Skip to content

Commit

Permalink
Reference 'Securing the Web'
Browse files Browse the repository at this point in the history
As requested in the TAG's review of this document in July.

#39
  • Loading branch information
mikewest committed Aug 30, 2016
1 parent e535bae commit 9562a4b
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 5 deletions.
8 changes: 5 additions & 3 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -1436,7 +1436,7 @@
<div class="head">
<p data-fill-with="logo"><a class="logo" href="https://www.w3.org/"> <img alt="W3C" height="48" src="https://www.w3.org/StyleSheets/TR/2016/logos/W3C" width="72"> </a> </p>
<h1>Secure Contexts</h1>
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2016-08-20">20 August 2016</time></span></h2>
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2016-08-30">30 August 2016</time></span></h2>
<div data-fill-with="spec-metadata">
<dl>
<dt>This version:
Expand Down Expand Up @@ -1591,8 +1591,8 @@ <h2 class="heading settled" data-level="1" id="intro"><span class="secno">1. </s
<p>As the web platform is extended to enable more useful and powerful
applications, it becomes increasingly important to ensure that the features
which enable those applications are enabled only in contexts which meet a minimum
security level. This document describes threat models for feature abuse on the web
(see <a href="#threat-models">§4.1 Threat Models</a>) and outlines normative requirements which should be
security level. As an extension of the TAG’s recommendations in <a data-link-type="biblio" href="#biblio-securing-web">[SECURING-WEB]</a>,
this document describes threat models for feature abuse on the web (see <a href="#threat-models">§4.1 Threat Models</a>) and outlines normative requirements which should be
incorporated into documents specifying new features (see <a href="#implementation-considerations">§7 Implementation Considerations</a>).</p>
<p>The most obvious of the requirements discussed here is that application code
with access to sensitive or private data be delivered confidentially over
Expand Down Expand Up @@ -2566,6 +2566,8 @@ <h3 class="no-num no-ref heading settled" id="informative"><span class="content"
<dd>S. Cheshire; M. Krochmal. <a href="https://tools.ietf.org/html/rfc6761">Special-Use Domain Names</a>. February 2013. Proposed Standard. URL: <a href="https://tools.ietf.org/html/rfc6761">https://tools.ietf.org/html/rfc6761</a>
<dt id="biblio-rfc7258">[RFC7258]
<dd>S. Farrell; H. Tschofenig. <a href="https://tools.ietf.org/html/rfc7258">Pervasive Monitoring Is an Attack</a>. May 2014. Best Current Practice. URL: <a href="https://tools.ietf.org/html/rfc7258">https://tools.ietf.org/html/rfc7258</a>
<dt id="biblio-securing-web">[SECURING-WEB]
<dd>Mark Nottingham. <a href="https://www.w3.org/2001/tag/doc/web-https">Securing the Web</a>. Finding. URL: <a href="https://www.w3.org/2001/tag/doc/web-https">https://www.w3.org/2001/tag/doc/web-https</a>
<dt id="biblio-service-workers">[SERVICE-WORKERS]
<dd>Alex Russell; Jungkee Song; Jake Archibald. <a href="https://slightlyoff.github.io/ServiceWorker/spec/service_worker/">Service Workers</a>. 25 June 2015. WD. URL: <a href="https://slightlyoff.github.io/ServiceWorker/spec/service_worker/">https://slightlyoff.github.io/ServiceWorker/spec/service_worker/</a>
<dt id="biblio-verizon">[VERIZON]
Expand Down
5 changes: 3 additions & 2 deletions index.src.html
Original file line number Diff line number Diff line change
Expand Up @@ -160,8 +160,9 @@ <h2 id="intro">Introduction</h2>
As the web platform is extended to enable more useful and powerful
applications, it becomes increasingly important to ensure that the features
which enable those applications are enabled only in contexts which meet a minimum
security level. This document describes threat models for feature abuse on the web
(see [[#threat-models]]) and outlines normative requirements which should be
security level. As an extension of the TAG's recommendations in [[SECURING-WEB]],
this document describes threat models for feature abuse on the web (see
[[#threat-models]]) and outlines normative requirements which should be
incorporated into documents specifying new features (see
[[#implementation-considerations]]).

Expand Down

0 comments on commit 9562a4b

Please sign in to comment.