task
stringlengths 12
101
| input
stringlengths 5
5.87k
| output
stringlengths 1
5.47k
| options
sequence | pageTitle
stringlengths 0
151
| outputColName
stringlengths 1
142
| url
stringlengths 24
147
| wdcFile
stringlengths 71
75
|
---|---|---|---|---|---|---|---|
8b9d6da1_HTML_5__Event_Name | [Target] Immediate user selection or the body element [Bubbles?] ✓ Bubbles [Cancelable?] ✓ Cancelable [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] Based on effectAllowed value [Default Action] Reject immediate user selection as potential target element [Event Name] | dragenter | [
[
"d",
"r",
"a",
"g",
"s",
"t",
"a",
"r",
"t"
],
[
"d",
"r",
"a",
"g"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"t",
"e",
"r"
],
[
"d",
"r",
"a",
"g",
"l",
"e",
"a",
"v",
"e"
],
[
"d",
"r",
"a",
"g",
"o",
"v",
"e",
"r"
],
[
"d",
"r",
"o",
"p"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"d"
]
] | HTML 5 | Event Name | http://www.w3.org/TR/2008/WD-html5-20080610/editing.html | 46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json |
8b9d6da1_HTML_5__Event_Name | [Target] Previous target element [Bubbles?] ✓ Bubbles [Cancelable?] — [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] none [Default Action] None [Event Name] | dragleave | [
[
"d",
"r",
"a",
"g",
"s",
"t",
"a",
"r",
"t"
],
[
"d",
"r",
"a",
"g"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"t",
"e",
"r"
],
[
"d",
"r",
"a",
"g",
"l",
"e",
"a",
"v",
"e"
],
[
"d",
"r",
"a",
"g",
"o",
"v",
"e",
"r"
],
[
"d",
"r",
"o",
"p"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"d"
]
] | HTML 5 | Event Name | http://www.w3.org/TR/2008/WD-html5-20080610/editing.html | 46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json |
8b9d6da1_HTML_5__Event_Name | [Target] Current target element [Bubbles?] ✓ Bubbles [Cancelable?] ✓ Cancelable [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] Based on effectAllowed value [Default Action] Reset the current drag operation to "none" [Event Name] | dragover | [
[
"d",
"r",
"a",
"g",
"s",
"t",
"a",
"r",
"t"
],
[
"d",
"r",
"a",
"g"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"t",
"e",
"r"
],
[
"d",
"r",
"a",
"g",
"l",
"e",
"a",
"v",
"e"
],
[
"d",
"r",
"a",
"g",
"o",
"v",
"e",
"r"
],
[
"d",
"r",
"o",
"p"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"d"
]
] | HTML 5 | Event Name | http://www.w3.org/TR/2008/WD-html5-20080610/editing.html | 46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json |
8b9d6da1_HTML_5__Event_Name | [Target] Current target element [Bubbles?] ✓ Bubbles [Cancelable?] ✓ Cancelable [dataTransfer] getData() returns data set in dragstart event [effectAllowed] Same as last event [dropEffect] Current drag operation [Default Action] Varies [Event Name] | drop | [
[
"d",
"r",
"a",
"g",
"s",
"t",
"a",
"r",
"t"
],
[
"d",
"r",
"a",
"g"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"t",
"e",
"r"
],
[
"d",
"r",
"a",
"g",
"l",
"e",
"a",
"v",
"e"
],
[
"d",
"r",
"a",
"g",
"o",
"v",
"e",
"r"
],
[
"d",
"r",
"o",
"p"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"d"
]
] | HTML 5 | Event Name | http://www.w3.org/TR/2008/WD-html5-20080610/editing.html | 46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json |
8b9d6da1_HTML_5__Event_Name | [Target] Source node [Bubbles?] ✓ Bubbles [Cancelable?] — [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] Current drag operation [Default Action] Varies [Event Name] | dragend | [
[
"d",
"r",
"a",
"g",
"s",
"t",
"a",
"r",
"t"
],
[
"d",
"r",
"a",
"g"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"t",
"e",
"r"
],
[
"d",
"r",
"a",
"g",
"l",
"e",
"a",
"v",
"e"
],
[
"d",
"r",
"a",
"g",
"o",
"v",
"e",
"r"
],
[
"d",
"r",
"o",
"p"
],
[
"d",
"r",
"a",
"g",
"e",
"n",
"d"
]
] | HTML 5 | Event Name | http://www.w3.org/TR/2008/WD-html5-20080610/editing.html | 46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] Character data [Attribute Type] | CDATA | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] A document-unique identifier [Attribute Type] | ID | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] A reference to a document-unique identifier [Attribute Type] | IDREF | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] A space-separated list of references to document-unique identifiers [Attribute Type] | IDREFS | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] A name with the same character constraints as ID above [Attribute Type] | NAME | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] A name composed of only name tokens as defined in XML 1.0 [XML]. [Attribute Type] | NMTOKEN | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] One or more white space separated NMTOKEN values [Attribute Type] | NMTOKENS | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
62a915f1_XHTML_2_0__Attribute_Type | [Definition] Processed character data [Attribute Type] | PCDATA | [
[
"C",
"D",
"A",
"T",
"A"
],
[
"I",
"D"
],
[
"I",
"D",
"R",
"E",
"F"
],
[
"I",
"D",
"R",
"E",
"F",
"S"
],
[
"N",
"A",
"M",
"E"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N"
],
[
"N",
"M",
"T",
"O",
"K",
"E",
"N",
"S"
],
[
"P",
"C",
"D",
"A",
"T",
"A"
]
] | XHTML 2.0 | Attribute Type | http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html | 46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Supports many device form factors [Description] Supports a wide variety of devices including desktop & laptop computers, smart phones, tablets, TVs, cameras, and other connected devices [Source] SysApps Charter [Implications] | The security model can make no assumptions about how the device will be used or shared between people and cannot assume a particular process model. | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] DAP API Support [Description] All APIs defined by DAP should be accessible to system applications [Source] SysApps Charter [Implications] | Either DAP APIs will need to change slightly in the systems context or the security model must allow for API-specific access controls | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Minimal user prompting [Description] Problems such as 'double prompting' should be avoided when integrating other APIs [Source] SysApps Charter [Implications] | Some details of the expected user interactions may need to be specified in the security model or APIs | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Communicate with other applications [Description] Applications can communicate with other applications [Implications] | Some kind of messaging will be supported | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Communicate with pre-defined endpoints [Description] Applications can communicate with pre-defined web addresses [Implications] | Access remote domains will be possible | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Trusted application source [Description] When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application. [Source] webinos [Implications] | Apps must have provenance data attached to them | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] App stores can revoke applications [Description] "An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app" [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | App permissions can be changed remotely | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] External trusted party can set app default permissions [Description] B2G: "App store must be able to set the default permissions for an app". [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | The user is not the only source of access control decisions. this also suggests a need for conflict resolution. | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Owner override [Description] The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example) [Source] B2G (user), webinos (user) [Implications] | Access control settings must be changeable | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] App privilege visibility [Description] Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | There must be a standard way for applications to identify the permissions they have and lack | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Immunity to browser-based threats [Description] Apps should not be vulnerable to common web vulnerabilities when granted significant privileges [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | Non-browser security context: may be additional restrictions on HTML/JavaScript | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Pre-installed app permissions [Description] Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | Different 'levels' apply to SysApps - possibly 'roles' | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
a2b8a521__WG__Security_Model___W3C_Wiki__Implications | [Requirement] Access to files outside owned by the platform [Description] Ability for a system application to access (read and write) files outside of that application's sandboxed storage area. [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications] | Need to provide both sandboxed and non-sandboxed storage | [] | System Applications WG: Security Model - W3C Wiki | Implications | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Alarm API [Source] SysApps Charter [Description] | Applications can create alarms, notifying users | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Contacts API [Source] SysApps Charter [Description] | Apps can add, remove and edit contacts | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Messaging API [Source] SysApps Charter [Description] | Apps can send, receive and view SMS | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Telephony API [Source] SysApps Charter [Description] | Apps can access the telephony capabilities of the underlyling platform: dial a number, pick up a call, route to voicemail, access the call log | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Raw Sockets API [Source] SysApps Charter [Description] | Apps can create, manipulate and listen for low-level TCP and UDP connections | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Supports many device form factors [Source] SysApps Charter [Implications] The security model can make no assumptions about how the device will be used or shared between people and cannot assume a particular process model. [Description] | Supports a wide variety of devices including desktop & laptop computers, smart phones, tablets, TVs, cameras, and other connected devices | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] DAP API Support [Source] SysApps Charter [Implications] Either DAP APIs will need to change slightly in the systems context or the security model must allow for API-specific access controls [Description] | All APIs defined by DAP should be accessible to system applications | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Minimal user prompting [Source] SysApps Charter [Implications] Some details of the expected user interactions may need to be specified in the security model or APIs [Description] | Problems such as 'double prompting' should be avoided when integrating other APIs | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] HTML5 [Description] | Applications consist of HTML, CSS and JavaScript | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Location [Description] | Applications have access to geolocation data | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Communicate with other applications [Implications] Some kind of messaging will be supported [Description] | Applications can communicate with other applications | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Communicate with pre-defined endpoints [Implications] Access remote domains will be possible [Description] | Applications can communicate with pre-defined web addresses | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Valid across multiple platforms [Source] Compatibility of application packages [Description] | Applications can run on any conformant platform, potentially including any device form factor | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Access control log [Source] webinos [Description] | Allow access control decisions to be logged. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] API access rationale [Source] webinos [Description] | Applications shall be able to explain why access to data or APIs is being requested. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Application capability restriction [Source] webinos [Description] | Applications shall access only its specified device features, extensions and content. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Application intent [Source] webinos [Description] | Applications shall specify its required functionality at install time or during updates. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Application isolation [Source] webinos [Description] | Applications shall be isolated from each other. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Application policy approval [Source] webinos [Description] | Changes to existing application intentions and permissions shall be approved by the end user. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Authenticity check [Source] webinos [Description] | Before being installed or updated, origin authenticity and integrity checks shall be performed by the runtime | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Certifier list [Source] webinos [Description] | The list of authorities that certified an application shall be viewable by end-users. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Confidential credentials storage [Source] webinos [Description] | The webinos runtime shall support the confidential storage of user credentials. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Credentials access restriction [Source] webinos [Description] | Access to credentials storage shall be limited to a specific user, a specific device and a set of applications. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Data management rationale [Source] webinos [Description] | applications shall be able to explain how collected sensitive data will be managed. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Default policy [Source] webinos [Description] | A default security and privacy policy shall exist an be enforced on each conformant runtime | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Device-identity binding [Source] webinos [Description] | Personal devices shall be bound to their owner's identities. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Device-identity binding revokation [Source] webinos [Description] | The binding between personal devices and owner's identity shall be revokable. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Hierarchical policy enforcement [Source] webinos [Description] | Runtimes can enforce multiple access control rules written by multiple stakeholders in a hierarchy. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Secure cache [Source] webinos [Description] | Data cached by a runtime shall be securely stored to prevent disclosure and tampering by unauthorised entitites. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Secure storage [Source] webinos [Description] | Application data shall be securely stored to prevent disclosure and tampering by unauthorised entities. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Trusted application source [Source] webinos [Implications] Apps must have provenance data attached to them [Description] | When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] App stores can revoke applications [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] App permissions can be changed remotely [Description] | "An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app" | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] External trusted party can set app default permissions [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] The user is not the only source of access control decisions. this also suggests a need for conflict resolution. [Description] | B2G: "App store must be able to set the default permissions for an app". | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Installation [Source] B2G, webinos [Description] | Applications must be installed before executed | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Owner override [Source] B2G (user), webinos (user) [Implications] Access control settings must be changeable [Description] | The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example) | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] App privilege visibility [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] There must be a standard way for applications to identify the permissions they have and lack [Description] | Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Permission usability [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Description] | Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Immunity to browser-based threats [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Non-browser security context: may be additional restrictions on HTML/JavaScript [Description] | Apps should not be vulnerable to common web vulnerabilities when granted significant privileges | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Pre-installed app permissions [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Different 'levels' apply to SysApps - possibly 'roles' [Description] | Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
b34ba0b8__WG__Security_Model___W3C_Wiki__Description | [Requirement] Access to files outside owned by the platform [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications] Need to provide both sandboxed and non-sandboxed storage [Description] | Ability for a system application to access (read and write) files outside of that application's sandboxed storage area. | [] | System Applications WG: Security Model - W3C Wiki | Description | http://www.w3.org/wiki/System_Applications_WG:_Security_Model | 46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] acceptTracking [Comment] The collected information may be tracked by the Assigner, or may link to a Party with the role function “trackingParty”. [Semantics] | The Assigner requires that the Assignee(s) accepts that the use of the Asset may be tracked | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] attribute [Comment] May link to an Asset with the attribution information. May link to a Party with the role function “attributedParty”. [Semantics] | The Assigner requires that the Assignee(s) attributes the Asset to the Assigner or an attributed Party. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] compensate [Comment] The compensation may use different types of things with a value: – the thing is expressed by the value (term) of the Constraint name – the value is expressed by operator, rightOperand, dataType and unit [Semantics] | The Assigner requires that the Assignee(s) compensates the Assigner (or other specified compensation Party) by some amount of value, if defined, for use of the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] delete [Comment] Use a constraint to define under which conditions the Asset should be deleted. [Semantics] | The Assigner requires that the Assignee(s) permanently removes all copies of the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] ensureExclusivity [Semantics] | The Assignee requires that the Assigner(s) ensure(s) that the permission on the Asset is exclusive to the Assignee. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] include [Comment] For example; Bio picture must be included in the attribution. Use of the Asset relation attribute is required [Semantics] | The Assigner requires that the Assignee(s) include(s) other related assets in the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] inform [Comment] May link to a Party with the role function “informedParty”. [Semantics] | The Assigner requires that the Assignee(s) inform(s) the Assigner or an informed Party that an action has been performed on or in relation to the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] nextPolicy [Semantics] | The Assigner requires that the Assignee(s) grants the specified Policy to a third party for their use of the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] obtainConsent [Comment] Used as a Duty to ensure that the Assigner or a Party is authorized to approve such actions on a case-by-case basis. May link to a Party with the role function “consentingParty”. [Semantics] | The Assigner requires that the Assignee(s) obtains explicit consent from the Assigner or a consenting Party to perform the requested action in relation to the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] reviewPolicy [Comment] Used when human intervention is required to review the Policy. May link to an Asset which represents the full Policy information. [Semantics] | The Assigner requires that the Assignee(s) has(ve) a person review the Policy applicable to the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] uninstall [Comment] The Asset is no longer accessible to the Assignee(s). [Semantics] | The Assigner requires that the Assignee(s) unload(s) and delete(s) the computer program Asset from a storage device and disable(s) its readiness for operation. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics | [Identifier] watermark [Comment] It is recommended to embed a link to the watermark. [Semantics] | The Assigner requires that the Assignee(s) apply(ies) a watermark as provided by the Assigner to the Asset. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=228 | 46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json |
cd29e711__hover_pseudo_class__2 | [0] The cells in [1] this table [2] | should go | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html | 46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json |
cd29e711__hover_pseudo_class__2 | [0] green when [1] you hover [2] | the pointing | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html | 46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json |
cd29e711__hover_pseudo_class__2 | [0] The rows in [1] this table [2] | should go | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html | 46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json |
cd29e711__hover_pseudo_class__2 | [0] dark green [1] when the [2] | pointing device | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html | 46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json |
cd29e711__hover_pseudo_class__2 | [0] is over the [1] five pixel [2] | border spacing | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html | 46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json |
cd29e711__hover_pseudo_class__2 | [0] Including here, [2] | blank cells. | [
[
"s",
"h",
"o",
"u",
"l",
"d",
" ",
"g",
"o"
],
[
"t",
"h",
"e",
" ",
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g"
],
[
"p",
"o",
"i",
"n",
"t",
"i",
"n",
"g",
" ",
"d",
"e",
"v",
"i",
"c",
"e"
],
[
"b",
"o",
"r",
"d",
"e",
"r",
" ",
"s",
"p",
"a",
"c",
"i",
"n",
"g"
],
[
"b",
"l",
"a",
"n",
"k",
" ",
"c",
"e",
"l",
"l",
"s",
"."
]
] | :hover pseudo-class | 2 | http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html | 46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 1.2 Synchronize text equivalents with multimedia presentations. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 1.3 Synchronize a description of the essential visual information in multimedia presentations. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 1.4 Use markup or a data model to provide the logical structure of content. [Manual checks] | Generate outline and determine if structure is good | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 1.5 Separate content and structure from presentation. [Auto checks] HTML Validator [Manual checks] | Increase font size in the browser settings. does all the text increase in size? | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 2.1 Provide more than one path or method to find content. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 2.2 Provide consistent responses to user actions. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 2.3 Give users control of mechanisms that cause extreme changes in context. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 2.4 Give users control over how long they can spend reading or interacting with content. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 2.5 Use device-independent event handlers. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 3.1 Use consistent presentation. [Manual checks] | Check for use of external style sheets. Check that classes are used for function rather than presentation (?) | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 3.2 Emphasize structure through presentation, positioning, and labels. [Manual checks] | Print on paper using only black and white ink. Is all the info present? i.e., is info presented not in color alone? | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 3.3 Write clearly and simply. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 3.5 Summarize complex information. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 3.6 Define key terms, abbreviations, acronyms, and specialized language. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 3.7 Divide information into smaller, more manageable units. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks] | N/A | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
3ad25668_y_Guidelines_13_September_2001__Manual_checks | [WCAG 2.0 checkpoint] 4.1 Choose languages, API's, and protocols that support the use of these guidelines. [Manual checks] | Use CSS1 or CSS2 with HTML 4.01 or XHTML 1.1 | [] | PDF Techniques for Web Content Accessibility Guidelines 13 September 2001 | Manual checks | http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/ | 46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.