- From: Stuart E. Schechter <ses@ll.mit.edu>
- Date: Fri, 30 Mar 2007 13:03:49 -0400
- To: <public-wsc-wg@w3.org>
I've updated the threat trees to show what use case dimensions the threats apply to. What I've found is that the threats apply almost universally to all the use cases. The primary exception is that since we've broken down the site-impersonation threat by the 2nd use case dimension, there is a clear mapping there.
Received on Friday, 30 March 2007 17:04:32 UTC