- From: Brad Porter <brad@tellme.com>
- Date: Mon, 22 Jan 2007 11:09:27 -0800
- To: Brad Porter <brad@tellme.com>
- Cc: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>, pbaker@verisign.com, W3 Work Group <public-wsc-wg@w3.org>
- Message-ID: <45B50BE7.3070500@tellme.com>
(Resending for tracking purposes) Brad Porter wrote: > It appears the wiki content has been incorporated in the NOTE > already. I believe sections 4.1 (Non-web protocols) and 4.2 (Non-web > user agents) are sufficient to cover the case. If we wanted to add > ISDN/SSN to the non-web protocols section, we could, but it does not > appear necessary. > > --Brad > > Brad Porter wrote: >> Here's my proposed text. >> >> ================= >> Out of scope: >> - Security context information, controls, and authentication >> information based on non-Internet protocols and data such as >> telephony network protocols (SS7, ISDN, NANP) >> ================= >> >> Unfortunately the term "non-Internet protocols" seems a little >> underspecified, but gets to the intent of what we discussed on the >> phone today. If anyone has better text or objections, please >> respond, otherwise I will put this in the Wiki. >> >> --Brad >> >> >> Mary Ellen Zurko wrote: >>> >>> Thanks. Please add it to the wiki: >>> >>> http://www.w3.org/2006/WSC/wiki/NoteOutOfScope >>> >>> >>> Mez >>> >>> Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) >>> Lotus/WPLC Security Strategy and Patent Innovation Architect >>> >>> >>> >>> *"Hallam-Baker, Phillip" <pbaker@verisign.com>* >>> Sent by: public-wsc-wg-request@w3.org >>> >>> 01/09/2007 09:44 AM >>> >>> >>> To >>> "W3 Work Group" <public-wsc-wg@w3.org> >>> cc >>> >>> Subject >>> ACTION-40: Phones and scope >>> >>> >>> >>> >>> >>> >>> >>> >>> >>> Out of scope: >>> >>> Communications that are initiated by means of a telephone number >>> including telephone calls and SMS messages regardless of whether >>> Internet Protocol and/or Web Services are employed as a transport >>> mechanism >>> >>> >>> Rationale: >>> >>> While attacks against both the legacy telephone system and VOIP are >>> increasing the architecture and governance of the telephone network >>> and Internet are very different. In particular any communication >>> that is initiated by means of a telephone number is effectively >>> regulated by one or more governments at a detailed level regardless >>> of where it is made. Remediation methods such as interception or >>> termination that are routinely used to control telephone based fraud >>> are challenging in the unregulated Internet environment where >>> accountability is poor and even the determining who the responsible >>> party is represents a significant challenge, let alone getting them >>> to act. >>>
Received on Monday, 22 January 2007 19:09:36 UTC