- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Fri, 6 Apr 2007 08:55:06 -0400
- To: "Robert Yonaitis" <ryonaitis@hisoftware.com>
- Cc: public-wsc-wg@w3.org
- Message-ID: <OFBA06E7E3.8C6AB845-ON852572B5.0046050C-852572B5.0046F647@LocalDomain>
[btw, if it drives people crazy that I start separate threads, let me
know. It helps me keep track of things, but it also increases the number
of mail messages. I'm hoping it aides discussion as well, since different
subsets of people seem to have the most knowledge and opinions on
different subsets of wsc-usecases.]
I think the note on scenario 12 tries to explain. It's a single scenario
in the general area of identity/authentication failure of the web site, in
this case using SSL. We might recommend terms, indicators, and metaphors
for SSL, certs, crypto, etc. that can be used consistently and usefully
across user agents (see goal 2.3). Those might drive recommendations about
how to talk about errors, and what is useful for users, and what is not.
We might (also) make recommendations about the user agent doing what you
advise your grandmother to do - don't go there.
I think scenario 20 is quite close to your suggested addition. As I re
read 20 in that light, I disagree that the intended interaction is "none".
It seems to be the same as the actual interaction, "software
installation", since Steve is running software that regularly upgrades
components.
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
"Robert Yonaitis" <ryonaitis@hisoftware.com>
04/03/2007 08:51 PM
To
"Mary Ellen Zurko" <Mary_Ellen_Zurko@notesdev.ibm.com>,
<public-wsc-wg@w3.org>, <yonaif4a@erau.edu>
cc
Subject
Comments RE: The Working draft
Hello All:
Please accept my following comments to the following document:
http://www.w3.org/TR/wsc-usecases/
The following are offered as comments, questions and or suggestions.
6.5 Scenarios ? Comments
I am unclear as to the purpose of the scenarios based on my reading of
them. For example in scenario number 12-what is that we are trying to
illustrate? What is the goal in this case? Do we intend to recommend what
to do in this case to the user, and if so will we define skill levels?
Alternatively, are we going to suggest how a site validation tool would
react to this case? I am assuming Betty is a novice user, perhaps my
grandmother. If it was my grandmother I would advise her to not use the
site. Not because it is unsafe, but because there would be doubt that my
grandmother could not evaluate the risk. I am of course am just trying to
understand the intent of the scenarios in this working draft. If the group
could clarify this a more clear understanding would help me to make better
comments back to the group.
Another case I might recommend:
User buys software, registers and activates it via software. This is
actually done via a connected http server, but is it secure? And how
should a company let the user know as personally identifiable information
is being transferred over the Internet, perhaps without the users
understanding?
Cheers,
Robert B. Yonaitis
Founder and CTO
HiSoftware
http://www.hisoftware.com/
603-496-7414
The information in this transmittal (including attachments, if any) is
privileged and confidential and is intended only for the recipient(s)
listed above. Any review, use, disclosure, distribution or copying of
this transmittal is prohibited except by or on behalf of the intended
recipient. If you have received this transmittal in error, please notify
me immediately by reply email and destroy all copies of the transmittal.
Thank you.
Received on Friday, 6 April 2007 12:55:12 UTC