- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Wed, 27 Dec 2006 08:40:13 -0500
- To: public-wsc-wg@w3.org
Received on Wednesday, 27 December 2006 13:40:20 UTC
We'll divide the meeting into two parts. In the first, we'll work through
any large remaining issues in the substance of our Note. In the second,
we'll get started on our Recommendation(s).
I'll structure the second part of our agenda around examples; examples of
display of security context information (good, bad, ugly), and examples of
techniques aimed (at least in part) at secure and usable presentation of
security context information. I've put a section in RecommendationStuff
in our wiki for people to put links to suggestions of existing display
techniques:
http://www.w3.org/2006/WSC/wiki/RecommendationStuff
Please put in suggestions, particularly of examples we can derive
recommendations from.
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
Received on Wednesday, 27 December 2006 13:40:20 UTC