- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Thu, 12 Apr 2007 17:05:15 -0400
- To: "Stuart E. Schechter" <ses@ll.mit.edu>
- Cc: public-wsc-wg@w3.org
Received on Thursday, 12 April 2007 21:05:20 UTC
For tracker. Mez Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) Lotus/WPLC Security Strategy and Patent Innovation Architect "Stuart E. Schechter" <ses@ll.mit.edu> 04/09/2007 09:24 AM To Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com> cc Subject Re: ACTION-172 OPEN Map threat trees to use case dimensions Stuart Schechter 2007-04-04 I consider this closed, but perhaps I should have made the case for what I think should happen from here. (I have read the note. I'm just not sure where to begin commenting on it since my problems are less with small points and more that I don't understand the overall goals and approach.) > From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com> > Date: Mon, 9 Apr 2007 08:26:13 -0400 > To: <ses@ll.mit.edu> > Subject: ACTION-172 OPEN Map threat trees to use case dimensions Stuart > Schechter 2007-04-04 > > Please update with a date you believe in. > > > ACTION-172 > OPEN > Map threat trees to use case dimensions > Stuart Schechter > 2007-04-04 > > Mez > > Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) > Lotus/WPLC Security Strategy and Patent Innovation Architect >
Received on Thursday, 12 April 2007 21:05:20 UTC