- From: Joe Steele <steele@adobe.com>
- Date: Wed, 16 Apr 2008 10:01:14 -0700
- To: <public-wsc-wg@w3.org>
- Message-ID: <7E19CB0359C4684887FB8C663DFD710803321CF5@namail2.corp.adobe.com>
Hello Everyone! My name is Joe Steele and I work for Adobe Systems as a researcher/implementer in the Advanced Technology Labs. I have been working until recently on Acrobat security features, specifically digital signatures and encryption. I am currently researching authentication mechanisms and digital identity. You can find me on LinkedIn ( http://www.linkedin.com/in/joesteeleprofile). I am still catching up on my archive reading for WSC but I should be up to speed fairly quickly. My hope is to learn what is considered the current best practices in this area and see what I can add based on my experience with trust handling in the Acrobat/Reader context. Eventually I would hope to feed this information back into the products developed at Adobe. Joe Steele <steele@adobe.com> On 4/15/08 3:56 PM, "Mary Ellen Zurko" <Mary_Ellen_Zurko@notesdev.ibm.com> wrote: Joe, Welcome! I look forward to working with you on this topic. Please read my welcome message to all in the email archive. It has useful links, and a request for each new member to introduce themselves (please do so): http://lists.w3.org/Archives/Public/public-wsc-wg/2006Oct/0001.html <http://lists.w3.org/Archives/Public/public-wsc-wg/2006Oct/0001.html> <http://lists.w3.org/Archives/Public/public-wsc-wg/2006Oct/0001.html> Our members only home page has logistics information for our weekly telephone meetings: http://www.w3.org/2006/WSC/Group/ <http://www.w3.org/2006/WSC/Group/> <http://www.w3.org/2006/WSC/Group/> Our next face to face is May 13 and 14 in Oslo. Please log whether or not you will be attending at: http://www.w3.org/2002/09/wbs/39814/wscf2fosl/ <http://www.w3.org/2002/09/wbs/39814/wscf2fosl/> <http://www.w3.org/2002/09/wbs/39814/wscf2fosl/> As you come up to speed, please read our scope and use cases document: http://www.w3.org/TR/wsc-usecases/ <http://www.w3.org/TR/wsc-usecases/> <http://www.w3.org/TR/wsc-usecases/> and our threat trees note: http://www.w3.org/TR/wsc-threats/ <http://www.w3.org/TR/wsc-threats/> <http://www.w3.org/TR/wsc-threats/> The editor's draft of our rec track document has gone to FPWD, and we're hoping to have a LC version by June. Please review and comment on it. http://www.w3.org/2006/WSC/drafts/rec/rewrite.html <http://www.w3.org/2006/WSC/drafts/rec/rewrite.html> <http://www.w3.org/2006/WSC/drafts/rec/rewrite.html> You might want to read the last month or so of our email archive, to get a sense of what's happening now: http://lists.w3.org/Archives/Public/public-wsc-wg/ <http://lists.w3.org/Archives/Public/public-wsc-wg/> <http://lists.w3.org/Archives/Public/public-wsc-wg/> Mez Mary Ellen Zurko, STSM, WPLC, Online Collaboration Services (t/l 333-6389) Security Architecture and Strategy; WPLC Patent Innovation Architect From:sysbot+ipp@w3.org To:Mary Ellen Zurko/Westford/IBM@Lotus, tlr@w3.org, crm@adobe.com Cc:w3c-archive@w3.org, steele@adobe.com Date:04/15/2008 12:53 PM Subject:Adobe Systems Inc. has nominated Joe Steele to Web Security Context Working Group ________________________________ Dear AC Rep, Chair, Team Contact, and Participant, On April 15, 2008, 16:51 UTC, Joe Steele became a participant in the Web Security Context Working Group. This person was nominated by Charles Myers This also implies that the following commitments were made: - to have reviewed the Process Document on individual participant qualifications ( section 3.1 [1]), Member participation in a Working Group (section 6.2.1.1 [2]) - in particular that (1) the Member will provide the necessary financial support for participation (e.g., for travel, telephone calls, and conferences), and (2) the AC representative attests that the individual accepts the participation terms set forth in the charter [3] - and good standing (section 6.2.1.7 [4]) - to agree to the participation conditions described in the Working Group charter [3] For more information on Web Security Context Working Group participation, see: http://www.w3.org/2004/01/pp-impl/39814/status <http://www.w3.org/2004/01/pp-impl/39814/status> <http://www.w3.org/2004/01/pp-impl/39814/status> 1. http://www.w3.org/2005/10/Process-20051014/policies.html#ParticipationCr iteria <http://www.w3.org/2005/10/Process-20051014/policies.html#ParticipationC riteria> <http://www.w3.org/2005/10/Process-20051014/policies.html#ParticipationC riteria> 2. http://www.w3.org/2005/10/Process-20051014/groups.html#member-rep-wg <http://www.w3.org/2005/10/Process-20051014/groups.html#member-rep-wg> <http://www.w3.org/2005/10/Process-20051014/groups.html#member-rep-wg> 3. http://www.w3.org/2005/Security/wsc-charter.html <http://www.w3.org/2005/Security/wsc-charter.html> <http://www.w3.org/2005/Security/wsc-charter.html> 4. http://www.w3.org/2005/10/Process-20051014/groups.html#good-standing <http://www.w3.org/2005/10/Process-20051014/groups.html#good-standing> <http://www.w3.org/2005/10/Process-20051014/groups.html#good-standing> This message has been sent by the W3C Working Group Management System.
Received on Wednesday, 16 April 2008 17:12:40 UTC