- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Thu, 26 Apr 2007 10:39:01 -0400
- To: public-wsc-wg@w3.org
Received on Thursday, 26 April 2007 14:42:06 UTC
No discussion for more than a week, but this one is a two parter.
First part, editors will add the suggestions to our exhaustive list:
http://lists.w3.org/Archives/Public/public-wsc-wg/2007Mar/0147.html
Second part:
I propose the following change based on the discussion for ISSUE-20 and
ISSUE-28:
This section provides an exhaustive enumeration of the security
information that is known by the working group to be in scope for this
Working Group and so available for use in recommendations.
I believe that retains as much of the provocation as possible while
becoming more defensibly accurate.
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
Received on Thursday, 26 April 2007 14:42:06 UTC