- From: Chris Lilley <chris@w3.org>
- Date: Fri, 14 Oct 2005 18:11:58 +0200
- To: ht@inf.ed.ac.uk (Henry S. Thompson)
- Cc: Tyler Close <tyler.close@gmail.com>, www-tag@w3.org, Daniel Weitzner <djweitzner@w3.org>, Rigo Wenning <rigo@w3.org>
On Thursday, October 13, 2005, 12:40:59 PM, Henry wrote: HST> The issue for the TAG is surely that exploratory modifications of URIs HST> are in a sense _invited_ by their very nature, and thus should never be HST> describable as unauthorized -- by publishing HST> http://www.example.com/a/b/c, I implicitly publish all HST> path-transformed versions of that URL, don't I? Put that way, it HST> sounds a bit extreme, but surely there's a substantial point at issue HST> here which needs to be explored. . . This is exactly the same issue as Deep Linking, and therefore the same finding should apply - ie, if you want Access Control, use Access Control, not laws. -- Chris Lilley mailto:chris@w3.org Chair, W3C SVG Working Group W3C Graphics Activity Lead Co-Chair, W3C Hypertext CG
Received on Friday, 14 October 2005 16:12:32 UTC