|
1436 | 1436 | <div class="head">
|
1437 | 1437 | <p data-fill-with="logo"><a class="logo" href="https://www.w3.org/"> <img alt="W3C" height="48" src="https://www.w3.org/StyleSheets/TR/2016/logos/W3C" width="72"> </a> </p>
|
1438 | 1438 | <h1>Secure Contexts</h1>
|
1439 |
| - <h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2016-08-20">20 August 2016</time></span></h2> |
| 1439 | + <h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2016-08-30">30 August 2016</time></span></h2> |
1440 | 1440 | <div data-fill-with="spec-metadata">
|
1441 | 1441 | <dl>
|
1442 | 1442 | <dt>This version:
|
@@ -1591,8 +1591,8 @@ <h2 class="heading settled" data-level="1" id="intro"><span class="secno">1. </s
|
1591 | 1591 | <p>As the web platform is extended to enable more useful and powerful
|
1592 | 1592 | applications, it becomes increasingly important to ensure that the features
|
1593 | 1593 | which enable those applications are enabled only in contexts which meet a minimum
|
1594 |
| - security level. This document describes threat models for feature abuse on the web |
1595 |
| - (see <a href="#threat-models">§4.1 Threat Models</a>) and outlines normative requirements which should be |
| 1594 | + security level. As an extension of the TAG’s recommendations in <a data-link-type="biblio" href="#biblio-securing-web">[SECURING-WEB]</a>, |
| 1595 | + this document describes threat models for feature abuse on the web (see <a href="#threat-models">§4.1 Threat Models</a>) and outlines normative requirements which should be |
1596 | 1596 | incorporated into documents specifying new features (see <a href="#implementation-considerations">§7 Implementation Considerations</a>).</p>
|
1597 | 1597 | <p>The most obvious of the requirements discussed here is that application code
|
1598 | 1598 | with access to sensitive or private data be delivered confidentially over
|
@@ -2566,6 +2566,8 @@ <h3 class="no-num no-ref heading settled" id="informative"><span class="content"
|
2566 | 2566 | <dd>S. Cheshire; M. Krochmal. <a href="https://tools.ietf.org/html/rfc6761">Special-Use Domain Names</a>. February 2013. Proposed Standard. URL: <a href="https://tools.ietf.org/html/rfc6761">https://tools.ietf.org/html/rfc6761</a>
|
2567 | 2567 | <dt id="biblio-rfc7258">[RFC7258]
|
2568 | 2568 | <dd>S. Farrell; H. Tschofenig. <a href="https://tools.ietf.org/html/rfc7258">Pervasive Monitoring Is an Attack</a>. May 2014. Best Current Practice. URL: <a href="https://tools.ietf.org/html/rfc7258">https://tools.ietf.org/html/rfc7258</a>
|
| 2569 | + <dt id="biblio-securing-web">[SECURING-WEB] |
| 2570 | + <dd>Mark Nottingham. <a href="https://www.w3.org/2001/tag/doc/web-https">Securing the Web</a>. Finding. URL: <a href="https://www.w3.org/2001/tag/doc/web-https">https://www.w3.org/2001/tag/doc/web-https</a> |
2569 | 2571 | <dt id="biblio-service-workers">[SERVICE-WORKERS]
|
2570 | 2572 | <dd>Alex Russell; Jungkee Song; Jake Archibald. <a href="https://slightlyoff.github.io/ServiceWorker/spec/service_worker/">Service Workers</a>. 25 June 2015. WD. URL: <a href="https://slightlyoff.github.io/ServiceWorker/spec/service_worker/">https://slightlyoff.github.io/ServiceWorker/spec/service_worker/</a>
|
2571 | 2573 | <dt id="biblio-verizon">[VERIZON]
|
|
0 commit comments