task
stringlengths
12
101
input
stringlengths
5
5.87k
output
stringlengths
1
5.47k
options
sequence
pageTitle
stringlengths
0
151
outputColName
stringlengths
1
142
url
stringlengths
24
147
wdcFile
stringlengths
71
75
8b9d6da1_HTML_5__Event_Name
[Target] Immediate user selection or the body element [Bubbles?] ✓ Bubbles [Cancelable?] ✓ Cancelable [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] Based on effectAllowed value [Default Action] Reject immediate user selection as potential target element [Event Name]
dragenter
[ [ "d", "r", "a", "g", "s", "t", "a", "r", "t" ], [ "d", "r", "a", "g" ], [ "d", "r", "a", "g", "e", "n", "t", "e", "r" ], [ "d", "r", "a", "g", "l", "e", "a", "v", "e" ], [ "d", "r", "a", "g", "o", "v", "e", "r" ], [ "d", "r", "o", "p" ], [ "d", "r", "a", "g", "e", "n", "d" ] ]
HTML 5
Event Name
http://www.w3.org/TR/2008/WD-html5-20080610/editing.html
46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json
8b9d6da1_HTML_5__Event_Name
[Target] Previous target element [Bubbles?] ✓ Bubbles [Cancelable?] — [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] none [Default Action] None [Event Name]
dragleave
[ [ "d", "r", "a", "g", "s", "t", "a", "r", "t" ], [ "d", "r", "a", "g" ], [ "d", "r", "a", "g", "e", "n", "t", "e", "r" ], [ "d", "r", "a", "g", "l", "e", "a", "v", "e" ], [ "d", "r", "a", "g", "o", "v", "e", "r" ], [ "d", "r", "o", "p" ], [ "d", "r", "a", "g", "e", "n", "d" ] ]
HTML 5
Event Name
http://www.w3.org/TR/2008/WD-html5-20080610/editing.html
46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json
8b9d6da1_HTML_5__Event_Name
[Target] Current target element [Bubbles?] ✓ Bubbles [Cancelable?] ✓ Cancelable [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] Based on effectAllowed value [Default Action] Reset the current drag operation to "none" [Event Name]
dragover
[ [ "d", "r", "a", "g", "s", "t", "a", "r", "t" ], [ "d", "r", "a", "g" ], [ "d", "r", "a", "g", "e", "n", "t", "e", "r" ], [ "d", "r", "a", "g", "l", "e", "a", "v", "e" ], [ "d", "r", "a", "g", "o", "v", "e", "r" ], [ "d", "r", "o", "p" ], [ "d", "r", "a", "g", "e", "n", "d" ] ]
HTML 5
Event Name
http://www.w3.org/TR/2008/WD-html5-20080610/editing.html
46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json
8b9d6da1_HTML_5__Event_Name
[Target] Current target element [Bubbles?] ✓ Bubbles [Cancelable?] ✓ Cancelable [dataTransfer] getData() returns data set in dragstart event [effectAllowed] Same as last event [dropEffect] Current drag operation [Default Action] Varies [Event Name]
drop
[ [ "d", "r", "a", "g", "s", "t", "a", "r", "t" ], [ "d", "r", "a", "g" ], [ "d", "r", "a", "g", "e", "n", "t", "e", "r" ], [ "d", "r", "a", "g", "l", "e", "a", "v", "e" ], [ "d", "r", "a", "g", "o", "v", "e", "r" ], [ "d", "r", "o", "p" ], [ "d", "r", "a", "g", "e", "n", "d" ] ]
HTML 5
Event Name
http://www.w3.org/TR/2008/WD-html5-20080610/editing.html
46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json
8b9d6da1_HTML_5__Event_Name
[Target] Source node [Bubbles?] ✓ Bubbles [Cancelable?] — [dataTransfer] Empty [effectAllowed] Same as last event [dropEffect] Current drag operation [Default Action] Varies [Event Name]
dragend
[ [ "d", "r", "a", "g", "s", "t", "a", "r", "t" ], [ "d", "r", "a", "g" ], [ "d", "r", "a", "g", "e", "n", "t", "e", "r" ], [ "d", "r", "a", "g", "l", "e", "a", "v", "e" ], [ "d", "r", "a", "g", "o", "v", "e", "r" ], [ "d", "r", "o", "p" ], [ "d", "r", "a", "g", "e", "n", "d" ] ]
HTML 5
Event Name
http://www.w3.org/TR/2008/WD-html5-20080610/editing.html
46/1438042988922.24_20150728002308-00271-ip-10-236-191-2_825196425_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] Character data [Attribute Type]
CDATA
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] A document-unique identifier [Attribute Type]
ID
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] A reference to a document-unique identifier [Attribute Type]
IDREF
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] A space-separated list of references to document-unique identifiers [Attribute Type]
IDREFS
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] A name with the same character constraints as ID above [Attribute Type]
NAME
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] A name composed of only name tokens as defined in XML 1.0 [XML]. [Attribute Type]
NMTOKEN
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] One or more white space separated NMTOKEN values [Attribute Type]
NMTOKENS
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
62a915f1_XHTML_2_0__Attribute_Type
[Definition] Processed character data [Attribute Type]
PCDATA
[ [ "C", "D", "A", "T", "A" ], [ "I", "D" ], [ "I", "D", "R", "E", "F" ], [ "I", "D", "R", "E", "F", "S" ], [ "N", "A", "M", "E" ], [ "N", "M", "T", "O", "K", "E", "N" ], [ "N", "M", "T", "O", "K", "E", "N", "S" ], [ "P", "C", "D", "A", "T", "A" ] ]
XHTML 2.0
Attribute Type
http://www.w3.org/TR/2002/WD-xhtml2-20021211/xhtml2.html
46/1438042988922.24_20150728002308-00155-ip-10-236-191-2_842422045_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Supports many device form factors [Description] Supports a wide variety of devices including desktop & laptop computers, smart phones, tablets, TVs, cameras, and other connected devices [Source] SysApps Charter [Implications]
The security model can make no assumptions about how the device will be used or shared between people and cannot assume a particular process model.
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] DAP API Support [Description] All APIs defined by DAP should be accessible to system applications [Source] SysApps Charter [Implications]
Either DAP APIs will need to change slightly in the systems context or the security model must allow for API-specific access controls
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Minimal user prompting [Description] Problems such as 'double prompting' should be avoided when integrating other APIs [Source] SysApps Charter [Implications]
Some details of the expected user interactions may need to be specified in the security model or APIs
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Communicate with other applications [Description] Applications can communicate with other applications [Implications]
Some kind of messaging will be supported
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Communicate with pre-defined endpoints [Description] Applications can communicate with pre-defined web addresses [Implications]
Access remote domains will be possible
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Trusted application source [Description] When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application. [Source] webinos [Implications]
Apps must have provenance data attached to them
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] App stores can revoke applications [Description] "An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app" [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
App permissions can be changed remotely
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] External trusted party can set app default permissions [Description] B2G: "App store must be able to set the default permissions for an app". [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
The user is not the only source of access control decisions. this also suggests a need for conflict resolution.
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Owner override [Description] The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example) [Source] B2G (user), webinos (user) [Implications]
Access control settings must be changeable
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] App privilege visibility [Description] Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
There must be a standard way for applications to identify the permissions they have and lack
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Immunity to browser-based threats [Description] Apps should not be vulnerable to common web vulnerabilities when granted significant privileges [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
Non-browser security context: may be additional restrictions on HTML/JavaScript
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Pre-installed app permissions [Description] Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
Different 'levels' apply to SysApps - possibly 'roles'
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
a2b8a521__WG__Security_Model___W3C_Wiki__Implications
[Requirement] Access to files outside owned by the platform [Description] Ability for a system application to access (read and write) files outside of that application's sandboxed storage area. [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications]
Need to provide both sandboxed and non-sandboxed storage
[]
System Applications WG: Security Model - W3C Wiki
Implications
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Alarm API [Source] SysApps Charter [Description]
Applications can create alarms, notifying users
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Contacts API [Source] SysApps Charter [Description]
Apps can add, remove and edit contacts
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Messaging API [Source] SysApps Charter [Description]
Apps can send, receive and view SMS
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Telephony API [Source] SysApps Charter [Description]
Apps can access the telephony capabilities of the underlyling platform: dial a number, pick up a call, route to voicemail, access the call log
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Raw Sockets API [Source] SysApps Charter [Description]
Apps can create, manipulate and listen for low-level TCP and UDP connections
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Supports many device form factors [Source] SysApps Charter [Implications] The security model can make no assumptions about how the device will be used or shared between people and cannot assume a particular process model. [Description]
Supports a wide variety of devices including desktop & laptop computers, smart phones, tablets, TVs, cameras, and other connected devices
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] DAP API Support [Source] SysApps Charter [Implications] Either DAP APIs will need to change slightly in the systems context or the security model must allow for API-specific access controls [Description]
All APIs defined by DAP should be accessible to system applications
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Minimal user prompting [Source] SysApps Charter [Implications] Some details of the expected user interactions may need to be specified in the security model or APIs [Description]
Problems such as 'double prompting' should be avoided when integrating other APIs
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] HTML5 [Description]
Applications consist of HTML, CSS and JavaScript
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Location [Description]
Applications have access to geolocation data
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Communicate with other applications [Implications] Some kind of messaging will be supported [Description]
Applications can communicate with other applications
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Communicate with pre-defined endpoints [Implications] Access remote domains will be possible [Description]
Applications can communicate with pre-defined web addresses
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Valid across multiple platforms [Source] Compatibility of application packages [Description]
Applications can run on any conformant platform, potentially including any device form factor
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Access control log [Source] webinos [Description]
Allow access control decisions to be logged.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] API access rationale [Source] webinos [Description]
Applications shall be able to explain why access to data or APIs is being requested.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Application capability restriction [Source] webinos [Description]
Applications shall access only its specified device features, extensions and content.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Application intent [Source] webinos [Description]
Applications shall specify its required functionality at install time or during updates.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Application isolation [Source] webinos [Description]
Applications shall be isolated from each other.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Application policy approval [Source] webinos [Description]
Changes to existing application intentions and permissions shall be approved by the end user.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Authenticity check [Source] webinos [Description]
Before being installed or updated, origin authenticity and integrity checks shall be performed by the runtime
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Certifier list [Source] webinos [Description]
The list of authorities that certified an application shall be viewable by end-users.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Confidential credentials storage [Source] webinos [Description]
The webinos runtime shall support the confidential storage of user credentials.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Credentials access restriction [Source] webinos [Description]
Access to credentials storage shall be limited to a specific user, a specific device and a set of applications.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Data management rationale [Source] webinos [Description]
applications shall be able to explain how collected sensitive data will be managed.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Default policy [Source] webinos [Description]
A default security and privacy policy shall exist an be enforced on each conformant runtime
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Device-identity binding [Source] webinos [Description]
Personal devices shall be bound to their owner's identities.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Device-identity binding revokation [Source] webinos [Description]
The binding between personal devices and owner's identity shall be revokable.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Hierarchical policy enforcement [Source] webinos [Description]
Runtimes can enforce multiple access control rules written by multiple stakeholders in a hierarchy.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Secure cache [Source] webinos [Description]
Data cached by a runtime shall be securely stored to prevent disclosure and tampering by unauthorised entitites.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Secure storage [Source] webinos [Description]
Application data shall be securely stored to prevent disclosure and tampering by unauthorised entities.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Trusted application source [Source] webinos [Implications] Apps must have provenance data attached to them [Description]
When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] App stores can revoke applications [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] App permissions can be changed remotely [Description]
"An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app"
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] External trusted party can set app default permissions [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] The user is not the only source of access control decisions. this also suggests a need for conflict resolution. [Description]
B2G: "App store must be able to set the default permissions for an app".
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Installation [Source] B2G, webinos [Description]
Applications must be installed before executed
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Owner override [Source] B2G (user), webinos (user) [Implications] Access control settings must be changeable [Description]
The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example)
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] App privilege visibility [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] There must be a standard way for applications to identify the permissions they have and lack [Description]
Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Permission usability [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Description]
Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Immunity to browser-based threats [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Non-browser security context: may be additional restrictions on HTML/JavaScript [Description]
Apps should not be vulnerable to common web vulnerabilities when granted significant privileges
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Pre-installed app permissions [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Different 'levels' apply to SysApps - possibly 'roles' [Description]
Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
b34ba0b8__WG__Security_Model___W3C_Wiki__Description
[Requirement] Access to files outside owned by the platform [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications] Need to provide both sandboxed and non-sandboxed storage [Description]
Ability for a system application to access (read and write) files outside of that application's sandboxed storage area.
[]
System Applications WG: Security Model - W3C Wiki
Description
http://www.w3.org/wiki/System_Applications_WG:_Security_Model
46/1438042986444.39_20150728002306-00066-ip-10-236-191-2_827820607_0.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] acceptTracking [Comment] The collected information may be tracked by the Assigner, or may link to a Party with the role function “trackingParty”. [Semantics]
The Assigner requires that the Assignee(s) accepts that the use of the Asset may be tracked
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] attribute [Comment] May link to an Asset with the attribution information. May link to a Party with the role function “attributedParty”. [Semantics]
The Assigner requires that the Assignee(s) attributes the Asset to the Assigner or an attributed Party.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] compensate [Comment] The compensation may use different types of things with a value: – the thing is expressed by the value (term) of the Constraint name – the value is expressed by operator, rightOperand, dataType and unit [Semantics]
The Assigner requires that the Assignee(s) compensates the Assigner (or other specified compensation Party) by some amount of value, if defined, for use of the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] delete [Comment] Use a constraint to define under which conditions the Asset should be deleted. [Semantics]
The Assigner requires that the Assignee(s) permanently removes all copies of the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] ensureExclusivity [Semantics]
The Assignee requires that the Assigner(s) ensure(s) that the permission on the Asset is exclusive to the Assignee.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] include [Comment] For example; Bio picture must be included in the attribution. Use of the Asset relation attribute is required [Semantics]
The Assigner requires that the Assignee(s) include(s) other related assets in the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] inform [Comment] May link to a Party with the role function “informedParty”. [Semantics]
The Assigner requires that the Assignee(s) inform(s) the Assigner or an informed Party that an action has been performed on or in relation to the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] nextPolicy [Semantics]
The Assigner requires that the Assignee(s) grants the specified Policy to a third party for their use of the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] obtainConsent [Comment] Used as a Duty to ensure that the Assigner or a Party is authorized to approve such actions on a case-by-case basis. May link to a Party with the role function “consentingParty”. [Semantics]
The Assigner requires that the Assignee(s) obtains explicit consent from the Assigner or a consenting Party to perform the requested action in relation to the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] reviewPolicy [Comment] Used when human intervention is required to review the Policy. May link to an Asset which represents the full Policy information. [Semantics]
The Assigner requires that the Assignee(s) has(ve) a person review the Policy applicable to the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] uninstall [Comment] The Asset is no longer accessible to the Assignee(s). [Semantics]
The Assigner requires that the Assignee(s) unload(s) and delete(s) the computer program Asset from a storage device and disable(s) its readiness for operation.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
8a888a1d_abulary___ODRL_Community_Group_r_entity_Action_used_with_Duty_Semantics
[Identifier] watermark [Comment] It is recommended to embed a link to the watermark. [Semantics]
The Assigner requires that the Assignee(s) apply(ies) a watermark as provided by the Assigner to the Asset.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=228
46/1438042986444.39_20150728002306-00072-ip-10-236-191-2_923505242_4.json
cd29e711__hover_pseudo_class__2
[0] The cells in [1] this table [2]
should go
[ [ "s", "h", "o", "u", "l", "d", " ", "g", "o" ], [ "t", "h", "e", " ", "p", "o", "i", "n", "t", "i", "n", "g" ], [ "p", "o", "i", "n", "t", "i", "n", "g", " ", "d", "e", "v", "i", "c", "e" ], [ "b", "o", "r", "d", "e", "r", " ", "s", "p", "a", "c", "i", "n", "g" ], [ "b", "l", "a", "n", "k", " ", "c", "e", "l", "l", "s", "." ] ]
:hover pseudo-class
2
http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html
46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json
cd29e711__hover_pseudo_class__2
[0] green when [1] you hover [2]
the pointing
[ [ "s", "h", "o", "u", "l", "d", " ", "g", "o" ], [ "t", "h", "e", " ", "p", "o", "i", "n", "t", "i", "n", "g" ], [ "p", "o", "i", "n", "t", "i", "n", "g", " ", "d", "e", "v", "i", "c", "e" ], [ "b", "o", "r", "d", "e", "r", " ", "s", "p", "a", "c", "i", "n", "g" ], [ "b", "l", "a", "n", "k", " ", "c", "e", "l", "l", "s", "." ] ]
:hover pseudo-class
2
http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html
46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json
cd29e711__hover_pseudo_class__2
[0] The rows in [1] this table [2]
should go
[ [ "s", "h", "o", "u", "l", "d", " ", "g", "o" ], [ "t", "h", "e", " ", "p", "o", "i", "n", "t", "i", "n", "g" ], [ "p", "o", "i", "n", "t", "i", "n", "g", " ", "d", "e", "v", "i", "c", "e" ], [ "b", "o", "r", "d", "e", "r", " ", "s", "p", "a", "c", "i", "n", "g" ], [ "b", "l", "a", "n", "k", " ", "c", "e", "l", "l", "s", "." ] ]
:hover pseudo-class
2
http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html
46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json
cd29e711__hover_pseudo_class__2
[0] dark green [1] when the [2]
pointing device
[ [ "s", "h", "o", "u", "l", "d", " ", "g", "o" ], [ "t", "h", "e", " ", "p", "o", "i", "n", "t", "i", "n", "g" ], [ "p", "o", "i", "n", "t", "i", "n", "g", " ", "d", "e", "v", "i", "c", "e" ], [ "b", "o", "r", "d", "e", "r", " ", "s", "p", "a", "c", "i", "n", "g" ], [ "b", "l", "a", "n", "k", " ", "c", "e", "l", "l", "s", "." ] ]
:hover pseudo-class
2
http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html
46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json
cd29e711__hover_pseudo_class__2
[0] is over the [1] five pixel [2]
border spacing
[ [ "s", "h", "o", "u", "l", "d", " ", "g", "o" ], [ "t", "h", "e", " ", "p", "o", "i", "n", "t", "i", "n", "g" ], [ "p", "o", "i", "n", "t", "i", "n", "g", " ", "d", "e", "v", "i", "c", "e" ], [ "b", "o", "r", "d", "e", "r", " ", "s", "p", "a", "c", "i", "n", "g" ], [ "b", "l", "a", "n", "k", " ", "c", "e", "l", "l", "s", "." ] ]
:hover pseudo-class
2
http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html
46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json
cd29e711__hover_pseudo_class__2
[0] Including here, [2]
blank cells.
[ [ "s", "h", "o", "u", "l", "d", " ", "g", "o" ], [ "t", "h", "e", " ", "p", "o", "i", "n", "t", "i", "n", "g" ], [ "p", "o", "i", "n", "t", "i", "n", "g", " ", "d", "e", "v", "i", "c", "e" ], [ "b", "o", "r", "d", "e", "r", " ", "s", "p", "a", "c", "i", "n", "g" ], [ "b", "l", "a", "n", "k", " ", "c", "e", "l", "l", "s", "." ] ]
:hover pseudo-class
2
http://www.w3.org/Style/CSS/Test/CSS3/Selectors/20011121/html/tests/css3-modsel-18.html
46/1438042986444.39_20150728002306-00204-ip-10-236-191-2_808920732_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 1.2 Synchronize text equivalents with multimedia presentations. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 1.3 Synchronize a description of the essential visual information in multimedia presentations. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 1.4 Use markup or a data model to provide the logical structure of content. [Manual checks]
Generate outline and determine if structure is good
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 1.5 Separate content and structure from presentation. [Auto checks] HTML Validator [Manual checks]
Increase font size in the browser settings. does all the text increase in size?
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 2.1 Provide more than one path or method to find content. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 2.2 Provide consistent responses to user actions. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 2.3 Give users control of mechanisms that cause extreme changes in context. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 2.4 Give users control over how long they can spend reading or interacting with content. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 2.5 Use device-independent event handlers. [Auto checks] N/A [Examples and Techniques] Refer to client-side scripting techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 3.1 Use consistent presentation. [Manual checks]
Check for use of external style sheets. Check that classes are used for function rather than presentation (?)
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 3.2 Emphasize structure through presentation, positioning, and labels. [Manual checks]
Print on paper using only black and white ink. Is all the info present? i.e., is info presented not in color alone?
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 3.3 Write clearly and simply. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 3.5 Summarize complex information. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 3.6 Define key terms, abbreviations, acronyms, and specialized language. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 3.7 Divide information into smaller, more manageable units. [Auto checks] N/A [Examples and Techniques] Refer to Core techniques [Manual checks]
N/A
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json
3ad25668_y_Guidelines_13_September_2001__Manual_checks
[WCAG 2.0 checkpoint] 4.1 Choose languages, API's, and protocols that support the use of these guidelines. [Manual checks]
Use CSS1 or CSS2 with HTML 4.01 or XHTML 1.1
[]
PDF Techniques for Web Content Accessibility Guidelines 13 September 2001
Manual checks
http://www.w3.org/WAI/GL/WCAG-PDF-TECHS-20010913/
46/1438042988922.24_20150728002308-00196-ip-10-236-191-2_822732206_0.json