- From: Frederick Hirsch via cvs-syncmail <cvsmail@w3.org>
- Date: Fri, 18 Jun 2010 23:23:45 +0000
- To: public-dap-commits@w3.org
Update of /sources/public/2009/dap/policy
In directory hutz:/tmp/cvs-serv5831
Modified Files:
Framework.html
Log Message:
fix validation errors
Index: Framework.html
===================================================================
RCS file: /sources/public/2009/dap/policy/Framework.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -d -r1.7 -r1.8
--- Framework.html 18 Jun 2010 23:20:20 -0000 1.7
+++ Framework.html 18 Jun 2010 23:23:42 -0000 1.8
@@ -83,7 +83,7 @@
<dl>
<dt>
<dfn id="feature">feature</dfn></dt>
-<dd> <p> A <dfn id="feature">feature</dfn> is the unit of expression of
+<dd> <p> A feature is the unit of expression of
dependencies by web applications. (This definition needs clarification).
</p>
</dd>
@@ -103,7 +103,7 @@
An example of a feature IRI would be: TBD </p>
<div class="issue">
<p>Need to define: what constitues a feature, how/where features
- IRIs are defined, feature IRI examples. See BONDI A&S document,
+ IRIs are defined, feature IRI examples. See BONDI A&S document,
pages 31 and 32.</p></div>
</section>
<section id="capabilities">
@@ -111,7 +111,7 @@
<dl>
<dt>
<dfn id="device-capability">device capability</dfn>
-<dd> <p> A <dfn id="device-capability">device capability</dfn> is a
+<dd> <p> A device capability is a
device resource or device functionality
that may require access control.
</p>
@@ -275,7 +275,6 @@
the PAP, although this may be in scope for later phases. The security policy
itself is not defined by DAP, although a default policy may be recommended by
DAP at a future stage.</p></div>
- </p>
<p>
The functionality required in each of these components is
specified in terms of the following <strong>entities</strong>:
@@ -337,7 +336,7 @@
access. Resource attributes serve as input of access control
policies.</p>
<p> The device features or services (e.g. the location module or PIM
- database) are the actual <strong><em><a id="resource">resources</a></em></strong> that are being protected, but from
+ database) are the actual resources that are being protected, but from
the point of view of the security framework these resources
are associated with the API features and device capabilities used to
access them.
@@ -362,7 +361,7 @@
reflects the state of that application at the time an
associated trust domain or access control query is made. The defined
execution phases are listed below. </p> <table
- border="1" summary=""> <caption> <dfn
+ border="1" > <caption> <dfn
id="execution-phases-table">Execution Phases
Table</dfn></caption> <thead> <tr> <th
scope="col">Execution Phase</th> <th
Received on Friday, 18 June 2010 23:23:46 UTC