W3C home > Mailing lists > Public > public-wsc-wg@w3.org > November 2007

Transition announcements: FPWD of xit, LC of usecases, and publication of threats

From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
Date: Fri, 9 Nov 2007 16:36:30 -0500
To: public-wsc-wg@w3.org
Message-ID: <OFB88DCB4C.2FEAE2CB-ON8525738E.0076AC4F-8525738E.0076B315@LocalDomain>
fyi

          Mez

Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect

----- Forwarded by Mary Ellen Zurko/Westford/IBM on 11/09/2007 04:36 PM 
-----

From:
Mary Ellen Zurko/Westford/IBM
To:
chairs@w3.org
Date:
11/09/2007 04:36 PM
Subject:
Transition announcements: FPWD of xit, LC of usecases, and publication of 
threats 



The Web Security Context WG announces the publication transitions of  the 
following three documents. 

==========================================================

Web Security Context: Experience, Indicators, and Trust
W3C Working Draft 1 November 2007
This version:
     http://www.w3.org/TR/2007/WD-wsc-xit-20071101/
Latest version:
     http://www.w3.org/TR/wsc-xit/

First Public Working Draft transition announcement. 
[This is a Recommendation-track specification.]
Transition request:
http://lists.w3.org/Archives/Member/chairs/2007OctDec/0053.html


Abstract
This specification defines guidelines and requirements for the 
presentation and communication of Web security context information to 
end-users; ceremonies for secure data entry; and good practices for Web 
Site authors. 
Status of this Document
This section describes the status of this document at the time of its 
publication. Other documents may supersede this document. A list of 
current W3C publications and the latest revision of this technical report 
can be found in the W3C technical reports index at http://www.w3.org/TR/.
This is a First Public Working Draft of "Web Security Context: Experience, 
Indicators, and Trust".
The Web Security Context Working Group is publishing this document to 
provide a basis for initial review of and commentary on its work. The 
Working Group has taken an inclusive approach toward publishing various 
technical proposals in this First Public Working Draft. Inclusion of 
technical material in this document does not indicate group consensus 
about that material; some requirements stipulated in this document are 
known to be mutually exclusive. No claims as to the efficacy of 
usability-related material are made.
To facilitate access to relevant background, various sections of this 
document are annotated with references to input documents that are 
available from the the Working Group's Wiki, and to pertinent issues that 
the group is tracking. The documents in the wiki include background, 
motivation, and usability concerns on the proposals that reference them. 
They provide important context for understanding the potential utility of 
the proposals.
The Working Group expects to advance this Working Draft to Recommendation 
Status.
Please send comments about this document to 
public-usable-authentication@w3.org (with public archive).
Publication as a Working Draft does not imply endorsement by the W3C 
Membership. This is a draft document and may be updated, replaced or 
obsoleted by other documents at any time. It is inappropriate to cite this 
document as other than work in progress.
This document was produced by a group operating under the 5 February 2004 
W3C Patent Policy. W3C maintains a public list of any patent disclosures 
made in connection with the deliverables of the group; that page also 
includes instructions for disclosing a patent. An individual who has 
actual knowledge of a patent which the individual believes contains 
Essential Claim(s) must disclose the information in accordance with 
section 6 of the W3C Patent Policy.

==========================================================

Web Security Experience, Indicators and Trust: Scope and Use Cases
W3C Working Draft 1 November 2007
This version:
     http://www.w3.org/TR/2007/WD-wsc-usecases-20071101/
Latest version:
     http://www.w3.org/TR/wsc-usecases/

[This will become a WG Note.]

The WSC WG has resolved to move the wsc-usecases note to Last Call:
http://lists.w3.org/Archives/Public/public-wsc-wg/2007Oct/0176.html
The WSC WG charter is at:
http://www.w3.org/2005/Security/wsc-charter


Abstract
This Note refines the objectives for the Web Security Context Working 
Group deliverables. It elaborates upon the group's Charter [WSC-CHARTER] 
to explain what the group aims to achieve, what technologies may be used 
and how technical proposals will be evaluated. This elaboration is limited 
to the group's technical work and does not cover additional activities the 
group intends to engage in, such as ongoing outreach and education.
This Note also includes an initial collection of use cases that the group 
expects will drive its technical work.
Since this Note discusses the assumptions, goals, and processes the group 
will use to develop its recommendations, the intended audience is similiar 
to that of the charter of the Working Group; group members, the W3C 
community, developers of web user agents, web content providers (server 
administrators), and parties interested and engaged in what the Web 
Security Context Working Group's plans and directions are. It is 
explicitly not targeted at the presumed beneficiaries of the group's work, 
the users of the web, and it is not expected that an average user would be 
able to read this document and understand it.
Status of this Document
This section describes the status of this document at the time of its 
publication. Other documents may supersede this document. A list of 
current W3C publications and the latest revision of this technical report 
can be found in the W3C technical reports index at http://www.w3.org/TR/.
This is a Last Call Working Draft of "Web Security Experience, Indicators 
and Trust: Scope and Use Cases". The W3C Membership and other interested 
parties are invited to review the document and send comments to 
public-usable-authentication@w3.org (with public archive) through 30 
November 2007.
After addressing any issues raised as part of last call feed-back to this 
document, the Working Group will publish its final version as a W3C 
Working Group Note.
This document was produced by the Web Security Context Working Group, as 
part of the Security Activity.
Publication as a Working Draft does not imply endorsement by the W3C 
Membership. This is a draft document and may be updated, replaced or 
obsoleted by other documents at any time. It is inappropriate to cite this 
document as other than work in progress.
This document was produced by a group operating under the 5 February 2004 
W3C Patent Policy. The group does not expect this document to become a W3C 
Recommendation. W3C maintains a public list of any patent disclosures made 
in connection with the deliverables of the group; that page also includes 
instructions for disclosing a patent. An individual who has actual 
knowledge of a patent which the individual believes contains Essential 
Claim(s) must disclose the information in accordance with section 6 of the 
W3C Patent Policy.


==========================================================

In addition, we are publishing wsc-threats as a Note: 

Web User Interaction: Threat Trees
W3C Working Group Note 1 November 2007
This version:
     http://www.w3.org/TR/2007/NOTE-wsc-threats-20071101/
Latest version:
     http://www.w3.org/TR/wsc-threats/

Abstract
This Note includes threat trees used to analyze the threats that the 
[WSC-XIT] responds to. It is a companion document to [WSC-USECASES]. 
Status of this Document
This section describes the status of this document at the time of its 
publication. Other documents may supersede this document. A list of 
current W3C publications and the latest revision of this technical report 
can be found in the W3C technical reports index at http://www.w3.org/TR/.
This document is published as a companion document to [WSC-USECASES], to 
make some of the group's analysis available to a larger public.
This document was developed by the Web Security Context Working Group.
The content of this document is mostly analytic. This document is 
published as a snapshot, and may be updated and changed as needed when the 
Working Group's analysis develops further.
Please send comments about this document to 
public-usable-authentication@w3.org (with public archive).
Publication as a Working Group Note does not imply endorsement by the W3C 
Membership. This is a draft document and may be updated, replaced or 
obsoleted by other documents at any time. It is inappropriate to cite this 
document as other than work in progress.
This document was produced by a group operating under the 5 February 2004 
W3C Patent Policy. W3C maintains a public list of any patent disclosures 
made in connection with the deliverables of the group; that page also 
includes instructions for disclosing a patent. An individual who has 
actual knowledge of a patent which the individual believes contains 
Essential Claim(s) must disclose the information in accordance with 
section 6 of the W3C Patent Policy.

==========================================================


Mary Ellen Zurko for the Web Security Context Working Group 
Received on Friday, 9 November 2007 21:36:47 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Tuesday, 5 February 2008 03:52:53 GMT