task
stringlengths 12
101
| input
stringlengths 5
5.87k
| output
stringlengths 1
5.47k
| options
sequence | pageTitle
stringlengths 0
151
| outputColName
stringlengths 1
142
| url
stringlengths 24
147
| wdcFile
stringlengths 71
75
|
---|---|---|---|---|---|---|---|
c4745915_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Comment | [Identifier] Ticket [Semantics] Policy expressions that stipulate the terms of usage and is redeemable by any Party who currently holds the Ticket in their possession [Comment] | May contain the Party entity with Assigner role and the Party entity with Assignee role. A Ticket (or Voucher) may be anonymous or personalised, where the holder of that Ticket may remain unknown or has to be identified. The holder, or if known, the Assignee, is being granted the terms of the Ticket from the Assigner (in known). | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_2.json |
3266ff00__hover_pseudo_class__2 | [0] The cells in [1] this table [2] | should go | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20030709/xhtml/tests/css3-modsel-18.xml | 44/1438042990445.44_20150728002310-00034-ip-10-236-191-2_803259098_0.json |
3266ff00__hover_pseudo_class__2 | [0] green when [1] you hover [2] | the pointing | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20030709/xhtml/tests/css3-modsel-18.xml | 44/1438042990445.44_20150728002310-00034-ip-10-236-191-2_803259098_0.json |
3266ff00__hover_pseudo_class__2 | [0] The rows in [1] this table [2] | should go | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20030709/xhtml/tests/css3-modsel-18.xml | 44/1438042990445.44_20150728002310-00034-ip-10-236-191-2_803259098_0.json |
3266ff00__hover_pseudo_class__2 | [0] dark green [1] when the [2] | pointing device | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20030709/xhtml/tests/css3-modsel-18.xml | 44/1438042990445.44_20150728002310-00034-ip-10-236-191-2_803259098_0.json |
3266ff00__hover_pseudo_class__2 | [0] is over the [1] five pixel [2] | border spacing | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20030709/xhtml/tests/css3-modsel-18.xml | 44/1438042990445.44_20150728002310-00034-ip-10-236-191-2_803259098_0.json |
3266ff00__hover_pseudo_class__2 | [0] Including here, [2] | blank cells. | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20030709/xhtml/tests/css3-modsel-18.xml | 44/1438042990445.44_20150728002310-00034-ip-10-236-191-2_803259098_0.json |
0583a12c_Animation___SVG_1_1___20021115___animate_ | [Additive?] yes ['set'] yes ['animate Color'] no ['animate Transform'] no ['animate'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'animate' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
0583a12c_Animation___SVG_1_1___20021115___animate_ | [Additive?] yes ['set'] yes ['animate Color'] yes ['animate Transform'] no [Notes] Only RGB color values are additive. ['animate'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'animate' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
0583a12c_Animation___SVG_1_1___20021115___animate_ | [Additive?] no ['set'] no ['animate Color'] no ['animate Transform'] no ['animate'] | no | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'animate' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
0583a12c_Animation___SVG_1_1___20021115___animate_ | [Additive?] no ['set'] yes ['animate Color'] no ['animate Transform'] no ['animate'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'animate' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
0583a12c_Animation___SVG_1_1___20021115___animate_ | [Additive?] yes ['set'] no ['animate Color'] no ['animate Transform'] yes [Notes] Additive means that a transformation is post-multiplied to the base set of transformations. ['animate'] | no | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'animate' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
0583a12c_Animation___SVG_1_1___20021115___animate_ | [Data type] All other data types used in animatable attributes and properties [Additive?] no ['set'] yes ['animate Color'] no ['animate Transform'] no ['animate'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'animate' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
562d8780_mework__Operational_Guidelines__testability_of_specification | [Level] 1. [testability of specification] | Working Group plans regular specification reviews for testability, following Specification Guidelines | [] | QA Framework: Operational Guidelines | testability of specification | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
562d8780_mework__Operational_Guidelines__testability_of_specification | [Level] 2. [extent of test materials] Working Group commits that test suite for the specification, not necessarily complete and thorough, will exist before specification becomes Recommendation. [testability of specification] | In addition to the regular specifications reviews mentioned in the previous level, Working Group commits to develop a set of test assertions, not necessarily complete, before beginning development of a test suite. | [] | QA Framework: Operational Guidelines | testability of specification | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
562d8780_mework__Operational_Guidelines__testability_of_specification | [Level] 3. [extent of test materials] In addition to the commitment of the previous level, a Working Group ensures that the test suite produced is reviewed by the Working Group or externally and the review process meets the criteria established in this document. [testability of specification] | In addition to regular specification reviews, a Working Group aims to have numerous normative use cases in the body of the Recommendation. | [] | QA Framework: Operational Guidelines | testability of specification | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
562d8780_mework__Operational_Guidelines__testability_of_specification | [Level] 4. [extent of test materials] Working Group commits to establish and maintain the test cases contribution and review process and will produce and review the test suite, not necessarily complete and thorough, before the specification becomes Recommendation. [testability of specification] | Same as above. | [] | QA Framework: Operational Guidelines | testability of specification | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
562d8780_mework__Operational_Guidelines__testability_of_specification | [Level] 5. [extent of test materials] Same as above [testability of specification] | In addition to the commitments from the previous level, Working Group will derive the list of testable assertions as an addendum to specification by the time it becomes Recommendation. | [] | QA Framework: Operational Guidelines | testability of specification | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
562d8780_mework__Operational_Guidelines__testability_of_specification | [Level] 6. [extent of test materials] In addition to the commitment for the previous level, a Working Group insists on a complete test suite before corresponding standard becomes Recommendation. [testability of specification] | Same as above | [] | QA Framework: Operational Guidelines | testability of specification | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
562d8780_mework__Operational_Guidelines__testability_of_specification | [Level] 7. [extent of test materials] In addition to the commitment for the previous level, Working Group plans to maintain the test suite even after Specification becomes recommendation. Working Group plans to support versioning and errata in the test suite and review appeals. [testability of specification] | Same as above | [] | QA Framework: Operational Guidelines | testability of specification | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications can create alarms, notifying users [Source] SysApps Charter [Requirement] | Alarm API | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Apps can add, remove and edit contacts [Source] SysApps Charter [Requirement] | Contacts API | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Apps can send, receive and view SMS [Source] SysApps Charter [Requirement] | Messaging API | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Apps can access the telephony capabilities of the underlyling platform: dial a number, pick up a call, route to voicemail, access the call log [Source] SysApps Charter [Requirement] | Telephony API | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Apps can create, manipulate and listen for low-level TCP and UDP connections [Source] SysApps Charter [Requirement] | Raw Sockets API | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Supports a wide variety of devices including desktop & laptop computers, smart phones, tablets, TVs, cameras, and other connected devices [Source] SysApps Charter [Implications] The security model can make no assumptions about how the device will be used or shared between people and cannot assume a particular process model. [Requirement] | Supports many device form factors | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] All APIs defined by DAP should be accessible to system applications [Source] SysApps Charter [Implications] Either DAP APIs will need to change slightly in the systems context or the security model must allow for API-specific access controls [Requirement] | DAP API Support | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Problems such as 'double prompting' should be avoided when integrating other APIs [Source] SysApps Charter [Implications] Some details of the expected user interactions may need to be specified in the security model or APIs [Requirement] | Minimal user prompting | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications consist of HTML, CSS and JavaScript [Requirement] | HTML5 | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications have access to geolocation data [Requirement] | Location | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications can communicate with other applications [Implications] Some kind of messaging will be supported [Requirement] | Communicate with other applications | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications can communicate with pre-defined web addresses [Implications] Access remote domains will be possible [Requirement] | Communicate with pre-defined endpoints | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications can run on any conformant platform, potentially including any device form factor [Source] Compatibility of application packages [Requirement] | Valid across multiple platforms | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Allow access control decisions to be logged. [Source] webinos [Requirement] | Access control log | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications shall be able to explain why access to data or APIs is being requested. [Source] webinos [Requirement] | API access rationale | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications shall access only its specified device features, extensions and content. [Source] webinos [Requirement] | Application capability restriction | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications shall specify its required functionality at install time or during updates. [Source] webinos [Requirement] | Application intent | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications shall be isolated from each other. [Source] webinos [Requirement] | Application isolation | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Changes to existing application intentions and permissions shall be approved by the end user. [Source] webinos [Requirement] | Application policy approval | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Before being installed or updated, origin authenticity and integrity checks shall be performed by the runtime [Source] webinos [Requirement] | Authenticity check | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] The list of authorities that certified an application shall be viewable by end-users. [Source] webinos [Requirement] | Certifier list | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] The webinos runtime shall support the confidential storage of user credentials. [Source] webinos [Requirement] | Confidential credentials storage | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Access to credentials storage shall be limited to a specific user, a specific device and a set of applications. [Source] webinos [Requirement] | Credentials access restriction | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] applications shall be able to explain how collected sensitive data will be managed. [Source] webinos [Requirement] | Data management rationale | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] A default security and privacy policy shall exist an be enforced on each conformant runtime [Source] webinos [Requirement] | Default policy | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Personal devices shall be bound to their owner's identities. [Source] webinos [Requirement] | Device-identity binding | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] The binding between personal devices and owner's identity shall be revokable. [Source] webinos [Requirement] | Device-identity binding revokation | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Runtimes can enforce multiple access control rules written by multiple stakeholders in a hierarchy. [Source] webinos [Requirement] | Hierarchical policy enforcement | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Data cached by a runtime shall be securely stored to prevent disclosure and tampering by unauthorised entitites. [Source] webinos [Requirement] | Secure cache | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Application data shall be securely stored to prevent disclosure and tampering by unauthorised entities. [Source] webinos [Requirement] | Secure storage | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application. [Source] webinos [Implications] Apps must have provenance data attached to them [Requirement] | Trusted application source | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] "An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app" [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] App permissions can be changed remotely [Requirement] | App stores can revoke applications | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] B2G: "App store must be able to set the default permissions for an app". [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] The user is not the only source of access control decisions. this also suggests a need for conflict resolution. [Requirement] | External trusted party can set app default permissions | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Applications must be installed before executed [Source] B2G, webinos [Requirement] | Installation | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example) [Source] B2G (user), webinos (user) [Implications] Access control settings must be changeable [Requirement] | Owner override | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] There must be a standard way for applications to identify the permissions they have and lack [Requirement] | App privilege visibility | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Requirement] | Permission usability | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Apps should not be vulnerable to common web vulnerabilities when granted significant privileges [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Non-browser security context: may be additional restrictions on HTML/JavaScript [Requirement] | Immunity to browser-based threats | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Different 'levels' apply to SysApps - possibly 'roles' [Requirement] | Pre-installed app permissions | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
a48b6b78_WG__Security_Model____W3C_Wiki__Requirement | [Description] Ability for a system application to access (read and write) files outside of that application's sandboxed storage area. [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications] Need to provide both sandboxed and non-sandboxed storage [Requirement] | Access to files outside owned by the platform | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Requirement | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62609&oldid=62608 | 44/1438042981525.10_20150728002301-00166-ip-10-236-191-2_816009314_1.json |
603565e9_mework__Operational_Guidelines__extent_of_test_materials | [Level] 2. [testability of specification] In addition to the regular specifications reviews mentioned in the previous level, Working Group commits to develop a set of test assertions, not necessarily complete, before beginning development of a test suite. [extent of test materials] | Working Group commits that test suite for the specification, not necessarily complete and thorough, will exist before specification becomes Recommendation. | [] | QA Framework: Operational Guidelines | extent of test materials | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
603565e9_mework__Operational_Guidelines__extent_of_test_materials | [Level] 3. [testability of specification] In addition to regular specification reviews, a Working Group aims to have numerous normative use cases in the body of the Recommendation. [extent of test materials] | In addition to the commitment of the previous level, a Working Group ensures that the test suite produced is reviewed by the Working Group or externally and the review process meets the criteria established in this document. | [] | QA Framework: Operational Guidelines | extent of test materials | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
603565e9_mework__Operational_Guidelines__extent_of_test_materials | [Level] 4. [testability of specification] Same as above. [extent of test materials] | Working Group commits to establish and maintain the test cases contribution and review process and will produce and review the test suite, not necessarily complete and thorough, before the specification becomes Recommendation. | [] | QA Framework: Operational Guidelines | extent of test materials | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
603565e9_mework__Operational_Guidelines__extent_of_test_materials | [Level] 5. [testability of specification] In addition to the commitments from the previous level, Working Group will derive the list of testable assertions as an addendum to specification by the time it becomes Recommendation. [extent of test materials] | Same as above | [] | QA Framework: Operational Guidelines | extent of test materials | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
603565e9_mework__Operational_Guidelines__extent_of_test_materials | [Level] 6. [testability of specification] Same as above [extent of test materials] | In addition to the commitment for the previous level, a Working Group insists on a complete test suite before corresponding standard becomes Recommendation. | [] | QA Framework: Operational Guidelines | extent of test materials | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
603565e9_mework__Operational_Guidelines__extent_of_test_materials | [Level] 7. [testability of specification] Same as above [extent of test materials] | In addition to the commitment for the previous level, Working Group plans to maintain the test suite even after Specification becomes recommendation. Working Group plans to support versioning and errata in the test suite and review appeals. | [] | QA Framework: Operational Guidelines | extent of test materials | http://www.w3.org/QA/WG/2002/framework-20020405/qaframe-ops | 44/1438042990445.44_20150728002310-00107-ip-10-236-191-2_808345678_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] true or false [Description] whether to do inclusive or exclusive dealing of namespaces. In exclusive mode the InclusiveNamespaces parameter can be specified listing the prefixes that are to be treated in an inclusive mode [Default] false [Name] | ExclusiveMode | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] space separated list of prefixes [Description] list of prefixes to be treated inclusively. Special token #default indicates the default namespace. [Default] empty [Name] | InclusiveNamespace | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] true or false [Description] whether to ignore comments during canonicalization [Default] true [Name] | IgnoreComments | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] true or false [Description] whether to trim (i.e. remove leading and trailing whitespaces) all text nodes when canonicalizing. Adjacent text nodes must be coalesced prior to trimming. If an element has an xml:space="preserve" attribute, then text node descendants of that element are not trimmed regardless of the value of this parameter. [Default] false [Name] | TrimTextNodes | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] serializeXML or serializeEXI [Description] whether to do the normal XML serialization (http://www.w3.org/2010/xml-c14n2#serializeXML), or do an EXI serialization (http://www.w3.org/2010/xml-c14n2#serializeEXI) - which is useful if the original document to be canonicalized is already in EXI format. [Default] serializeXML [Name] | Serialization | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] none, sequential, derived [Description] with none, prefixes are not changed, with sequential prefixes are changed to n1, n2, n3 ... and with derived, each prefix is changed to nSuffix, where the suffix is derived by doing a digest of the namespace URI. [Default] none [Name] | PrefixRewrite | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] true or false [Description] whether the attributes need to be sorted before canonicalization. In some environments the order of attributes changes in transit so sorting is important. [Default] true [Name] | SortAttributes | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] inherit, none [Description] where to inherit the simple inheritable attributes (xml:lang and xml:space) and combine the xml:base i.e. similar to Canonical XML 1.1 or to completely ignore xml attributes in ancestors similar to Exclusive Canonical XML 1.0 [Default] inherit [Name] | XmlAncestors | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
f617de70_Canonical_XML_Version_2_0__Name | [Values] an enumeration of qualified element names, qualified attribute names, and unqualified attribute names (identified by name, and parent qualified name) [Description] set of nodes whose entire content must be processed as QName-valued or [CURIE]-valued for the purposes of canonicalization, including prefix rewriting and recognition of prefix "visible utilization" [Default] empty set [Name] | QNameAware | [
[
"E",
"x",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"M",
"o",
"d",
"e"
],
[
"I",
"n",
"c",
"l",
"u",
"s",
"i",
"v",
"e",
"N",
"a",
"m",
"e",
"s",
"p",
"a",
"c",
"e"
],
[
"I",
"g",
"n",
"o",
"r",
"e",
"C",
"o",
"m",
"m",
"e",
"n",
"t",
"s"
],
[
"T",
"r",
"i",
"m",
"T",
"e",
"x",
"t",
"N",
"o",
"d",
"e",
"s"
],
[
"S",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"P",
"r",
"e",
"f",
"i",
"x",
"R",
"e",
"w",
"r",
"i",
"t",
"e"
],
[
"S",
"o",
"r",
"t",
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e",
"s"
],
[
"X",
"m",
"l",
"A",
"n",
"c",
"e",
"s",
"t",
"o",
"r",
"s"
],
[
"Q",
"N",
"a",
"m",
"e",
"A",
"w",
"a",
"r",
"e"
]
] | Canonical XML Version 2.0 | Name | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] roletype [Description] | Describes the structural and functional purpose of an element. A Role is also a concept. | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] input [Description] | Generic type for widgets that can have a value | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] textbox [Description] | Generic type for the inputs that allow free-form text as their value | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] select [Description] | A form control that allows the user to make selections from a set of choices | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] range [Description] | Represents a range of values that can be set by the user. | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] section [Description] | A logical part of a DeliveryUnit (page or a document) | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] sectionhead [Description] | A heading without level | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
ed9453e5_h_Internet_Applications__ARIA__Base_Roles_Description | [Role] window [Description] | Browser or application window | [] | Roles for Accessible Rich Internet Applications (ARIA) | Description | http://www.w3.org/TR/2006/WD-aria-role-20060921/ | 44/1438042981525.10_20150728002301-00244-ip-10-236-191-2_802866513_1.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] acceptTracking [Semantics] The Assigner requires that the Assignee(s) accepts that the use of the Asset may be tracked [Comment] | The collected information may be tracked by the Assigner, or may link to a Party with the role function “trackingParty”. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] attribute [Semantics] The Assigner requires that the Assignee(s) attributes the Asset to the Assigner or an attributed Party. [Comment] | May link to an Asset with the attribution information. May link to a Party with the role function “attributedParty”. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] compensate [Semantics] The Assigner requires that the Assignee(s) compensates the Assigner (or other specified compensation Party) by some amount of value, if defined, for use of the Asset. [Comment] | The compensation may use different types of things with a value: – the thing is expressed by the value (term) of the Constraint name – the value is expressed by operator, rightOperand, dataType and unit | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] delete [Semantics] The Assigner requires that the Assignee(s) permanently removes all copies of the Asset. [Comment] | Use a constraint to define under which conditions the Asset should be deleted. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] include [Semantics] The Assigner requires that the Assignee(s) include(s) other related assets in the Asset. [Comment] | For example; Bio picture must be included in the attribution. Use of the Asset relation attribute is required | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] inform [Semantics] The Assigner requires that the Assignee(s) inform(s) the Assigner or an informed Party that an action has been performed on or in relation to the Asset. [Comment] | May link to a Party with the role function “informedParty”. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] obtainConsent [Semantics] The Assigner requires that the Assignee(s) obtains explicit consent from the Assigner or a consenting Party to perform the requested action in relation to the Asset. [Comment] | Used as a Duty to ensure that the Assigner or a Party is authorized to approve such actions on a case-by-case basis. May link to a Party with the role function “consentingParty”. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] reviewPolicy [Semantics] The Assigner requires that the Assignee(s) has(ve) a person review the Policy applicable to the Asset. [Comment] | Used when human intervention is required to review the Policy. May link to an Asset which represents the full Policy information. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] uninstall [Semantics] The Assigner requires that the Assignee(s) unload(s) and delete(s) the computer program Asset from a storage device and disable(s) its readiness for operation. [Comment] | The Asset is no longer accessible to the Assignee(s). | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
14ef1446_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Comment | [Identifier] watermark [Semantics] The Assigner requires that the Assignee(s) apply(ies) a watermark as provided by the Assigner to the Asset. [Comment] | It is recommended to embed a link to the watermark. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Comment | https://www.w3.org/community/odrl/vocab/2.1/?rev=281 | 44/1438042988399.65_20150728002308-00251-ip-10-236-191-2_935855568_4.json |
280d01ee_tion_Tag_Set__ITS__Version_2_0__Notes | [Value] terminology [Description] An incorrect term or a term from the wrong domain was used or terms are used inconsistently. [Example] The localization had “Pen Drive” when corporate terminology specified that “USB Stick” was to be used. The localized text inconsistently used "Start" and "Begin". A text renders the Hungarian term recsegőhid as “buzzer bridge” in English (a literal translation), but the term to be used in English is “wedge block,” as specified in a terminology list supplied to the translator. [Scope] S or T [Notes] | This value is not intended for simple typographical errors or word choice not related to defined terminologies. For example, a mistyping of “pin” as “pen” or the use of “imply” instead of “infer” (mistaking two commonly confused words) would not count as terminology issues and is best categorized as either spelling errors or mistranslations, depending on the nature of the issue. Terminology refers only to cases where incorrect choices about terms (either formal or commonly defined in a domain) are involved. | [] | Internationalization Tag Set (ITS) Version 2.0 | Notes | http://www.w3.org/International/multilingualweb/lt/drafts/its20/TR-version/ | 44/1438042981525.10_20150728002301-00203-ip-10-236-191-2_817248345_4.json |
280d01ee_tion_Tag_Set__ITS__Version_2_0__Notes | [Value] mistranslation [Description] The content of the target mistranslates the content of the source. [Example] The English source reads "An ape succeeded in grasping a banana lying outside its cage with the help of a stick" but the Italian translation reads "l'ape riuscì a prendere la banana posta tuori dall sua gabbia aiutandosi con un bastone" ("A bee succeeded...") [Scope] T [Notes] | Issues related to translation of specific terms related to the domain or task-specific language are to be categorized as terminology issues. | [] | Internationalization Tag Set (ITS) Version 2.0 | Notes | http://www.w3.org/International/multilingualweb/lt/drafts/its20/TR-version/ | 44/1438042981525.10_20150728002301-00203-ip-10-236-191-2_817248345_4.json |
280d01ee_tion_Tag_Set__ITS__Version_2_0__Notes | [Value] omission [Description] Necessary text has been omitted from the localization or source. [Example] One or more segments found in the source that have been intended for translation are missing in the target. After an alignment, a verification tool flags the pairs of aligned segments where the target has no corresponding source because of incorrect segmentation or some alignment issue. In such case the 'omission' type may apply to the source entry. [Scope] S or T [Notes] | This value is not to be used for missing whitespace or formatting codes, but instead has to be reserved for linguistic content. | [] | Internationalization Tag Set (ITS) Version 2.0 | Notes | http://www.w3.org/International/multilingualweb/lt/drafts/its20/TR-version/ | 44/1438042981525.10_20150728002301-00203-ip-10-236-191-2_817248345_4.json |
280d01ee_tion_Tag_Set__ITS__Version_2_0__Notes | [Value] untranslated [Description] Content that has been intended for translation is left untranslated. [Example] The source segment reads "The Professor said to Smith that he would hear from his lawyer" but the Hungarian localization reads "A professzor azt mondta Smithnek, hogy he would hear from his lawyer." [Scope] T [Notes] | omission takes precedence over untranslated. Omissions are distinct in that they address cases where text is not present, while untranslated addresses cases where text has been carried from the source untranslated. | [] | Internationalization Tag Set (ITS) Version 2.0 | Notes | http://www.w3.org/International/multilingualweb/lt/drafts/its20/TR-version/ | 44/1438042981525.10_20150728002301-00203-ip-10-236-191-2_817248345_4.json |
280d01ee_tion_Tag_Set__ITS__Version_2_0__Notes | [Value] locale-specific-content [Description] The localization contains content that does not apply to the locale for which it was prepared. [Example] A text translated for the Japanese market contains call center numbers in Texas and refers to special offers available only in the U.S. [Scope] S or T [Notes] | Legally inappropriate material is to be classified as legal. | [] | Internationalization Tag Set (ITS) Version 2.0 | Notes | http://www.w3.org/International/multilingualweb/lt/drafts/its20/TR-version/ | 44/1438042981525.10_20150728002301-00203-ip-10-236-191-2_817248345_4.json |
280d01ee_tion_Tag_Set__ITS__Version_2_0__Notes | [Value] locale-violation [Description] Text violates norms for the intended locale. [Example] A text localized into German has dates in mm/dd/yyyy format instead of DD.MM.YYYY. A text for the Irish market uses American-style foot and inch measurements instead of centimeters. A text intended for a U.S.-based audience uses U.K. spellings such as “centre” and “colour.” [Scope] S or T [Notes] | This value can be used for spelling errors only if they relate specifically to locale expectations (e.g., a text consistently uses British instead of U.S. spellings for a text intended for the U.S.). If these errors are not systematic (e.g., a text uses U.S. spellings but has a single instance of “centre”), they are instead to be counted as spelling errors. | [] | Internationalization Tag Set (ITS) Version 2.0 | Notes | http://www.w3.org/International/multilingualweb/lt/drafts/its20/TR-version/ | 44/1438042981525.10_20150728002301-00203-ip-10-236-191-2_817248345_4.json |
280d01ee_tion_Tag_Set__ITS__Version_2_0__Notes | [Value] characters [Description] The text contains characters that are garbled or incorrect or that are not used in the language in which the content appears. [Example] A text ought to have a '•' but instead has a '¥' sign. A German text erroneously uses û, ô, and â instead of the appropriate 'ü', 'ö', and 'ä'. A Japanese text has been garbled and appears with Devanagari characters. [Scope] S or T [Notes] | Characters ought to be used in cases of garbling or systematic use of inappropriate characters, not for spelling issues where individual characters are replaced with incorrect one. | [] | Internationalization Tag Set (ITS) Version 2.0 | Notes | http://www.w3.org/International/multilingualweb/lt/drafts/its20/TR-version/ | 44/1438042981525.10_20150728002301-00203-ip-10-236-191-2_817248345_4.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.