- From: Close, Tyler J. <tyler.close@hp.com>
- Date: Wed, 8 Aug 2007 23:17:31 -0000
- To: "Mary Ellen Zurko" <Mary_Ellen_Zurko@notesdev.ibm.com>, <wdoyle@mitre.org>
- Cc: <public-wsc-wg@w3.org>
- Message-ID: <08CA2245AFCF444DB3AC415E47CC40AFDD6E55@G3W0072.americas.hpqcorp.net>
I've added the quoted CYA section to the Out of scope section of the Note. See: http://www.w3.org/2006/WSC/drafts/note/Overview.html#out-of-scope-other Tyler ________________________________ From: Mary Ellen Zurko [mailto:Mary_Ellen_Zurko@notesdev.ibm.com] Sent: Wednesday, August 01, 2007 4:57 AM To: wdoyle@mitre.org Cc: Close, Tyler J. Subject: RE: ISSUE-38: no safe haven in presentation space (from publiccomments) Tyler? (Bill, the editors tend to own and know answers to questions like these) Mez RE: ISSUE-38: no safe haven in presentation space (from publiccomments) Doyle, Bill to: tyler.close, Thomas Roessler 07/30/2007 03:08 PM Sent by: public-wsc-wg-request@w3.org Cc: public-wsc-wg ________________________________ OK - I am late This text is going to be incorporated in what version of the note? Just wanted to make sure before Al gets update on action item Regards Bill D. 5.n Other Security Challenges > > > > As stated in the [http://www.w3.org/2005/Security/wsc-charter charter], > > the mission of the Web Security Context Working > > Group is to specify a baseline set of security context information that > > should be accessible to Web users, and practices for the secure and usable > > > > presentation of this information, to enable users to come to a better > > understanding of the context that they are operating in when making trust > > decisions on the Web. While the work this group does may have a positive > > and beneficial effect on other security challenges on the web, directly > > addressing such challenges is out of scope. Examples listed are listed in > > [http://www.w3.org/2006/WSC/drafts/note/#out-of-scope Out of Scope], > > including > > [http://www.w3.org/2006/WSC/drafts/note/#vaporware protocols and data > > formats] and [http://www.w3.org/2006/WSC/drafts/note/#XSS content > > production exploits]. These examples are not > > exhaustive. -----Original Message----- From: Thomas Roessler [mailto:tlr@w3.org] Sent: Thursday, July 19, 2007 8:16 AM To: tyler.close@hp.com; Doyle, Bill Cc: public-wsc-wg@w3.org Subject: Re: ISSUE-38: no safe haven in presentation space (from publiccomments) As resolved on our 18 July call, this issue is closed. [1] Tyler, please make the proposed change to the note and mark the issue closed in tracker afterwards. Thanks, -- Thomas Roessler, W3C <tlr@w3.org> On 2007-07-11 14:13:37 +0200, Thomas Roessler wrote: > From: Thomas Roessler <tlr@w3.org> > To: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com> > Cc: public-wsc-wg@w3.org > Date: Wed, 11 Jul 2007 14:13:37 +0200 > Subject: Re: ISSUE-38: no safe haven in presentation space (from public > comments) > X-Spam-Level: > X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.1.5 > > On 2007-06-15 16:45:39 -0400, Mary Ellen Zurko wrote: > > > I said I'd try to add more strength and clarity to the text of > > "directly addressing", as Bill and Tyler requested. Here's my > > next iteration of the proposal: > > I like this text, and would suggest that (a) we include it with the > note, (b) close this issue. We'll also want to let Al know of the > disposition of his comment. > > > 5.n Other Security Challenges > > > > As stated in the [http://www.w3.org/2005/Security/wsc-charter charter], > > the mission of the Web Security Context Working > > Group is to specify a baseline set of security context information that > > should be accessible to Web users, and practices for the secure and usable > > > > presentation of this information, to enable users to come to a better > > understanding of the context that they are operating in when making trust > > decisions on the Web. While the work this group does may have a positive > > and beneficial effect on other security challenges on the web, directly > > addressing such challenges is out of scope. Examples listed are listed in > > [http://www.w3.org/2006/WSC/drafts/note/#out-of-scope Out of Scope], > > including > > [http://www.w3.org/2006/WSC/drafts/note/#vaporware protocols and data > > formats] and [http://www.w3.org/2006/WSC/drafts/note/#XSS content > > production exploits]. These examples are not > > exhaustive. > > > > -- > Thomas Roessler, W3C <tlr@w3.org> > >
Received on Wednesday, 8 August 2007 23:19:04 UTC