<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.foudil-securitytxt" target="https://datatracker.ietf.org/doc/html/draft-foudil-securitytxt-05">
   <front>
      <title>A Method for Web Security Policies</title>
      <author initials="E." surname="Foudil" fullname="Edwin Foudil">
         </author>
      <author initials="Y." surname="Shafranovich" fullname="Yakov Shafranovich">
         <organization>Nightwatch Cybersecurity</organization>
      </author>
      <date month="January" day="12" year="2019" />
      <abstract>
	 <t>   When security vulnerabilities are discovered by independent security
   researchers, they often lack the channels to report them properly.
   As a result, security vulnerabilities may be left unreported.  This
   document defines a format (&quot;security.txt&quot;) to help organizations
   describe the process for security researchers to follow in order to
   report security vulnerabilities.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-foudil-securitytxt-05" />
   
</reference>
