- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Fri, 9 Nov 2007 16:36:30 -0500
- To: public-wsc-wg@w3.org
- Message-ID: <OFB88DCB4C.2FEAE2CB-ON8525738E.0076AC4F-8525738E.0076B315@LocalDomain>
fyi
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
----- Forwarded by Mary Ellen Zurko/Westford/IBM on 11/09/2007 04:36 PM
-----
From:
Mary Ellen Zurko/Westford/IBM
To:
chairs@w3.org
Date:
11/09/2007 04:36 PM
Subject:
Transition announcements: FPWD of xit, LC of usecases, and publication of
threats
The Web Security Context WG announces the publication transitions of the
following three documents.
==========================================================
Web Security Context: Experience, Indicators, and Trust
W3C Working Draft 1 November 2007
This version:
http://www.w3.org/TR/2007/WD-wsc-xit-20071101/
Latest version:
http://www.w3.org/TR/wsc-xit/
First Public Working Draft transition announcement.
[This is a Recommendation-track specification.]
Transition request:
http://lists.w3.org/Archives/Member/chairs/2007OctDec/0053.html
Abstract
This specification defines guidelines and requirements for the
presentation and communication of Web security context information to
end-users; ceremonies for secure data entry; and good practices for Web
Site authors.
Status of this Document
This section describes the status of this document at the time of its
publication. Other documents may supersede this document. A list of
current W3C publications and the latest revision of this technical report
can be found in the W3C technical reports index at http://www.w3.org/TR/.
This is a First Public Working Draft of "Web Security Context: Experience,
Indicators, and Trust".
The Web Security Context Working Group is publishing this document to
provide a basis for initial review of and commentary on its work. The
Working Group has taken an inclusive approach toward publishing various
technical proposals in this First Public Working Draft. Inclusion of
technical material in this document does not indicate group consensus
about that material; some requirements stipulated in this document are
known to be mutually exclusive. No claims as to the efficacy of
usability-related material are made.
To facilitate access to relevant background, various sections of this
document are annotated with references to input documents that are
available from the the Working Group's Wiki, and to pertinent issues that
the group is tracking. The documents in the wiki include background,
motivation, and usability concerns on the proposals that reference them.
They provide important context for understanding the potential utility of
the proposals.
The Working Group expects to advance this Working Draft to Recommendation
Status.
Please send comments about this document to
public-usable-authentication@w3.org (with public archive).
Publication as a Working Draft does not imply endorsement by the W3C
Membership. This is a draft document and may be updated, replaced or
obsoleted by other documents at any time. It is inappropriate to cite this
document as other than work in progress.
This document was produced by a group operating under the 5 February 2004
W3C Patent Policy. W3C maintains a public list of any patent disclosures
made in connection with the deliverables of the group; that page also
includes instructions for disclosing a patent. An individual who has
actual knowledge of a patent which the individual believes contains
Essential Claim(s) must disclose the information in accordance with
section 6 of the W3C Patent Policy.
==========================================================
Web Security Experience, Indicators and Trust: Scope and Use Cases
W3C Working Draft 1 November 2007
This version:
http://www.w3.org/TR/2007/WD-wsc-usecases-20071101/
Latest version:
http://www.w3.org/TR/wsc-usecases/
[This will become a WG Note.]
The WSC WG has resolved to move the wsc-usecases note to Last Call:
http://lists.w3.org/Archives/Public/public-wsc-wg/2007Oct/0176.html
The WSC WG charter is at:
http://www.w3.org/2005/Security/wsc-charter
Abstract
This Note refines the objectives for the Web Security Context Working
Group deliverables. It elaborates upon the group's Charter [WSC-CHARTER]
to explain what the group aims to achieve, what technologies may be used
and how technical proposals will be evaluated. This elaboration is limited
to the group's technical work and does not cover additional activities the
group intends to engage in, such as ongoing outreach and education.
This Note also includes an initial collection of use cases that the group
expects will drive its technical work.
Since this Note discusses the assumptions, goals, and processes the group
will use to develop its recommendations, the intended audience is similiar
to that of the charter of the Working Group; group members, the W3C
community, developers of web user agents, web content providers (server
administrators), and parties interested and engaged in what the Web
Security Context Working Group's plans and directions are. It is
explicitly not targeted at the presumed beneficiaries of the group's work,
the users of the web, and it is not expected that an average user would be
able to read this document and understand it.
Status of this Document
This section describes the status of this document at the time of its
publication. Other documents may supersede this document. A list of
current W3C publications and the latest revision of this technical report
can be found in the W3C technical reports index at http://www.w3.org/TR/.
This is a Last Call Working Draft of "Web Security Experience, Indicators
and Trust: Scope and Use Cases". The W3C Membership and other interested
parties are invited to review the document and send comments to
public-usable-authentication@w3.org (with public archive) through 30
November 2007.
After addressing any issues raised as part of last call feed-back to this
document, the Working Group will publish its final version as a W3C
Working Group Note.
This document was produced by the Web Security Context Working Group, as
part of the Security Activity.
Publication as a Working Draft does not imply endorsement by the W3C
Membership. This is a draft document and may be updated, replaced or
obsoleted by other documents at any time. It is inappropriate to cite this
document as other than work in progress.
This document was produced by a group operating under the 5 February 2004
W3C Patent Policy. The group does not expect this document to become a W3C
Recommendation. W3C maintains a public list of any patent disclosures made
in connection with the deliverables of the group; that page also includes
instructions for disclosing a patent. An individual who has actual
knowledge of a patent which the individual believes contains Essential
Claim(s) must disclose the information in accordance with section 6 of the
W3C Patent Policy.
==========================================================
In addition, we are publishing wsc-threats as a Note:
Web User Interaction: Threat Trees
W3C Working Group Note 1 November 2007
This version:
http://www.w3.org/TR/2007/NOTE-wsc-threats-20071101/
Latest version:
http://www.w3.org/TR/wsc-threats/
Abstract
This Note includes threat trees used to analyze the threats that the
[WSC-XIT] responds to. It is a companion document to [WSC-USECASES].
Status of this Document
This section describes the status of this document at the time of its
publication. Other documents may supersede this document. A list of
current W3C publications and the latest revision of this technical report
can be found in the W3C technical reports index at http://www.w3.org/TR/.
This document is published as a companion document to [WSC-USECASES], to
make some of the group's analysis available to a larger public.
This document was developed by the Web Security Context Working Group.
The content of this document is mostly analytic. This document is
published as a snapshot, and may be updated and changed as needed when the
Working Group's analysis develops further.
Please send comments about this document to
public-usable-authentication@w3.org (with public archive).
Publication as a Working Group Note does not imply endorsement by the W3C
Membership. This is a draft document and may be updated, replaced or
obsoleted by other documents at any time. It is inappropriate to cite this
document as other than work in progress.
This document was produced by a group operating under the 5 February 2004
W3C Patent Policy. W3C maintains a public list of any patent disclosures
made in connection with the deliverables of the group; that page also
includes instructions for disclosing a patent. An individual who has
actual knowledge of a patent which the individual believes contains
Essential Claim(s) must disclose the information in accordance with
section 6 of the W3C Patent Policy.
==========================================================
Mary Ellen Zurko for the Web Security Context Working Group
Received on Friday, 9 November 2007 21:36:47 UTC