Recommendations for "Lightening Discussions" at next week's meeting
Threat trees & use cases updated
timeline in our wiki
Meeting record: WSC WG weekly 2007-03-20
Action item summary: WSC WG weekls 2007-03-28
[fwd] [fwd] Re: Defining different user agent classes for conformance? (from: ij@w3.org) (from: tlr@w3.org)
ISSUE-24: [editorial] Add \"known systemic flaws\" to goals
ACTION-149: FSTC's list of authentication techniques (BMA taxonomy)
- RE: ACTION-149: FSTC's list of authentication techniques (BMA taxonomy)
- Re: ACTION-149: FSTC's list of authentication techniques (BMA taxonomy)
Introduction: Luis Barriga (Ericsson)
[fwd] Agenda, WEDNESDAY, 28 March, WSC Call (from: Mary_Ellen_Zurko@notesdev.ibm.com)
ISSUE-23: Rephrase background on usable security in Process secion
ISSUE-22: Rephrase favicon text
ISSUE-21: Reply to question - what do pword managers do to ensure they don\'t \"leak\" pwords?
ISSUE-20: Potential additions to Available Security Information
ISSUE-19: Arrangement and formatting of use cases
ISSUE-18: Clarify audience of wsc-usecases
Rough proposal: Contextual Password Warnings
ACTION-156: List of privacy and security indicators
Agenda, WEDNESDAY, 28 March, WSC Call
ACTION-155 OPEN Track P3P header related indicators
ISSUE-6 User Interface Issues for Constrained / Mobile Devices
Re: ISSUE-7: Mental models?
Re: ISSUE-8: User Education
Re: ISSUE-11: \"Problems with the status quo\"
ACTION-164 - Elaborate Cross Site Scripting in Wiki
- Re: ACTION-164 - Elaborate Cross Site Scripting in Wiki
- Re: ACTION-164 - Elaborate Cross Site Scripting in Wiki
- Re: ACTION-164 - Elaborate Cross Site Scripting in Wiki
ACTION-165 Copy definition of web user agent to glossary
WSC WG - timeline/roadmap
Rec Proposal: Separate in-browser editor for entry of Personally Identifiable Information (PII)
- Re: Rec Proposal: Separate in-browser editor for entry of Personally Identifiable Information (PII)
- Re: Rec Proposal: Separate in-browser editor for entry of Personally Identifiable Information (PII)
Meeting record: WSC WG weekly 2007-03-13
Action item summary: 2007-02-20
hanging out on IRC
remember, use the issues
ISSUE-17: Amend section 8.2 as per ACTION-103
ISSUE-16: Create section 9.2.6 as per ACTION-105
ISSUE-15: Revise section 9.2.5 as per ACTION-106
Summary of action items: 2007-03-13
Agenda, 20 March, WSC Call
ACTION-108 contribute more studies for 8.3
ISSUE-13 OPEN Mez' Note Review 2007-03-02 Note: use cases etc.
interesting issue found yesterday
Meeting record: WSC WG weekly 2007-03-06
Phishing attacks target CareerBuilder.com users
ISSUE-14: Technologies that reduce risk
Is there a way to see differences in our wiki?
RecommendationIndex area
ACTION 152, 113 -- Fun with glossaries
WG members reviewing wsc-usecases
Threat Trees
Catching up with the group
ACTION-151 update security context - User agents and robustness of authentication schemes
Minutes: WSC WG weekly 2007-02-20
Agenda, 13 March, WSC Call
ACTION-140 Propose non-goals material re other app contexts
ACTION-133 Offer text suggestion around "many users"
ACTION-127 Document current practice in terms of security UI robustness
ACTION-126 Document current practice in terms of security UI robustness
ACTION-114 suggesting alternative wording for 8.4.1
ACTION-110 Create new subsection under 8.2 to classify types of attacks
ACTION-99 draft text for section 8, covering "block pages"
ACTION-98 Add references for 8.1.2
ACTION-96 Draft initial outline of glossary
Introduction: Praveen Alavilli (AOL)
Produce material on name-based virtual hosting and TLS
Documenting the status quo
Fw: US clocks moving to Summer Time this Sunday, 11 March
Introduction: Pascal Manzano (ENISA)
Introduction
ACTION-148 Discussion: The role of technology-specific security aids in our recommendations
- Re: ACTION-148 Discussion: The role of technology-specific security aids in our recommendations
FTC Workshop on reducing identity theft through enhanced authentication
Fw: ACTION-128 Document current practice in terms of security UI robustness
Re: ACTION-107 : Create a library of testcases / examples of attacks listedin section 8
Fw: ACTION-128 Document current practice in terms of security UI robustness
ACTION-117 : Contribute material re confirmation bias to note
ACTION-107 : Create a library of testcases / examples of attacks listed in section 8
ACTION-106 Propose clarifying language for 8.2.5
- Fw: ACTION-106 Propose clarifying language for 8.2.5
- RE: ACTION-106 Propose clarifying language for 8.2.5