- From: Thomas Roessler <tlr@w3.org>
- Date: Wed, 8 Aug 2007 14:38:54 +0200
- To: Web Security Context WG <public-wsc-wg@w3.org>
ACTION-275 is done by Ian. I don't know why it doesn't show up in tracker, and hope this message at least will end up in tracker's list of related messages. I've also reassigned ACTION-275 to Ian. Sorry for the noise. -- Thomas Roessler, W3C <tlr@w3.org> On 2007-08-03 13:34:19 -0500, Anil Saldhana wrote: > From: Anil Saldhana <Anil.Saldhana@redhat.com> > To: Ian Fette <ifette@google.com> > Cc: Web Security Context WG <public-wsc-wg@w3.org> > Date: Fri, 03 Aug 2007 13:34:19 -0500 > Subject: Re: ACTION-275 > List-Id: <public-wsc-wg.w3.org> > X-Spam-Level: > X-Archived-At: http://www.w3.org/mid/46B3752B.7000505@redhat.com > X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.1.5 > > > Ian, > can you point me to the use case 19 that you refer to? > > Anil > > Ian Fette wrote: >> Hi all, >> >> I took on an action item to create a new use case for notifying a user that >> a site they've previously visited is now blacklisted. I sent this out and >> there didn't seem to be much contention, the only reply was a "looks good" >> from Dan Schutzer and a polite email from Mez telling me that the subject >> should have been "ACTION-275". As such, I'm re-sending this, mostly for the >> tracker, with the correct subject. If you have any concerns with the below >> use case, please feel free to bring them up, otherwise I'd like to get this >> use case added into the Scope and Use Cases document. >> >> >> Betty tries to connect to a web site at <http://www.example.com/>. She >> visits this site frequently to read various news and articles. Since her >> last visit, the site example.com <http://example.com/> has been compromised >> by some method, and visitors are now being infected with malware. A >> blacklist used by her user agent has since listed example.com >> <http://example.com/> as a known bad site, what warnings should Betty be >> presented with? >> >> Destination Site >> - Known, Prior visit >> Navigation >> - any >> Intended interaction >> - Information retrieval >> Actual interaction >> - software installation >> Note >> - This is slightly different than use case 19. It still deals with how to >> present results obtained from reputation services, but in the case of a >> user returning to a site that they believe to be "good" when that site is >> now believed to be compromised. >> >> Thanks, >> Ian Fette > > -- > Anil Saldhana > Project/Technical Lead, > JBoss Security & Identity Management > JBoss, A division of Red Hat Inc. > http://labs.jboss.com/portal/jbosssecurity/ > > >
Received on Wednesday, 8 August 2007 12:38:59 UTC