- From: Brad Porter <brad@tellme.com>
- Date: Mon, 22 Jan 2007 11:08:42 -0800
- To: Brad Porter <brad@tellme.com>
- Cc: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>, pbaker@verisign.com, W3 Work Group <public-wsc-wg@w3.org>
- Message-ID: <45B50BBA.30901@tellme.com>
It appears the wiki content has been incorporated in the NOTE already. I believe sections 4.1 (Non-web protocols) and 4.2 (Non-web user agents) are sufficient to cover the case. If we wanted to add ISDN/SSN to the non-web protocols section, we could, but it does not appear necessary. --Brad Brad Porter wrote: > Here's my proposed text. > > ================= > Out of scope: > - Security context information, controls, and authentication > information based on non-Internet protocols and data such as telephony > network protocols (SS7, ISDN, NANP) > ================= > > Unfortunately the term "non-Internet protocols" seems a little > underspecified, but gets to the intent of what we discussed on the > phone today. If anyone has better text or objections, please respond, > otherwise I will put this in the Wiki. > > --Brad > > > Mary Ellen Zurko wrote: >> >> Thanks. Please add it to the wiki: >> >> http://www.w3.org/2006/WSC/wiki/NoteOutOfScope >> >> >> Mez >> >> Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) >> Lotus/WPLC Security Strategy and Patent Innovation Architect >> >> >> >> *"Hallam-Baker, Phillip" <pbaker@verisign.com>* >> Sent by: public-wsc-wg-request@w3.org >> >> 01/09/2007 09:44 AM >> >> >> To >> "W3 Work Group" <public-wsc-wg@w3.org> >> cc >> >> Subject >> ACTION-40: Phones and scope >> >> >> >> >> >> >> >> >> >> Out of scope: >> >> Communications that are initiated by means of a telephone number >> including telephone calls and SMS messages regardless of whether >> Internet Protocol and/or Web Services are employed as a transport >> mechanism >> >> >> Rationale: >> >> While attacks against both the legacy telephone system and VOIP are >> increasing the architecture and governance of the telephone network >> and Internet are very different. In particular any communication that >> is initiated by means of a telephone number is effectively regulated >> by one or more governments at a detailed level regardless of where it >> is made. Remediation methods such as interception or termination that >> are routinely used to control telephone based fraud are challenging >> in the unregulated Internet environment where accountability is poor >> and even the determining who the responsible party is represents a >> significant challenge, let alone getting them to act. >>
Received on Monday, 22 January 2007 19:08:51 UTC