2009/dap/policy-reqs Overview.html,1.1,1.2

Update of /sources/public/2009/dap/policy-reqs
In directory hutz:/tmp/cvs-serv10911

Modified Files:
	Overview.html 
Log Message:
changes discussed at F2F, ACTION-49

Index: Overview.html
===================================================================
RCS file: /sources/public/2009/dap/policy-reqs/Overview.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -d -r1.1 -r1.2
--- Overview.html	27 Oct 2009 00:02:12 -0000	1.1
+++ Overview.html	8 Nov 2009 18:59:31 -0000	1.2
@@ -36,40 +36,34 @@
       <h2>Definitions</h2>
       <p>The following definitions are used in this document.</p>
       <dl>
-        <dt>application</dt>
+        <dt>Application</dt>
         <dd>Code that may make use of DAP APIs. This can be widgets, web
           applications running in a browser, for example. </dd>
-        <dt>API<dt>
+
+        <dt>API</dt>
           <dd>Collection of interfaces structured in terms of methods and
             properties used by applications to access device
-            functionality. Related interfaces may be grouped into
+            capabilities. Related interfaces may be grouped into
             modules. Interfaces may be defined using WebIDL. Note that
-            interfaces, by themselves, are not necessarily associated with a specific
-            device capability. For example, a Stream interface (providing serial read,
-            write and seek functionality) may be used to interact with a local file, or
-            a Bluetooth connection. Similarly, the DCCI API could be used to access a
-            wide range of different device capabilities through a common set of
-            interfaces.
+            interfaces, by themselves, are not necessarily associated
+            with a specific 
+            device capability. 
           </dd>
+        <dt>Feature</dt>
+        <dd>A Feature is a defined way 
+of accessing certain specified define capabilities using an associated API.</dd>
         <dt>device capability</dt>
         <dd>device resource or functionality requiring access
-          control. Examples of device capabilities are the ability to read a local
-          file, or to discover nearby Bluetooth devices, or to send an SMS
-          message.  In principle, device capabilities can be defined in a way that is
+          control.</dd>
+          <dd> Examples of device capabilities are the ability to
+          read a local 
+          file, or to discover nearby Bluetooth devices, or to send an
+          SMS 
+          message.  In principle, device capabilities can be defined
+          in a way that is 
           independent of the specific APIs that an application uses to access
-          them.  Note that a given API may require different
-          capabilities, as in this JavaME example:
-          Connector.open(&quot;file://sdcard/my_dog.jpg&quot;);
-
-          would use a &quot;local filesystem&quot; feature, whereas
-
-          Connector.open(&quot;btspp://<hostname>:<parameters>&quot;);
-
-              would use a &quot;Bluetooth serial port profile&quot; feature.
-
-        </dd> 
-        <dt>feature</dt>
-        <dd> is ability to use capability for a specific API</dd>
+          them.  
+        </dd>
       </dl>
     </section>
 
@@ -131,8 +125,8 @@
         <ul>
           <li>Access control policy MUST be stated in declarative manner.</li>
           <li>The DAP security framework MUST allow a flexible choice of
-            policy decisions for device capability and feature
-            access.</li>
+            policy decisions for feature
+            access to device capabilities.</li>
           <li>It MUST be possible to declare policy in XML
             language</li>
           <li>The DAP policy language MUST define an XML syntax for
@@ -193,29 +187,46 @@
           less inclined to take any security decision seriously, which further
           undermines the effectiveness of a user-driven access control system.
         </p><p>
-          There will unavoidably be situations, however, where the user is required to
-          make access control decisions when web applications wish to use sensitive
-          APIs. The key issue remains, therefore, and DAP needs to ensure a framework
-          is provided that allows it to happen, and maximizes its effectiveness,
-          rather than seeking to eliminate it altogether.
+          There will unavoidably be situations, however, where the
+          user is required to 
+          make access control decisions when web applications wish to
+          use sensitive 
+          APIs. The key issue remains, therefore, and DAP needs to
+          ensure a framework 
+          is provided that allows it to happen, and maximizes its
+          effectiveness, 
+          rather than seeking to eliminate it altogether. 
         </p><p>
-          Modal prompts (i.e. prompts that block all other user interaction until
-          dismissed) seriously compromise user experience and are avoidable.
+          Modal prompts (i.e. prompts that block all other user
+          interaction until 
+          dismissed) seriously compromise user experience and are
+          avoidable. 
         </p><p>
-          Any prompt or dialog that requests a user security decision at runtime (e.g.
-          at the time a sensitive action is attempted) can be non-modal if the API
-          that initiates it is asynchronous. DAP APIs must be designed so that all
-          operations that could potentially trigger a prompt are asynchronous.
+          Any prompt or dialog that requests a user security decision
+          at runtime (e.g. 
+          at the time a sensitive action is attempted) can be
+          non-modal if the API  
+          that initiates it is asynchronous. DAP APIs MUST be designed
+          so that all 
+          operations that could potentially trigger a prompt are
+          asynchronous. 
         </p><p>
-          If a sensitive operation requires some user interaction to initiate it (such
-          as choosing a file to upload, or pressing the shutter on a camera), then
-          this interaction can be arranged so that it is an implicit user
-          authorization. Whether or not this is possible depends on the operation or
-          API in question.
+        The semantics of some APIs can be defined such that they
+        require user interaction that is meaningful to the user, yet
+        also imply consent to the action. Such implicit consent
+        eliminates the need for a security access dialog entirely,
+        incorporating it into the application semantics. An example is
+        a camera API that enables the user to take a photograph, but
+        requires them to press a shutter key to do so. Another example
+        is an API that produces a message template, but requires the
+        user to press "send" to actually send the message.
         </p><p>
-          Given the wide range of possible valid means of eliciting user security
-          decisions, DAP should be minimally prescriptive about the user experience,
-          and should not assume that the same user experience is appropriate for every
+          Given the wide range of possible valid means of eliciting
+          user security 
+          decisions, DAP should be minimally prescriptive about the
+          user experience, 
+          and should not assume that the same user experience is
+          appropriate for every 
           API.
         </p>
       </section>

Received on Sunday, 8 November 2009 18:59:45 UTC