W3C home > Mailing lists > Public > public-wsc-wg@w3.org > April 2007

RE: ISSUE-47: define extension interface for content-scanning tools (public comment)

From: Doyle, Bill <wdoyle@mitre.org>
Date: Fri, 20 Apr 2007 00:20:21 -0400
Message-ID: <518C60F36D5DBC489E91563736BA4B5801691FB8@IMCSRV5.MITRE.ORG>
To: "Mary Ellen Zurko" <Mary_Ellen_Zurko@notesdev.ibm.com>, "Web Security Context WG" <public-wsc-wg@w3.org>
fixed the errors with issue 45 and issue 46.
text for 47 the duplicate was correct and closed - taken from issue 46 
Under "New security information", this is out of scope. 


	From: public-wsc-wg-request@w3.org
[mailto:public-wsc-wg-request@w3.org] On Behalf Of Mary Ellen Zurko
	Sent: Wednesday, April 18, 2007 4:44 PM
	To: Web Security Context WG
	Subject: Re: ISSUE-47: define extension interface for
content-scanning tools (public comment)
	Identical to ISSUE-46 - cut and paste error. 
	Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l
	Lotus/WPLC Security Strategy and Patent Innovation Architect
Web Security Context Issue Tracker <dean+cgi@w3.org> 
Sent by: public-wsc-wg-request@w3.org 

04/16/2007 06:46 AM 
Please respond to
Web Security Context WG <public-wsc-wg@w3.org>

ISSUE-47: define extension interface for content-scanning tools (public


	ISSUE-47: define extension interface for content-scanning tools
(public comment)
	Raised by: Bill Doyle
	On product: Note: use cases etc.
	>From public comments
	raised by: Al Gilman Alfred.S.Gilman@ieee.org
	define extension interface for content-scanning tools 
	where it says, in 5.5 Content based detection
	The Working Group will not recommend any checks on
	  the content served by web sites.
	please consider
	I don't think that you mean people shouldn't check signatures
on signed 
	content.  What I think that you mean is that the filter queries
or trip 
	for statistical techniques such as you discuss will not be
published by the 
	You should consider providing a programmatic interface (perhaps
a hypothesis 
	lattice compatible with what a voice recognizer looks like in
EMMA) for such 
	tools to contribute to rational decision making about when to
raise a warning, 
	and in addition an interface where they can contribute
message-content to the 
	security infoset.
	The free-content areas drive trust.  Confidence schemes work in
this domain.  
	So there is an enduring value-added niche for such techniques.
The group 
	should seek to define interfaces whereby third-party software
can contribute 
	its findings to the rollup summarized by your recommended
	Otherwise we will continue with the plethora of security
helpers waving 
	plackards in our faces.
Received on Friday, 20 April 2007 04:20:36 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 19:36:44 UTC