- From: Robert Yonaitis <ryonaitis@hisoftware.com>
- Date: Tue, 17 Apr 2007 19:30:40 -0400
- To: "Mary Ellen Zurko" <Mary_Ellen_Zurko@notesdev.ibm.com>, "Web Security Context WG" <public-wsc-wg@w3.org>
- Message-ID: <AAD1044DDFFCC84895A899314A72FB6CFFF3F4@be04.exg3.exghost.com>
Hello:
I am actually looking at all of this now and I think I am coming to the
same conclusions on many and I am working at trying to understand the
scope of the document/group better this evening. I am leaving for
eastern Europe on Thursday so I should have all comments back by then.
Thank You,
Rob Yonaitis
Yonaitis.com
________________________________
From: public-wsc-wg-request@w3.org [mailto:public-wsc-wg-request@w3.org]
On Behalf Of Mary Ellen Zurko
Sent: Tuesday, April 17, 2007 2:00 PM
To: Web Security Context WG
Subject: Re: ISSUE-36: presentation norms -- no oneSizeFitsAll (from
public comments)
I think from the number of times we and others have fallen into
confusion, we need another item for out of scope, that covers security
context information about the user to the site/server/service. I
propose:
5.n Other Security Challenges
As stated in the charter, the mission of the Web Security Context
Working Group is to specify a baseline set of security context
information that should be accessible to Web users, and practices for
the secure and usable presentation of this information, to enable users
to come to a better understanding of the context that they are operating
in when making trust decisions on the Web. While the work this group
does may have a positive and beneficial effect on other security
challenges on the web, directly addressing such challenges (including
user authentication to web sites, single sign-on, and security models
for active content on the web) are out of scope.
I propose making it the first item in the Out of Scope section.
I would also like to be sure that this group is appropriately informed
about any deployed or standards based efforts that condition
presentation to users (since it might impact how security context should
be conditioned). I can't tell from the IMG Global Learning Consortium
link that Al gave if it has any particular traction:
http://www.imsglobal.org/accessibility/
Is anyone on this WG familiar with that work, or that area in general?
Robert Y, are you?
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
Web Security Context Issue Tracker <dean+cgi@w3.org>
Sent by: public-wsc-wg-request@w3.org
04/15/2007 10:45 AM
Please respond to
Web Security Context WG <public-wsc-wg@w3.org>
To
public-wsc-wg@w3.org
cc
Subject
ISSUE-36: presentation norms -- no oneSizeFitsAll (from public comments)
ISSUE-36: presentation norms -- no oneSizeFitsAll (from public comments)
http://www.w3.org/2006/WSC/Group/track/issues/36
Raised by: Bill Doyle
On product: All
>From public comments
raised by: Al Gilman Alfred.S.Gilman@ieee.org
http://lists.w3.org/Archives/Public/public-usable-
authentication/2007Apr/0000.html
presentation norms -- no oneSizeFitsAll
where it says, in 2.3 Consistent presentation of security information
The Working Group will recommend a set of terms, indicators and
metaphors for consistent presentation of security information to
users, across all web user agents. For each of these items, the
Working Group will describe the intended user interpretation, as
well as safe actions the user may respond with in common use cases.
please consider
The desired user interpretation of decisions and evidence are
fundamental;
this belongs in the model. It should not be limited to the 'normal
mode'
dialog that is in the projection of the full model that is discussed
above.
The presentation suggestions may be limited to the 'normal mode'
projection.
But what the user should understand if they drill down deeper or skim
more
lightly should be covered, not limited to the suggested summary dialog.
Yes,
you want to introduce some terms and icons and the like whose consistent
use
will enhance recognition of security information when it crosses the
user's
bow. But these are not the only prosodic tools that should be used to
convey
this role in the web-dialog scene or world-let.
Why?
In consideration of the diverse presentation and actuation bindings that
are
required so that people with disabilities are afforded access to
information
devices and services, realize that it is essential to define the
intended
interpretation, which is of broad applicability, and then under
specified
modality conditions indicate suggested representations.
Please consider
The IMS Global Learning Consortium has established a baseline of
metadata for
both content and personal preferences. Even 'though there is still
contention
as to how single-sign-on should work, it is very broadly agreed that we
need
this. Single-sign-on will give us a convenient way to manage the
affordance
of portable, personal preferences to qualifying sites. Where these
preferences are available, they should in particular be used up front to
condition the presentation of any sign-on dialog. Single-sign-on with
the
identity host brokering not only user authentication but presentation
preferences is too important a user case for people with disabilities
for this
use case to be left out of your plans, even if single-sign-on is not yet
pervasive in Web practice.
The information in this transmittal (including attachments, if any) is privileged and confidential and is intended only for the recipient(s) listed above. Any review, use, disclosure, distribution or copying of this transmittal is prohibited except by or on behalf of the intended recipient. If you have received this transmittal in error, please notify me immediately by reply email and destroy all copies of the transmittal. Thank you.
Received on Tuesday, 17 April 2007 23:30:13 UTC