- From: Thomas Roessler <tlr@w3.org>
- Date: Fri, 17 Nov 2006 16:39:37 +0100
- To: public-wsc-wg@w3.org
Hello, the current list of action items is available online at [1]. Below the .signature, I'm including a quick text version for your reference. 1. http://www.w3.org/2006/WSC/track/actions -- Thomas Roessler, W3C <tlr@w3.org> http://www.w3.org/2006/WSC/track/actions/1 ACTION-1 CLOSED Link tracker from Group page Thomas Roessler 2006-11-21 http://www.w3.org/2006/WSC/track/actions/2 ACTION-2 OPEN Organize call with APWG to discuss liaison mechanisms with WSCWG Thomas Roessler 2006-11-21 http://www.w3.org/2006/WSC/track/actions/3 ACTION-3 CLOSED Contribute use cases for Note Stephen Farrell 2006-11-21 http://www.w3.org/2006/WSC/track/actions/4 ACTION-4 OPEN Formalize the scenario of user getting a request via e-mail and using that information to contact a web-site using HTTP protocol (e.g. using a browser) Phillip Hallam-Baker 2006-11-21 http://www.w3.org/2006/WSC/track/actions/5 ACTION-5 OPEN Formalize the use case of mis-typing a URL (and various variants - been there before, not been there before) Mary Ellen Zurko 2006-11-21 http://www.w3.org/2006/WSC/track/actions/6 ACTION-6 OPEN Formalize the statement regarding users not relying on information within URL strings for establishing context (or security context) Tyler Close 2006-11-21 http://www.w3.org/2006/WSC/track/actions/7 ACTION-7 CLOSED Work out impact of redirection scenarios Hal Lockhart 2006-11-21 http://www.w3.org/2006/WSC/track/actions/8 ACTION-8 OPEN Formalize use case around user contacting one site, then getting re-directed to another (as part of a federation of organziations working together, legitimately), how does the user trust where they landed on? Hal Lockhart 2006-11-21 http://www.w3.org/2006/WSC/track/actions/9 ACTION-9 OPEN Formalize the use case of content providers using the same icons as are typically used in the "chrome area" and thus diluting the meaning of such visual aids Michael Smith 2006-11-21 http://www.w3.org/2006/WSC/track/actions/10 ACTION-10 CLOSED Find mobile browser vendors to recruit to group Michael Smith 2006-11-21 http://www.w3.org/2006/WSC/track/actions/11 ACTION-11 OPEN Formalize a use case for using a browser on a shared device (e.g. kiosk device). Examples of kiosks intra-enterprise, hotel lobbies, Kinko\\'s, libraries. Hal Lockhart 2006-11-21 http://www.w3.org/2006/WSC/track/actions/12 ACTION-12 OPEN List, by enumeration, what is meant by security context information Hal Lockhart 2006-11-21 http://www.w3.org/2006/WSC/track/actions/13 ACTION-13 OPEN Elaborate on multiple certificates & domains for session servers case Tyler Close 2006-11-21 http://www.w3.org/2006/WSC/track/actions/14 ACTION-14 CLOSED Write up use case of session servers and having critical information invariant in order to be useful. Hal Lockhart 2006-11-21 http://www.w3.org/2006/WSC/track/actions/15 ACTION-15 OPEN Produce use case story for kiosk case that is in scope (action can be discharged by declaring defeat) Mary Ellen Zurko 2006-11-21 http://www.w3.org/2006/WSC/track/actions/16 ACTION-16 OPEN Formalize the use case of flowing security information as a part of the document mark up (as in XML marked up content information). Yakov Sverdlov 2006-11-21 http://www.w3.org/2006/WSC/track/actions/17 ACTION-17 OPEN Give a demonstration of "pet name" annotation of bookmarks plug-in Tyler Close 2006-11-21 http://www.w3.org/2006/WSC/track/actions/18 ACTION-18 OPEN Formalize the need to be able to understand/visualize the "strength" of SSL protection in place Bill Doyle 2006-11-21 http://www.w3.org/2006/WSC/track/actions/19 ACTION-19 OPEN Formalize a user-facing use case for WS-Security (e.g. use of WS-SecureConversation) Tim Hahn 2006-11-21 http://www.w3.org/2006/WSC/track/actions/20 ACTION-20 OPEN Put together set of background references Mary Ellen Zurko 2006-11-22 http://www.w3.org/2006/WSC/track/actions/21 ACTION-21 OPEN Help MEZ with ACTION-20 Maritza Johnson 2006-11-22 http://www.w3.org/2006/WSC/track/actions/22 ACTION-22 OPEN Produce voice browser use case Brandon Porter 2006-11-22 http://www.w3.org/2006/WSC/track/actions/23 ACTION-23 OPEN Find out more about Opera\\'s numeric trust indicator Michael Smith 2006-11-22 http://www.w3.org/2006/WSC/track/actions/24 ACTION-24 OPEN Set up Wiki for group use Thomas Roessler 2006-11-22 http://www.w3.org/2006/WSC/track/actions/25 ACTION-25 CLOSED Set up CVS access for Tyler Thomas Roessler 2006-11-22 http://www.w3.org/2006/WSC/track/actions/26 ACTION-26 OPEN Dig out papers about authenticating browser password entry dialogues to users Mary Ellen Zurko 2006-11-22 http://www.w3.org/2006/WSC/track/actions/27 ACTION-27 OPEN review requirements from workshop record Hal Lockhart 2006-12-05 http://www.w3.org/2006/WSC/track/actions/28 ACTION-28 CLOSED Clean up minutes Thomas Roessler 2006-11-22 http://www.w3.org/2006/WSC/track/actions/29 ACTION-29 OPEN Rob Franco to formalize the use case of an attacker messing with the information in the address bar and confusing the user. Thomas Roessler 2006-11-21 http://www.w3.org/2006/WSC/track/actions/30 ACTION-30 OPEN Find collection of known anti-phishing extensions for Firefox Tyler Close 2006-11-21
Received on Friday, 17 November 2006 16:38:17 UTC