Action items

Hello,

the current list of action items is available online at [1].  Below
the .signature, I'm including a quick text version for your reference.

1. http://www.w3.org/2006/WSC/track/actions
-- 
Thomas Roessler, W3C  <tlr@w3.org>





   http://www.w3.org/2006/WSC/track/actions/1
   ACTION-1 CLOSED Link tracker from Group page Thomas Roessler
   2006-11-21

   http://www.w3.org/2006/WSC/track/actions/2
   ACTION-2 OPEN Organize call with APWG to discuss liaison mechanisms
   with WSCWG Thomas Roessler 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/3
   ACTION-3  CLOSED Contribute use cases for Note Stephen Farrell
   2006-11-21

   http://www.w3.org/2006/WSC/track/actions/4
   ACTION-4 OPEN Formalize the scenario of user getting a request via
   e-mail and using that information to contact a web-site using HTTP protocol
   (e.g. using a browser) Phillip Hallam-Baker 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/5
   ACTION-5  OPEN Formalize the use case of mis-typing a URL (and
   various variants - been there before, not been there before) Mary Ellen
   Zurko 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/6
   ACTION-6 OPEN Formalize the statement regarding users not relying on
   information  within  URL strings for establishing context (or security
   context) Tyler Close 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/7
   ACTION-7  CLOSED  Work out impact of redirection scenarios Hal
   Lockhart 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/8
   ACTION-8 OPEN Formalize use case around user contacting one site,
   then  getting  re-directed  to  another  (as  part  of a federation of
   organziations working together, legitimately), how does the user trust where
   they landed on? Hal Lockhart 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/9
   ACTION-9 OPEN Formalize the use case of content providers using the
   same icons as are typically used in the "chrome area" and thus diluting the
   meaning of such visual aids Michael Smith 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/10
   ACTION-10 CLOSED Find mobile browser vendors to recruit to group
   Michael Smith 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/11
   ACTION-11 OPEN Formalize a use case for using a browser on a shared
   device (e.g. kiosk device). Examples of kiosks intra-enterprise, hotel
   lobbies, Kinko\\'s, libraries. Hal Lockhart 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/12
   ACTION-12 OPEN List, by enumeration, what is meant by security
   context information Hal Lockhart 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/13
   ACTION-13 OPEN Elaborate on multiple certificates & domains for
   session servers case Tyler Close 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/14
   ACTION-14 CLOSED Write up use case of session servers and having
   critical  information  invariant  in  order to be useful. Hal Lockhart
   2006-11-21

   http://www.w3.org/2006/WSC/track/actions/15
   ACTION-15 OPEN Produce use case story for kiosk case that is in
   scope  (action can be discharged by declaring defeat) Mary Ellen Zurko
   2006-11-21

   http://www.w3.org/2006/WSC/track/actions/16
   ACTION-16  OPEN  Formalize  the  use  case of flowing security
   information as a part of the document mark up (as in XML marked up content
   information). Yakov Sverdlov 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/17
   ACTION-17 OPEN Give a demonstration of "pet name" annotation of
   bookmarks plug-in Tyler Close 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/18
   ACTION-18 OPEN Formalize the need to be able to understand/visualize
   the "strength" of SSL protection in place Bill Doyle 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/19
   ACTION-19 OPEN Formalize a user-facing use case for WS-Security
   (e.g. use of WS-SecureConversation) Tim Hahn 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/20
   ACTION-20 OPEN Put together set of background references Mary Ellen
   Zurko 2006-11-22

   http://www.w3.org/2006/WSC/track/actions/21
   ACTION-21 OPEN Help MEZ with ACTION-20 Maritza Johnson 2006-11-22

   http://www.w3.org/2006/WSC/track/actions/22
   ACTION-22  OPEN  Produce voice browser use case Brandon Porter
   2006-11-22

   http://www.w3.org/2006/WSC/track/actions/23
   ACTION-23 OPEN Find out more about Opera\\'s numeric trust indicator
   Michael Smith 2006-11-22

   http://www.w3.org/2006/WSC/track/actions/24
   ACTION-24 OPEN Set up Wiki for group use Thomas Roessler 2006-11-22

   http://www.w3.org/2006/WSC/track/actions/25
   ACTION-25  CLOSED  Set up CVS access for Tyler Thomas Roessler
   2006-11-22

   http://www.w3.org/2006/WSC/track/actions/26
   ACTION-26 OPEN Dig out papers about authenticating browser password
   entry dialogues to users Mary Ellen Zurko 2006-11-22

   http://www.w3.org/2006/WSC/track/actions/27
   ACTION-27 OPEN review requirements from workshop record Hal Lockhart
   2006-12-05

   http://www.w3.org/2006/WSC/track/actions/28
   ACTION-28 CLOSED Clean up minutes Thomas Roessler 2006-11-22

   http://www.w3.org/2006/WSC/track/actions/29
   ACTION-29 OPEN Rob Franco to formalize the use case of an attacker
   messing with the information in the address bar and confusing the user.
   Thomas Roessler 2006-11-21

   http://www.w3.org/2006/WSC/track/actions/30
   ACTION-30 OPEN Find collection of known anti-phishing extensions for
   Firefox Tyler Close 2006-11-21

Received on Friday, 17 November 2006 16:38:17 UTC