Re: Agenda, 09 Jan, WSC Call

On 2007-01-05 15:04:51 -0500, Mary Ellen Zurko wrote:
> 
> Web Security Context (WSC) Call Agenda 
> 
> Calling information:
> 09 Jan 2007 (Happy New Year)
> 10:00am-11:00am Eastern time/ 15:00-16:00 UTC
> http://lists.w3.org/Archives/Member/member-wsc-wg/2006Nov/0017.html
> 
> Reminder - drafted sections of the Note are due 2 days after this meeting. 
> 
> 
> Agenda: 
> 
> 1) Pick a scribe
> http://www.w3.org/2006/WSC/scribes
> 
> 2) Approve minutes from last meeting:
> http://www.w3.org/2007/01/02-wsc-minutes
> 
> 3) Newly closed action items 
> 
> ACTION-8
> CLOSED
> Formalize use case around user contacting one site, then getting 
> re-directed to another (as part of a federation of organziations working 
> together, legitimately), how does the user trust where they landed on?
> Hal Lockhart
> 2006-11-21
> 
> ACTION-18
> CLOSED
> Formalize the need to be able to understand/visualize the "strength" of 
> SSL protection in place
> Bill Doyle
> 2006-11-21
> 
> ACTION-23
> CLOSED
> Find out more about Opera\\\\'s numeric trust indicator
> Michael Smith
> 2006-11-22
> 
> ACTION-30
> CLOSED
> Find collection of known anti-phishing extensions for Firefox
> Tyler Close
> 2006-11-21
> 
> ACTION-33
> CLOSED
> Draft goals / non-goals section
> Phillip Hallam-Baker
> 2006-12-07
> 
> ACTION-37
> CLOSED
> Review widget spec
> Thomas Roessler
> 2006-12-12
> 
> ACTION-38
> CLOSED
> Include trusted computing base with scope and/or goals/non-goals
> Mary Ellen Zurko
> 2006-12-12
> 
> 
> ACTION-42
> CLOSED
> Propose draft language to capture "how to begin secure communication"
> Mike Beltzner
> 2006-12-19
> 
> 
> ACTION-49
> CLOSED
> Amend in-scope to reflect consistency of user experiences, warning levels, 
> etc
> Mike Beltzner
> 2006-12-19
> 
> 
> ACTION-50
> CLOSED
> Add mobile device text to scope text in wiki 
> Stephen Farrell
> 2006-12-20
> 
> 
> ACTION-51
> CLOSED
> Draft "out-of-scope" text for proxies etc that do not involve human 
> interaction
> Stephen Farrell
> 2006-12-26
> 

In addition, Hal asked that the following actions be considered done:

ACTION-53, Hal to Edit out content blocking part

ACTION-62, Hal to Re-draft "Recommendation for Consistent
Presentation of Security Information" to reflect discussion about
http://www.w3.org/mid/D0C847B2BD75414090045D8C7EA3D59402E1469E@repbex01.amer.bea.com


> 4) Use Case discussion
> 
> As Thomas pointed out in our last synchronous meeting, our use cases are 
> not yet aligned with our goals. We'll discuss which use cases we need to 
> flesh out that section for the first full draft. 
> 
> 
> 5) Next meeting - January 16
> 
> We need to flesh out the part of the f2f agenda that will get the 
> Recommendation started. Examples to base it on are solicited: 
> http://lists.w3.org/Archives/Public/public-wsc-wg/2006Dec/0182.html
> 

-- 
Thomas Roessler, W3C  <tlr@w3.org>

Received on Tuesday, 9 January 2007 10:58:52 UTC