[tracker only] ACTION-275

ACTION-275 is done by Ian.  I don't know why it doesn't show up in
tracker, and hope this message at least will end up in tracker's
list of related messages.

I've also reassigned ACTION-275 to Ian.

Sorry for the noise.
-- 
Thomas Roessler, W3C  <tlr@w3.org>







On 2007-08-03 13:34:19 -0500, Anil Saldhana wrote:
> From: Anil Saldhana <Anil.Saldhana@redhat.com>
> To: Ian Fette <ifette@google.com>
> Cc: Web Security Context WG <public-wsc-wg@w3.org>
> Date: Fri, 03 Aug 2007 13:34:19 -0500
> Subject: Re: ACTION-275
> List-Id: <public-wsc-wg.w3.org>
> X-Spam-Level: 
> X-Archived-At: http://www.w3.org/mid/46B3752B.7000505@redhat.com
> X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.1.5
> 
>
> Ian,
>  can you point me to the use case 19 that you refer to?
>
> Anil
>
> Ian Fette wrote:
>> Hi all,
>>
>> I took on an action item to create a new use case for notifying a user that 
>> a site they've previously visited is now blacklisted. I sent this out and 
>> there didn't seem to be much contention, the only reply was a "looks good" 
>> from Dan Schutzer and a polite email from Mez telling me that the subject 
>> should have been "ACTION-275". As such, I'm re-sending this, mostly for the 
>> tracker, with the correct subject. If you have any concerns with the below 
>> use case, please feel free to bring them up, otherwise I'd like to get this 
>> use case added into the Scope and Use Cases document.
>>
>>
>> Betty tries to connect to a web site at <http://www.example.com/>. She 
>> visits this site frequently to read various news and articles. Since her 
>> last visit, the site example.com <http://example.com/> has been compromised 
>> by some method, and visitors are now being infected with malware. A 
>> blacklist used by her user agent has since listed example.com 
>> <http://example.com/> as a known bad site, what warnings should Betty be 
>> presented with?
>>
>> Destination Site
>> - Known, Prior visit
>> Navigation
>> - any
>> Intended interaction
>> - Information retrieval
>> Actual interaction
>> - software installation
>> Note
>> - This is slightly different than use case 19. It still deals with how to 
>> present results obtained from reputation services, but in the case of a 
>> user returning to a site that they believe to be "good" when that site is 
>> now believed to be compromised.
>>
>> Thanks,
>> Ian Fette
>
> -- 
> Anil Saldhana
> Project/Technical Lead,
> JBoss Security & Identity Management
> JBoss, A division of Red Hat Inc.
> http://labs.jboss.com/portal/jbosssecurity/
>
>
>

Received on Wednesday, 8 August 2007 12:38:59 UTC