- From: Thomas Roessler <tlr@w3.org>
- Date: Tue, 9 Jan 2007 11:59:33 +0100
- To: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Cc: public-wsc-wg@w3.org
On 2007-01-05 15:04:51 -0500, Mary Ellen Zurko wrote: > > Web Security Context (WSC) Call Agenda > > Calling information: > 09 Jan 2007 (Happy New Year) > 10:00am-11:00am Eastern time/ 15:00-16:00 UTC > http://lists.w3.org/Archives/Member/member-wsc-wg/2006Nov/0017.html > > Reminder - drafted sections of the Note are due 2 days after this meeting. > > > Agenda: > > 1) Pick a scribe > http://www.w3.org/2006/WSC/scribes > > 2) Approve minutes from last meeting: > http://www.w3.org/2007/01/02-wsc-minutes > > 3) Newly closed action items > > ACTION-8 > CLOSED > Formalize use case around user contacting one site, then getting > re-directed to another (as part of a federation of organziations working > together, legitimately), how does the user trust where they landed on? > Hal Lockhart > 2006-11-21 > > ACTION-18 > CLOSED > Formalize the need to be able to understand/visualize the "strength" of > SSL protection in place > Bill Doyle > 2006-11-21 > > ACTION-23 > CLOSED > Find out more about Opera\\\\'s numeric trust indicator > Michael Smith > 2006-11-22 > > ACTION-30 > CLOSED > Find collection of known anti-phishing extensions for Firefox > Tyler Close > 2006-11-21 > > ACTION-33 > CLOSED > Draft goals / non-goals section > Phillip Hallam-Baker > 2006-12-07 > > ACTION-37 > CLOSED > Review widget spec > Thomas Roessler > 2006-12-12 > > ACTION-38 > CLOSED > Include trusted computing base with scope and/or goals/non-goals > Mary Ellen Zurko > 2006-12-12 > > > ACTION-42 > CLOSED > Propose draft language to capture "how to begin secure communication" > Mike Beltzner > 2006-12-19 > > > ACTION-49 > CLOSED > Amend in-scope to reflect consistency of user experiences, warning levels, > etc > Mike Beltzner > 2006-12-19 > > > ACTION-50 > CLOSED > Add mobile device text to scope text in wiki > Stephen Farrell > 2006-12-20 > > > ACTION-51 > CLOSED > Draft "out-of-scope" text for proxies etc that do not involve human > interaction > Stephen Farrell > 2006-12-26 > In addition, Hal asked that the following actions be considered done: ACTION-53, Hal to Edit out content blocking part ACTION-62, Hal to Re-draft "Recommendation for Consistent Presentation of Security Information" to reflect discussion about http://www.w3.org/mid/D0C847B2BD75414090045D8C7EA3D59402E1469E@repbex01.amer.bea.com > 4) Use Case discussion > > As Thomas pointed out in our last synchronous meeting, our use cases are > not yet aligned with our goals. We'll discuss which use cases we need to > flesh out that section for the first full draft. > > > 5) Next meeting - January 16 > > We need to flesh out the part of the f2f agenda that will get the > Recommendation started. Examples to base it on are solicited: > http://lists.w3.org/Archives/Public/public-wsc-wg/2006Dec/0182.html > -- Thomas Roessler, W3C <tlr@w3.org>
Received on Tuesday, 9 January 2007 10:58:52 UTC