ISSUE-162

Recognize there are other forms of network security

State:
CLOSED
Product:
wsc-xit
Raised by:
Mary Ellen Zurko
Opened on:
2008-01-02
Description:
9.3

"If a web site requires secure login, then all sensitive transactions and presentation based on the user's credentials, as well as the service provided credential token itself MUST be protected by the same level of security. "

I would support a SHOULD for this instead. Other security mechanisms may be in play (IPSEC) that make this unnecessary.
Related Actions Items:
No related actions
Related emails:
  1. Meeting record: WSC WG face-to-face 2008-02-05 (from tlr@w3.org on 2008-02-27)
  2. ACTION-385: Changes to section 9.3 (from tlr@w3.org on 2008-02-27)
  3. Draft minutes: face-to-face 2008-02-05 (from tlr@w3.org on 2008-02-14)
  4. ISSUE-162: Recognize there are other forms of network security [wsc-xit] (from sysbot+tracker@w3.org on 2008-01-02)

Related notes:

No additional notes.

Display change log ATOM feed


Mary Ellen Zurko <mzurko@us.ibm.com>, Chair, Thomas Roessler <tlr@w3.org>, Staff Contact
Tracker (configuration for this group), originally developed by Dean Jackson, is developed and maintained by the Systems Team <w3t-sys@w3.org>.
$Id: 162.html,v 1.1 2010/10/11 09:35:08 dom Exp $