abstraction in WSDL </h3><p>A behavior identified by a policy assertion applies to the
         associated policy subject. If a policy assertion is to be used
         within WSDL, policy assertion authors must specify a WSDL
         policy subject. The policy subject is determined with respect
-        to a behavior as follows behavior?
+        to a behavior as follows:
         </p><ul><li><p>If the behavior applies to any message exchange
           using any of the endpoints offered by a service then the
           subject is the service policy subject. </p></li><li><p>If the behavior applies to any message exchange
@@ -658,15 +666,13 @@
 	  defined by an operation then the subject is the operation
 	  policy subject. </p></li><li><p>If the behavior applies to an input message then
 	  the subject is the message policy subject - similarly for
-	  output and fault message policy subjects.</p></li></ul><p>The authors need to understand how the assertions will be
+	  output and fault message policy subjects.</p></li></ul><p>WS-Policy authors that wish to utilize WSDL policy subjects need to understand how the assertions will be
 	processed in intersection and merging and the implications of
 	the processing for considering a specific attachment point and
-	policy subject. This topic is considered in detail in <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite></p><p>The current set of subjects as mapped to the WSDL 1.1
-        elements, can constrain the assertion constructs to a WSDL
-        exchange if the authors so choose. For Example, In WS-RM,
-        there was not a WSDL subject that was appropriate to some of
-        the characteristics of a reliable messaging exchange and the
-        domain authors chose to not support certain capabilities at
+	policy subject. This topic is considered in detail in <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite>
+				</p><p>The current set of subjects as mapped to the WSDL 1.1
+        elements, can also constrain the assertion constructs. For Example, In WS-RM,
+        the domain authors chose to support certain capabilities at
         the endpoint level. This resulted in the finer granularity of
         the assertion to apply at the message policy subject, but the
         assertion semantics also indicates that the if the senders
@@ -690,8 +696,7 @@
         the assertion reasonably applies to any endpoint that ever
         references that portType. Most of the known policy assertions
         are designed for the endpoint, operation or message policy
-        subject. The commonly used attachment points for these policy
-        subjects are outlined in <a href="#subject-scoping-considerations"><b>5.10 Subject Scoping Considerations</b></a>. </p><p> In using WSDL attachment, it should be noted that the
+        subject. </p><p> In using WSDL attachment, it should be noted that the
         service policy subject is a collection of endpoint policy
         subjects. The endpoint policy subject is a collection of
         operation policy subjects and etc. As a result, the WSDL
@@ -707,7 +712,8 @@
         subjects then <em>the assertion author has the burden to
         describe the semantics of multiple instances of the same
         assertion attached to multiple policy subjects at the same
-        time in order to avoid conflicting behavior. </em></p><p>One approach is to specify a policy subject, choose the
+        time in order to avoid conflicting behavior. </em>
+				</p><p>One approach is to specify a policy subject, choose the
 	most granular policy subject that the behavior applies to and
 	specify a preferred attachment point in WSDL. Howeever, this
 	approach only works if the policy subject is a true WSDL
@@ -721,13 +727,15 @@
 	policy assertions do not target wire-level behaviors but
 	rather abstract requirements, this technique does not
 	apply. </p></div><div class="div2">
-<h3><a name="lifecycle"></a>5.12 Lifecycle of Assertions</h3><p>There are three aspects that govern an assertions lifecycle:</p><ul><li><p> Assertion Extensibility </p></li><li><p> Policy Language Extensibility </p></li><li><p> Subject attachment Extensibility </p></li></ul><div class="div3">
-<h4><a name="Referencing_Policy_Expressions"></a>5.12.1 Referencing Policy Expressions</h4><p>The <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite> illustrates how the
-        utilizing identification mechanism can be useful for exposing
-        a complex policy expression as a reusable building block for
+<h3><a name="lifecycle"></a>5.11 Lifecycle of Assertions</h3><p>WS-Policy authors need to consider not just the expression of the current set of requirements but
+				how they anticipate new assertions being added to the set.  There are three aspects that govern an assertions lifecycle:</p><ul><li><p> Assertion Extensibility </p></li><li><p> Policy Language Extensibility </p></li><li><p> Subject attachment Extensibility </p></li></ul><div class="div3">
+<h4><a name="Referencing_Policy_Expressions"></a>5.11.1 Referencing Policy Expressions</h4><p>The <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite> illustrates how
+					providers can 
+        utilize the identification mechanism  defined in the Policy specification
+        to expose a complex policy expression as a reusable building block for
         other policy expressions by reference. Domain assertion
-        authors, especially those utilizing complex assertions that
-        include nesting or complex types should consider utilizing
+        authors, especially those defining complex assertions that
+        include nesting or complex types should consider specifying or recommending
         naming conventions in order to promote reuse. Reuse through
         referencing allows a policy expression to be utilized not only
         within another expression but also allows specification of
@@ -736,8 +744,8 @@
         managability of the expressions as they are uniquely
         identified.
         </p></div><div class="div3">
-<h4><a name="extending-assertions"></a>5.12.2  Factors in Extending Assertions within a Domain </h4><p> Extensibility affects the policy subjects and attachment semantics. </p></div><div class="div3">
-<h4><a name="assertion-evolution"></a>5.12.3 Evolution of Assertions (Versioning and Compatibility)</h4><p>4.4.7. Over time, there may be multiple equivalent
+<h4><a name="extending-assertions"></a>5.11.2  Factors in Extending Assertions within a Domain </h4><p> Extensibility affects the policy subjects and attachment semantics. </p></div><div class="div3">
+<h4><a name="assertion-evolution"></a>5.11.3 Evolution of Assertions (Versioning and Compatibility)</h4><p>4.4.7. Over time, there may be multiple equivalent
            behaviors emerging in the Web Service interaction
            space. Examples of such multiple equivalent behaviors are
            WSS: SOAP Message Security 1.0 vs. 1.1 and WS-Addressing
@@ -746,15 +754,15 @@
            exclusive for an interaction. Such equivalent behaviors can
            be modeled as independent assertions. The policy expression
            in the example below requires the use of WSS: SOAP Message
-           Security 1.0. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 5-3. </span>Example 4-2. Message-level Security and WSS: SOAP Message Security 1.0 </i></p><p>ADD THE EXAMPLE HERE </p></div><p>The policy expression in the example below requires the
+           Security 1.0. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 5-4. </span>Example 4-2. Message-level Security and WSS: SOAP Message Security 1.0 </i></p><p>ADD THE EXAMPLE HERE </p></div><p>The policy expression in the example below requires the
            use of WSS: SOAP Message Security 1.1. These are multiple
            equivalent behaviors and are represented using distinct
-           policy assertions. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 5-4. </span>Example 4-3. Message-level Security and WSS: SOAP Message Security 1.1</i></p><p>ADD THE EXAMPLE HERE </p></div><p>Best practice: use independent assertions for modeling
+           policy assertions. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 5-5. </span>Example 4-3. Message-level Security and WSS: SOAP Message Security 1.1</i></p><p>ADD THE EXAMPLE HERE </p></div><p>Best practice: use independent assertions for modeling
 	   multiple equivalent behaviors. </p></div></div></div><div class="div1">
-<h2><a name="inter-policy"></a>6. Inter-domain Policy and Composition Issues</h2><p>Domain authors must be aware of the interactions between
-         different domains. For example, security assertions interact
+<h2><a name="inter-policy"></a>6. Inter-domain Policy and Composition Issues</h2><p>Domain authors must be aware of the interactions between their
+			domain and other domains. For example, security assertions interact
          with other protocol assertions in a composition. Although
-         modeling such assertions may appear independent behaviors,
+         modeling protocol assertions may appear to be an independent behavior,
          protocol assertions and security assertions affect transport
          bindings and their interactions must be considered. For
          example, utilization of WS-Security Policy with other
@@ -796,7 +804,7 @@
 <h2><a name="scenerio"></a>8. Scenario and a worked example</h2><p>To illustrate the topics explored in this document, we
        include an example of a web service and how a fictitous company
        might utilize the WS-Policy Framework to enable Web Service
-       interoperability. In addition we provide the following matrix:</p><div class="exampleOuter"><p>ADD MATRIX</p></div><p>CompanyA has determined to utilize WS-Security,
+       interoperability. CompanyA has determined to utilize WS-Security,
        WS-Addressing and WS-Reliable Messaging in all its new web
        service offerings and has instructed its developers to use the
        policy assertions defined by the following documents: </p><ul><li><p>Web Services Security Policy </p></li><li><p>Web Services Reliable Messaging Policy </p></li><li><p>Web Services Addressing WSDL Binding</p></li></ul><p>The application developers at CompanyA are instructed to
@@ -816,7 +824,7 @@
       the use of transport-level security for protecting messages as
       well as including addressing headers. Employees of CompanyA have
       already incorporated <code>wss:Security</code> headers into their
-      messages. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-2. </span>Message with Security Headers</i></p><div class="exampleInner"><pre>&lt;soap:Envelope&gt; 
+      messages. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-1. </span>Message with Security Headers</i></p><div class="exampleInner"><pre>&lt;soap:Envelope&gt; 
   &lt;soap:Header&gt;
 	&lt;wss:Security sopap:mustUnderstand ="1"&gt;
 	  &lt;wsu:Timestamp u:Id=_0"&gt;
@@ -835,7 +843,7 @@
      messages. </p><p>The example below illustrates a policy expression that
      CompanyA has created for its employees to use on their web
      services to indicate the use of addressing and transport-level
-     security for securing messages. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-3. </span> CompanyA-ProfileA </i></p><div class="exampleInner"><pre>
+     security for securing messages. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-2. </span> CompanyA-ProfileA </i></p><div class="exampleInner"><pre>
 &lt;Policy URI=http://www.CompanyA.com/WebServicesProfileA.xml&gt; 
 	&lt;wsa:UsingAddressing /&gt;
 	&lt;sp:TransportBinding&gt;lt;/spTransportBinding&gt;
@@ -863,7 +871,7 @@
      additional integrity protection by including WS-Security Headers
      to protect the message content after it is processed by the
      transport.  The additional security processing is not required by
-     all CompanyA web services. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-4. </span>CompanyA-ProfileB ( not expanded)</i></p><div class="exampleInner"><pre>
+     all CompanyA web services. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-3. </span>CompanyA-ProfileB ( not expanded)</i></p><div class="exampleInner"><pre>
 &lt;Policy wsu:Id="CompanyA-ProfileB"&gt; 
 	&lt;wsa:UsingAddressing /&gt;
 	&lt;ExactlyOne&gt;
@@ -888,7 +896,7 @@
     represent (ed) these dependent behaviors as "nested" policy
     assertions.  </p><p>In the example below the child Policy element is a nested
      policy behavior and further qualifies the behavior of the
-     sp:TransportBinding policy assertion.  </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-5. </span>CompanyA-ProfileB (fully expanded)</i></p><div class="exampleInner"><pre>
+     sp:TransportBinding policy assertion.  </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-4. </span>CompanyA-ProfileB (fully expanded)</i></p><div class="exampleInner"><pre>
 &lt;Policy wsu:Id="CompanyA-ProfileB"&gt; 
 	&lt;wsa:UsingAddressing /&gt;
 	&lt;ExactlyOne&gt;
@@ -907,7 +915,8 @@
 	   &lt;sp:AsymmetricBinding&gt;
   &lt;/sp:AssymetricBinding&gt;
 	&lt;/ExactlyOne&gt;
-&lt;/Policy&gt;</pre></div></div><p><code>The sp:AlgorithmSuite</code> is a nested policy
+&lt;/Policy&gt;</pre></div></div><p>
+				<code>The sp:AlgorithmSuite</code> is a nested policy
      assertion of the <code>sp:TransportBinding</code> assertion and
      indicates that this suite is required.  The
      <code>sp:TransportToken</code> is a nested policy assertion that
@@ -933,14 +942,14 @@
      specification and attach the policies to the web service endpoint
      policy subject as recommended by the WS-SecurityPolicy
      specification. For the default web services, the URI is included
-     in the wsdl binding for each web service. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-6. </span></i></p><div class="exampleInner"><pre>
+     in the wsdl binding for each web service. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-5. </span></i></p><div class="exampleInner"><pre>
 &lt;wsdl:binding name="CompanyADefaultBinding" type="tns:CompanyADefault"&gt; 
   &lt;wsp:PolicyReference URI="http://www.CompanyA.com/WebServicesProfileA.xml"&gt;
 
 &lt;wsdl:operation name="GetQuote"&gt; &lt;/wsdl:operation&gt;
 &lt;/wsdl:binding&gt; </pre></div></div><p>The partner specified policy is included in the beginning of
     the wsdl 1.1document and referenced by the binding for the service
-    as in the example below.</p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-7. </span></i></p><div class="exampleInner"><pre>
+    as in the example below.</p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-6. </span></i></p><div class="exampleInner"><pre>
 &lt;wsdl:definitions name="StokeQuote"
     targetNamespace="http:.."&gt;
 &lt;wsp:Policy wsu:Id="CompanyA-ProfileB"&gt; 
@@ -979,54 +988,100 @@
   effective policies for WSDL 1.1 based subjects. </p></div></div><div class="back"><div class="div1">
 <h2><a name="security-considerations"></a>A. Security Considerations</h2><p> Security considerations are discussed in the <cite><a href="#WS-Policy">Web Services Policy Framework</a></cite> document.</p></div><div class="div1">
 <h2><a name="xml-namespaces"></a>B. XML Namespaces</h2><p>The table below lists XML Namespaces that are used in this document. The choice of any
-        namespace prefix is arbitrary and not semantically significant.</p><a name="nsprefix"></a><table summary="Prefixes and XML Namespaces used in this specification" border="1" cellspacing="0" cellpadding="5"><caption>Table B-1. Prefixes and XML Namespaces used in this specification.</caption><thead><tr><th colspan="1" rowspan="1">Prefix</th><th colspan="1" rowspan="1">XML Namespace</th><th colspan="1" rowspan="1">Specifications</th></tr></thead><tbody><tr><td colspan="1" rowspan="1"><code>soap</code></td><td colspan="1" rowspan="1"><code>http://www.w3.org/2003/05/soap-envelope</code></td><td colspan="1" rowspan="1">[<cite><a href="#SOAP12">SOAP 1.2 Messaging Framework</a></cite>]</td></tr><tr><td colspan="1" rowspan="1"><code>sp</code></td><td colspan="1" rowspan="1"><code>http://schemas.xmlsoap.org/ws/2005/07/securitypolicy</code></td><td colspan="1" rowspan="1">[<cite><a href="#WS-SecurityPolicy">WS-SecurityPolicy</a></cite>]</td></tr><tr><td colspan="1" rowspan="1"><code>wsa</code></td><td colspan=1" rowspan="1"><code>http://www.w3.org/2005/08/addressing</code></td><td colspan="1" rowspan="1">[<cite><a href="#WS-Addressing">WS-Addressing Core</a></cite>]</td></tr><tr><td colspan="1" rowspan="1"><code>wsdl</code></td><td colspan="1" rowspan="1"><code>http://schemas.xmlsoap.org/wsdl/</code></td><td colspan="1" rowspan="1">[<cite><a href="#WSDL11">WSDL 1.1</a></cite>]</td></tr><tr><td colspan="1" rowspan="1"><code>wsp</code></td><td colspan="1" rowspan="1"><code>http://www.w3.org/@@@@/@@/ws-policy</code></td><td colspan="1" rowspan="1">[<cite><a href="#WS-Policy">Web Services Policy Framework</a></cite>, <cite><a href="#WS-PolicyAttachment">Web Services Policy Attachment</a></cite>]</td></tr><tr><td colspan="1" rowspan="1"><code>wsrmp</code></td><td colspan="1" rowspan="1"><code>http://docs.oasis-open.org/ws-rx/wsrmp/200608</code></td><td colspan="1" rowspan="1">[<cite><a href="#WS-RM-Policy">Web Services Reliable Messaging Policy</a></cite>]</td></tr><tr><td colspan="1" rowspan="1"><code>wss</code></td<td colspan="1" rowspan="1"><code>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd</code></td><td colspan="1" rowspan="1">[<cite><a href="#WS-Security2004">WS-Security 2004</a></cite>]</td></tr><tr><td colspan="1" rowspan="1"><code>wsu</code></td><td colspan="1" rowspan="1"><code>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd</code></td><td colspan="1" rowspan="1">[<cite><a href="#WS-Security2004">WS-Security 2004</a></cite>]</td></tr></tbody></table><br></div><div class="div1">
-<h2><a name="references"></a>C. References</h2><dl><dt class="label"><a name="MTOM"></a>[MTOM] </dt><dd><cite><a href="http://www.w3.org/TR/2005/REC-soap12-mtom-20050125/">SOAP Message Transmission Optimization Mechanism</a></cite>, M. Gudgin, N.
+        namespace prefix is arbitrary and not semantically significant.</p><a name="nsprefix"></a><table summary="Prefixes and XML Namespaces used in this specification" border="1" cellspacing="0" cellpadding="5"><caption>Table B-1. Prefixes and XML Namespaces used in this specification.</caption><thead><tr><th rowspan="1" colspan="1">Prefix</th><th rowspan="1" colspan="1">XML Namespace</th><th rowspan="1" colspan="1">Specifications</th></tr></thead><tbody><tr><td rowspan="1" colspan="1">
+							<code>soap</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://www.w3.org/2003/05/soap-envelope</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#SOAP12">SOAP 1.2 Messaging Framework</a></cite>]</td></tr><tr><td rowspan="1" colspan="1">
+							<code>sp</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://schemas.xmlsoap.org/ws/2005/07/securitypolicy</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#WS-SecurityPolicy">WS-SecurityPolicy</a></cite>]</td></tr><tr><td rowspan="1" colspan="1">
+							<code>wsa</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://www.w3.org/2005/08/addressing</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#WS-Addressing">WS-Addressing Core</a></cite>]</td></tr><tr><td rowspan="1" colspan="1">
+							<code>wsdl</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://schemas.xmlsoap.org/wsdl/</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#WSDL11">WSDL 1.1</a></cite>]</td></tr><tr><td rowspan="1" colspan="1">
+							<code>wsp</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://www.w3.org/@@@@/@@/ws-policy</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#WS-Policy">Web Services Policy Framework</a></cite>, <cite><a href="#WS-PolicyAttachment">Web Services Policy Attachment</a></cite>]</td></tr><tr><td rowspan="1" colspan="1">
+							<code>wsrmp</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://docs.oasis-open.org/ws-rx/wsrmp/200608</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#WS-RM-Policy">Web Services Reliable Messaging Policy</a></cite>]</td></tr><tr><td rowspan="1" colspan="1">
+							<code>wss</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#WS-Security2004">WS-Security 2004</a></cite>]</td></tr><tr><td rowspan="1" colspan="1">
+							<code>wsu</code>
+						</td><td rowspan="1" colspan="1">
+							<code>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd</code>
+						</td><td rowspan="1" colspan="1">[<cite><a href="#WS-Security2004">WS-Security 2004</a></cite>]</td></tr></tbody></table><br></div><div class="div1">
+<h2><a name="references"></a>C. References</h2><dl><dt class="label"><a name="MTOM"></a>[MTOM] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/2005/REC-soap12-mtom-20050125/">SOAP Message Transmission Optimization Mechanism</a></cite>, M. Gudgin, N.
           Mendelsohn, M. Nottingham and H. Ruellan, Editors. World Wide Web Consortium, 25 January
           2005. This version of the SOAP Message Transmission Optimization Mechanism Recommendation
           is http://www.w3.org/TR/2005/REC-soap12-mtom-20050125/. The <a href="http://www.w3.org/TR/soap12-mtom/">latest version of SOAP Message Transmission
-            Optimization Mechanism</a> is available at http://www.w3.org/TR/soap12-mtom/. </dd><dt class="label"><a name="SOAP11"></a>[SOAP 1.1] </dt><dd><cite><a href="http://www.w3.org/TR/2000/NOTE-SOAP-20000508/">Simple Object Access Protocol (SOAP) 1.1</a></cite>, D. Box, et al, Editors.
+            Optimization Mechanism</a> is available at http://www.w3.org/TR/soap12-mtom/. </dd><dt class="label"><a name="SOAP11"></a>[SOAP 1.1] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/2000/NOTE-SOAP-20000508/">Simple Object Access Protocol (SOAP) 1.1</a></cite>, D. Box, et al, Editors.
           World Wide Web Consortium, 8 May 2000. Available at
-          http://www.w3.org/TR/2000/NOTE-SOAP-20000508/. </dd><dt class="label"><a name="SOAP12"></a>[SOAP 1.2 Messaging Framework] </dt><dd><cite><a href="http://www.w3.org/TR/2003/REC-soap12-part1-20030624/">SOAP Version 1.2 Part 1: Messaging Framework</a></cite>, M. Gudgin, M. Hadley,
+          http://www.w3.org/TR/2000/NOTE-SOAP-20000508/. </dd><dt class="label"><a name="SOAP12"></a>[SOAP 1.2 Messaging Framework] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/2003/REC-soap12-part1-20030624/">SOAP Version 1.2 Part 1: Messaging Framework</a></cite>, M. Gudgin, M. Hadley,
           N. Mendelsohn, J-J. Moreau, H. Frystyk Nielsen, Editors. World Wide Web Consortium, 24
           June 2003. This version of the SOAP Version 1.2 Part 1: Messaging Framework Recommendation
           is http://www.w3.org/TR/2003/REC-soap12-part1-20030624/. The <a href="http://www.w3.org/TR/soap12-part1/">latest version of SOAP Version 1.2 Part 1:
-            Messaging Framework</a> is available at http://www.w3.org/TR/soap12-part1/. </dd><dt class="label"><a name="XOP"></a>[XOP] </dt><dd><cite><a href="http://www.w3.org/TR/2005/REC-xop10-20050125/">XML-binary Optimized Packaging</a></cite>, M. Gudgin, N. Mendelsohn, M.
+            Messaging Framework</a> is available at http://www.w3.org/TR/soap12-part1/. </dd><dt class="label"><a name="XOP"></a>[XOP] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/2005/REC-xop10-20050125/">XML-binary Optimized Packaging</a></cite>, M. Gudgin, N. Mendelsohn, M.
           Nottingham and H. Ruellan, Editors. World Wide Web Consortium, 25 January 2005. This
           version of the XML-binary Optimized Packaging Recommendation is
           http://www.w3.org/TR/2005/REC-xop10-20050125/. The <a href="http://www.w3.org/TR/xop10/">latest version of XML-binary Optimized Packaging</a> is available at
-          http://www.w3.org/TR/xop10/. </dd><dt class="label"><a name="WS-Addressing"></a>[WS-Addressing Core] </dt><dd><cite><a href="http://www.w3.org/TR/2006/REC-ws-addr-core-20060509/">Web Services Addressing 1.0 - Core</a></cite>, M. Gudgin, M. Hadley, and T.
+          http://www.w3.org/TR/xop10/. </dd><dt class="label"><a name="WS-Addressing"></a>[WS-Addressing Core] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/2006/REC-ws-addr-core-20060509/">Web Services Addressing 1.0 - Core</a></cite>, M. Gudgin, M. Hadley, and T.
           Rogers, Editors. World Wide Web Consortium, 9 May 2006. This version of the Web Services
           Addressing 1.0 - Core Recommendation is
           http://www.w3.org/TR/2006/REC-ws-addr-core-20060509/. The <a href="http://www.w3.org/TR/ws-addr-core/">latest version of Web Services Addressing 1.0
-            - Core</a> is available at http://www.w3.org/TR/ws-addr-core. </dd><dt class="label"><a name="WSDL11"></a>[WSDL 1.1] </dt><dd><cite><a href="http://www.w3.org/TR/2001/NOTE-wsdl-20010315">Web Services Description Language (WSDL) 1.1</a></cite>, E. Christensen, et al,
+            - Core</a> is available at http://www.w3.org/TR/ws-addr-core. </dd><dt class="label"><a name="WSDL11"></a>[WSDL 1.1] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/2001/NOTE-wsdl-20010315">Web Services Description Language (WSDL) 1.1</a></cite>, E. Christensen, et al,
           Authors. World Wide Web Consortium, March 2001. Available at
-          http://www.w3.org/TR/2001/NOTE-wsdl-20010315. </dd><dt class="label"><a name="WS-Policy"></a>[Web Services Policy Framework] </dt><dd><cite><a href="http://www.w3.org/TR/ws-policy/">Web Services Policy 1.5 - Framework</a></cite>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
+          http://www.w3.org/TR/2001/NOTE-wsdl-20010315. </dd><dt class="label"><a name="WS-Policy"></a>[Web Services Policy Framework] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/ws-policy/">Web Services Policy 1.5 - Framework</a></cite>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
           Boubez and P. Yendluri, Editors. World Wide Web Consortium, @@,
           @@@@ @@@@. This version of the 
           Web Services Policy 1.5 - Framework specification is at http://www.w3.org/TR/ws-policy/. The <a href="http://www.w3.org/TR/ws-policy/">latest version of
-            Web Services Policy 1.5 - Framework</a> is available at http://www.w3.org/TR/ws-policy/. </dd><dt class="label"><a name="WS-PolicyAttachment"></a>[Web Services Policy Attachment] </dt><dd><cite><a href="http://www.w3.org/TR/ws-policy-attach/">Web Services Policy 1.5 - Attachment</a></cite>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
+            Web Services Policy 1.5 - Framework</a> is available at http://www.w3.org/TR/ws-policy/. </dd><dt class="label"><a name="WS-PolicyAttachment"></a>[Web Services Policy Attachment] </dt><dd>
+					<cite><a href="http://www.w3.org/TR/ws-policy-attach/">Web Services Policy 1.5 - Attachment</a></cite>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
           Boubez and P. Yendluri, Editors. World Wide Web Consortium, @@,
           @@@@ @@@@. This version of the 
           Web Services Policy 1.5 - Attachment specification is at http://www.w3.org/TR/ws-policy-attach. The <a href="http://www.w3.org/TR/ws-policy-attach/">latest version of
             Web Services Policy 1.5 - Attachment</a> is available at
-          http://www.w3.org/TR/ws-policy-attach/. </dd><dt class="label"><a name="WS-Policy-Primer"></a>[Web Services Policy Primer] </dt><dd><cite><a href="http://dev.w3.org/cvsweb/~checkout~/2006/ws/policy/ws-policy-primer.html?content-type=text/html;%2520charset=utf-8">Web Services Policy 1.5 - Primer</a></cite>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
-          Boubez and P. Yendluri, Editors. World Wide Web Consortium, Draft. </dd><dt class="label"><a name="WS-RM"></a>[Web Services Reliable Messaging] </dt><dd><cite><a href="http://docs.oasis-open.org/ws-rx/wsrm/200608/wsrm-1.1-rddl-200608.html">Web Services Reliable Messaging (WS-ReliableMessaging)</a></cite>, Doug Davis (IBM), Anish Karmarkar (Oracle),
+          http://www.w3.org/TR/ws-policy-attach/. </dd><dt class="label"><a name="WS-Policy-Primer"></a>[Web Services Policy Primer] </dt><dd>
+					<cite><a href="http://dev.w3.org/cvsweb/~checkout~/2006/ws/policy/ws-policy-primer.html?content-type=text/html;%20charset=utf-8">Web Services Policy 1.5 - Primer</a></cite>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
+          Boubez and P. Yendluri, Editors. World Wide Web Consortium, Draft. </dd><dt class="label"><a name="WS-RM"></a>[Web Services Reliable Messaging] </dt><dd>
+					<cite><a href="http://docs.oasis-open.org/ws-rx/wsrm/200608/wsrm-1.1-rddl-200608.html">Web Services Reliable Messaging (WS-ReliableMessaging)</a></cite>, Doug Davis (IBM), Anish Karmarkar (Oracle),
           Gilbert Pilz (BEA), Steve Winkler (SAP), Umit Yalcinalp
           (SAP), August 7th, 2006, available at:
           http://docs.oasis-open.org/ws-rx/wsrm/200608/wsrm-1.1-rddl-200608.html
-          </dd><dt class="label"><a name="WS-RM-Policy"></a>[Web Services Reliable Messaging Policy] </dt><dd><cite><a href="http://docs.oasis-open.org/ws-rx/wsrmp/200608/wsrmp-1.1-rddl-200608.html">Web Services Reliable Messaging Policy Assertion v1.1</a></cite>, Doug Davis (IBM), Anish Karmarkar (Oracle),
+          </dd><dt class="label"><a name="WS-RM-Policy"></a>[Web Services Reliable Messaging Policy] </dt><dd>
+					<cite><a href="http://docs.oasis-open.org/ws-rx/wsrmp/200608/wsrmp-1.1-rddl-200608.html">Web Services Reliable Messaging Policy Assertion v1.1</a></cite>, Doug Davis (IBM), Anish Karmarkar (Oracle),
           Gilbert Pilz (BEA), Steve Winkler (SAP), Umit Yalcinalp
           (SAP), August 4, 2006, available at:
           http://docs.oasis-open.org/ws-rx/wsrmp/200608/wsrmp-1.1-rddl-200608.html
-          </dd><dt class="label"><a name="WS-Security2004"></a>[WS-Security 2004] </dt><dd><cite><a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf">Web Services Security: SOAP Message Security
+          </dd><dt class="label"><a name="WS-Security2004"></a>[WS-Security 2004] </dt><dd>
+					<cite><a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf">Web Services Security: SOAP Message Security
           1.0</a></cite>, A. Nadalin, C.  Kaler, P. Hallam-Baker and
           R. Monzillo, Editors. Organization for the Advancement of
           Structured Information Standards, March 2004. Available at
-          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf. </dd><dt class="label"><a name="WS-SecurityPolicy"></a>[WS-SecurityPolicy] </dt><dd><cite><a href="http://www.oasis-open.org/committees/download.php/15979/oasis-wssx-ws-securitypolicy-1.0.pdf">WS-SecurityPolicy v1.0</a></cite>, A. Nadalin,
+          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf. </dd><dt class="label"><a name="WS-SecurityPolicy"></a>[WS-SecurityPolicy] </dt><dd>
+					<cite><a href="http://www.oasis-open.org/committees/download.php/15979/oasis-wssx-ws-securitypolicy-1.0.pdf">WS-SecurityPolicy v1.0</a></cite>, A. Nadalin,
           M. Gudgin, A. Barbir, and H.  Granqvist,
           Editors. Organization for the Advancement of Structured
           Information Standards, 8 December 2005. Available at
-          http://www.oasis-open.org/committees/download.php/15979/oasis-wssx-ws-securitypolicy-1.0.pdf. </dd><dt class="label"><a name="WS-Trust"></a>[WS-Trust] </dt><dd><cite><a href="http://schemas.xmlsoap.org/ws/2005/02/trust">Web Services Trust Language (WS-Trust)</a></cite>,
+          http://www.oasis-open.org/committees/download.php/15979/oasis-wssx-ws-securitypolicy-1.0.pdf. </dd><dt class="label"><a name="WS-Trust"></a>[WS-Trust] </dt><dd>
+					<cite><a href="http://schemas.xmlsoap.org/ws/2005/02/trust">Web Services Trust Language (WS-Trust)</a></cite>,
           S. Anderson, et al, Authors.  Actional Corporation, BEA
           Systems, Inc., Computer Associates International, Inc.,
           International Business Machines Corporation, Layer 7
@@ -1047,7 +1102,7 @@
     The people who have contributed to <a href="http://lists.w3.org/Archives/Public/public-ws-policy/">discussions
     on public-ws-policy@w3.org</a> are also gratefully
     acknowledged.
-  </p></div> <div class="div1">
+  </p></div><div class="div1">
 <h2><a name="change-description"></a>E. Changes in this Version of
           the Document (Non-Normative)</h2><p>A list of substantive changes since the previous publication is below:</p><ul><li><p>TBD</p></li></ul></div><div class="div1">
-<h2><a name="change-log"></a>F. Web Services Policy 1.5 - Guidelines for Policy Assertion Authors Change Log (Non-Normative)</h2><a name="ws-policy-primer-changelog-table"></a><table border="1"><tbody><tr><th rowspan="1" colspan="1">Date</th><th rowspan="1" colspan="1">Author</th><th rowspan="1" colspan="1">Description</th></tr><tr><td colspan="1" rowspan="1">20060829</td><td colspan="1" rowspan="1">UY</td><td colspan="1" rowspan="1">Created first draft based on agreed outline and content</td></tr><tr><td colspan="1" rowspan="1">20061013</td><td colspan="1" rowspan="1">UY</td><td colspan="1" rowspan="1">Editorial fixes (suggested by Frederick), fixed references, bibl items, fixed dangling pointers, created eds to do</td></tr></tbody></table><br></div></div></body></html>
\ No newline at end of file
+<h2><a name="change-log"></a>F. Web Services Policy 1.5 - Guidelines for Policy Assertion Authors Change Log (Non-Normative)</h2><a name="ws-policy-primer-changelog-table"></a><table border="1"><tbody><tr><th rowspan="1" colspan="1">Date</th><th rowspan="1" colspan="1">Author</th><th rowspan="1" colspan="1">Description</th></tr><tr><td rowspan="1" colspan="1">20060829</td><td rowspan="1" colspan="1">UY</td><td rowspan="1" colspan="1">Created first draft based on agreed outline and content</td></tr><tr><td rowspan="1" colspan="1">20061013</td><td rowspan="1" colspan="1">UY</td><td rowspan="1" colspan="1">Editorial fixes (suggested by Frederick), fixed references, bibl items, fixed dangling pointers, created eds to do</td></tr><tr><td rowspan="1" colspan="1">20061018</td><td rowspan="1" colspan="1">MH</td><td rowspan="1" colspan="1">Editorial fixes for readability, added example for Encrypted parts</td></tr></tbody></table><br></div></div></body></html>
\ No newline at end of file

Received on Thursday, 19 October 2006 23:53:50 UTC