ISSUE-37: Domain spoofing and trust in the network layer

domainSpoofing

Domain spoofing and trust in the network layer

State:
CLOSED
Product:
Policy Framework Requirements
Raised by:
David Rogers
Opened on:
2009-11-02
Description:
Related Actions Items:
Related emails:
  1. RE: Action updates needed - ACTION-231 (Web Introducer prototyping) (from Claes1.Nilsson@sonyericsson.com on 2011-01-24)
  2. RE: Action updates needed - ACTION-231 (from Claes1.Nilsson@sonyericsson.com on 2011-01-10)
  3. RE: Action updates needed (from Laura.Arribas@vodafone.com on 2011-01-05)
  4. Action updates needed (from Frederick.Hirsch@nokia.com on 2011-01-04)
  5. Draft minutes 2010-05-12 (from frederick.hirsch@nokia.com on 2010-05-12)
  6. Draft minutes 2010-04-07 (from frederick.hirsch@nokia.com on 2010-04-07)
  7. Agenda - Distributed Meeting 2010-04-07 (from frederick.hirsch@nokia.com on 2010-04-06)
  8. Draft Minutes 2010-03-10 (from frederick.hirsch@nokia.com on 2010-03-10)
  9. regrets (from marco.marengo@telecomitalia.it on 2010-03-09)
  10. Agenda - Distributed Meeting 2010-03-10 (from frederick.hirsch@nokia.com on 2010-03-08)
  11. revised minutes 2009-11-02 DAP F2F day 1 (from frederick.hirsch@nokia.com on 2009-11-03)
  12. draft minutes 2009-11-02 F2f Day1 (from frederick.hirsch@nokia.com on 2009-11-03)

Related notes:

No additional notes.

Display change log ATOM feed


Anssi Kostiainen <anssi.kostiainen@intel.com>, Reilly Grant <reillyg@google.com>, Chairs, Fuqiao Xue <xfq@w3.org>, Staff Contact
Tracker: documentation, (configuration for this group), originally developed by Dean Jackson, is developed and maintained by the Systems Team <w3t-sys@w3.org>.
$Id: 37.html,v 1.1 2019/11/08 08:58:40 carcone Exp $