That sounds like a reasonable interpretation to me, as well.
My comment was intended to indicate that current impact
to the examples document is no action, which would be the
final impact as well if the ref'd doc were to be submitted.
It might make sense to track this item as a separate issue.
Thanks,
Rich
Anthony Nadalin wrote:
OF91B44B23.EBF57BAF-ON8625743A.0047D3C3-8625743A.0047EA5B@us.ibm.com"
type="cite">
>Action Part 2: copyright issue:
>No action, based on email:
> http://lists.oasis-open.org/archives/ws-sx/200804/msg00021.html
As I read it there is an action for MS to submit the document to the TC
Anthony Nadalin | Work 512.838.0085 | Cell 512.289.4122
rich.levinson---04/29/2008
12:15:09 AM---This update addresses the following issues (163, 154):
This update addresses the following issues (163, 154):
Issue 163: Encryption with a key known to both parties
http://docs.oasis-open.org/ws-sx/issues/Issues.xml#i163
Action: Updated, based on proposal in emails:
http://lists.oasis-open.org/archives/ws-sx/200802/msg00014.html
http://lists.oasis-open.org/archives/ws-sx/200801/msg00011.html
Issue 154: Examples doc issues
http://docs.oasis-open.org/ws-sx/issues/Issues.xml#i154
Actions: 2 parts:
Action Part 1: general comments:
Updated, based on proposal in emails:
http://lists.oasis-open.org/archives/ws-sx/200801/msg00004.html
http://lists.oasis-open.org/archives/ws-sx/200712/msg00014.html
Consideration was given to removals suggested by:
http://lists.oasis-open.org/archives/ws-sx/200802/msg00017.html
however, additional explanation of specific items
in text was provided as alternative.
Action Part 2: copyright issue:
No action, based on email:
http://lists.oasis-open.org/archives/ws-sx/200804/msg00021.html
-- Rich Levinson
The document revision named ws-sp-usecases-examples-draft-18-04.doc
(ws-sp-usecases-examples-draft-18-04.doc) has been submitted by Rich
Levinson to the OASIS Web Services Secure Exchange (WS-SX) TC document
repository. This document is revision #12 of
ws-sp-usecases-examples-draft-10-09.doc.
Document Description:
Examples of usage of WS-SecurityPolicy to show how it can be applied to
several well known WS-Security scenarios that have been publicly
conducted
in Interops as well as other scenarios of an illustrative nature.
View Document Details:
http://www.oasis-open.org/apps/org/workgroup/ws-sx/document.php?document_id=28122
Download Document:
http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/28122/ws-sp-usecases-examples-draft-18-04.doc
Revision:
This document is revision #12 of
ws-sp-usecases-examples-draft-10-09.doc.
The document details page referenced above will show the complete
revision
history.
PLEASE NOTE: If the above links do not work for you, your email
application
may be breaking the link into two pieces. You may be able to copy and
paste
the entire link address into the address field of your web browser.
-OASIS Open Administration
|