- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Mon, 11 Dec 2006 11:28:24 -0500
- To: tyler.close@hp.com
- Cc: public-wsc-wg@w3.org
- Message-ID: <OF64C49159.40AD7FDF-ON85257241.00596B22-85257241.005A7D91@LocalDomain>
As discussions with Thomas on the list have shown, they're certainly related. The former was meant to cover active anti spoofing functionality like comparing something about one site to something about another ("paypa1 is pretty close to paypal, or 95% of the images on this site are identical to a site you have bookmarked"). The latter was meant to get at more traditional intrusion or virus detect algorithms (sense of self, "signatures" of known attacks). Mez Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) Lotus/WPLC Security Strategy and Patent Innovation Architect "Close, Tyler J." <tyler.close@hp.com> Sent by: public-wsc-wg-request@w3.org 12/07/2006 08:32 PM To <public-wsc-wg@w3.org> cc Subject RE: What problems are we trying to solve? Hi Mez, Thanks, that was helpful. For now, I've summarized that point in the wiki as: "Any recommendation to prohibit the user from interacting with a web page" I also need more information on: "code based techniques to detect spoofing attacks" as well as how that relates to: "calculations, algorithms, and functions that attempt to determine whether or not an attack is underway" Are these two the same? Thanks, Tyler ________________________________ From: public-wsc-wg-request@w3.org [mailto:public-wsc-wg-request@w3.org] On Behalf Of Mary Ellen Zurko Sent: Thursday, December 07, 2006 3:05 PM To: Close, Tyler J. Cc: public-wsc-wg@w3.org Subject: RE: What problems are we trying to solve? Since our charter is recommendations on secure and usable presentation of web security context information, it does not cover recommendations on what browsers should do should they display or determine that web security context information indicates (the potential for) an attack. For example, stating whether or not users should be allowed to go to sites under particular circumstances would be out of charter. Mez "Close, Tyler J." <tyler.close@hp.com> Sent by: public-wsc-wg-request@w3.org 12/05/2006 02:08 PM To <public-wsc-wg@w3.org> cc Subject RE: What problems are we trying to solve? Mary Ellen Zurko wrote: > Out of scope: > * techniques to stop the user from taking an action because > an attack has been discovered Could you clarify the above item? Thanks, Tyler
Received on Monday, 11 December 2006 16:28:54 UTC