RE: ISSUE-38: no safe haven in presentation space (from publiccomments)

I've added the quoted CYA section to the Out of scope section of the
Note. See:
 
http://www.w3.org/2006/WSC/drafts/note/Overview.html#out-of-scope-other
 
Tyler

________________________________

From: Mary Ellen Zurko [mailto:Mary_Ellen_Zurko@notesdev.ibm.com] 
Sent: Wednesday, August 01, 2007 4:57 AM
To: wdoyle@mitre.org
Cc: Close, Tyler J.
Subject: RE: ISSUE-38: no safe haven in presentation space (from
publiccomments)



Tyler? 

(Bill, the editors tend to own and know answers to questions like these)

          Mez





 	
RE: ISSUE-38: no safe haven in presentation space (from publiccomments)

Doyle, Bill 	to: 	tyler.close, Thomas Roessler 	
07/30/2007 03:08 PM

Sent by: 	public-wsc-wg-request@w3.org 
Cc: 	public-wsc-wg




________________________________





OK - I am late 

This text is going to be incorporated in what version of the note? Just
wanted to make sure before Al gets update on  action item


Regards
Bill D.


5.n Other Security Challenges
> > 
> > As stated in the [http://www.w3.org/2005/Security/wsc-charter
charter], 
> > the mission of the Web Security Context Working 
> > Group is to specify a baseline set of security context information
that 
> > should be accessible to Web users, and practices for the secure and
usable 
> > 
> > presentation of this information, to enable users to come to a
better 
> > understanding of the context that they are operating in when making
trust 
> > decisions on the Web. While the work this group does may have a
positive 
> > and beneficial effect on other security challenges on the web,
directly 
> > addressing such challenges is out of scope. Examples listed are
listed in 
> > [http://www.w3.org/2006/WSC/drafts/note/#out-of-scope Out of
Scope], 
> > including
> > [http://www.w3.org/2006/WSC/drafts/note/#vaporware protocols and
data 
> > formats] and [http://www.w3.org/2006/WSC/drafts/note/#XSS content 
> > production exploits]. These examples are not
> > exhaustive. 

-----Original Message-----
From: Thomas Roessler [mailto:tlr@w3.org] 
Sent: Thursday, July 19, 2007 8:16 AM
To: tyler.close@hp.com; Doyle, Bill
Cc: public-wsc-wg@w3.org
Subject: Re: ISSUE-38: no safe haven in presentation space (from
publiccomments)

As resolved on our 18 July call,  this issue is closed. [1]

Tyler, please make the proposed change to the note and mark the
issue closed in tracker afterwards.

Thanks,
-- 
Thomas Roessler, W3C  <tlr@w3.org>






On 2007-07-11 14:13:37 +0200, Thomas Roessler wrote:
> From: Thomas Roessler <tlr@w3.org>
> To: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
> Cc: public-wsc-wg@w3.org
> Date: Wed, 11 Jul 2007 14:13:37 +0200
> Subject: Re: ISSUE-38: no safe haven in presentation space (from
public
>                  comments)
> X-Spam-Level: 
> X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.1.5
> 
> On 2007-06-15 16:45:39 -0400, Mary Ellen Zurko wrote:
> 
> > I said I'd try to add more strength and clarity to the text of
> > "directly addressing", as Bill and Tyler requested. Here's my
> > next iteration of the proposal: 
> 
> I like this text, and would suggest that (a) we include it with the
> note, (b) close this issue.  We'll also want to let Al know of the
> disposition of his comment.
> 
> > 5.n Other Security Challenges
> > 
> > As stated in the [http://www.w3.org/2005/Security/wsc-charter
charter], 
> > the mission of the Web Security Context Working 
> > Group is to specify a baseline set of security context information
that 
> > should be accessible to Web users, and practices for the secure and
usable 
> > 
> > presentation of this information, to enable users to come to a
better 
> > understanding of the context that they are operating in when making
trust 
> > decisions on the Web. While the work this group does may have a
positive 
> > and beneficial effect on other security challenges on the web,
directly 
> > addressing such challenges is out of scope. Examples listed are
listed in 
> > [http://www.w3.org/2006/WSC/drafts/note/#out-of-scope Out of
Scope], 
> > including
> > [http://www.w3.org/2006/WSC/drafts/note/#vaporware protocols and
data 
> > formats] and [http://www.w3.org/2006/WSC/drafts/note/#XSS content 
> > production exploits]. These examples are not
> > exhaustive. 
> > 
> 
> -- 
> Thomas Roessler, W3C  <tlr@w3.org>
> 
> 

Received on Wednesday, 8 August 2007 23:19:04 UTC