This page is purely unfinished notes from the UseCasesPaper page.


Use cases for a generic grid

Introduction

An appeal

The authors of this document appeal strongly for feedback and for criticisms of our use-cases. We would also like to hear examples of other use-cases that we may not have considered.

What is this document?

This document is the first step in establishing the types of actors and some example use cases, and then requirements for access management and security in a 'generic grid'. We use the term generic grid to denote something which is a grid (defined in appendix XXXX) but which does not (as yet) mandate any particular technology or middleware. Once the general use cases are established that reflect the types of users that a generic grid would support, and possibly some of the scope of activities within a grid, then the requirements for the middleware/access management and security can be generated.

What this document is not!

This document is not about building requirements for access management and security. The approach taken with this document is to try to capture some scope of a generic grid, identify the basic actors in such grids using example use-cases and from there to open the way for thinking (in documents) regarding general access management and security requirements.

Use-cases for grids

Introduction

Please note that section 2.3 addresses the use-case scenarios from the point of view of a user, rather than the technology or machines involved. The use-cases in section 2.3 do not consider issues such as personal privacy (as in service providers knowledge of who is the end-user) and data confidentiality (as in service providers being able to steal sensitive or confidential data). These issues are considered in section 2.4.

See section 2.2 for short definitions of the terms used in the next section.

The accompanying/later document Requirements gathering exercise:(2) Authentication, authorisation, accounting and security goes on to consider some of the issues of authentication, authorisation, accounting and security (AAAS) that arise from such use-cases and the types of grids that are proposed in this document. It should be noted that the subsequent document is fully dependent upon the contents of this present document and any changes to the use-cases may affect the AAAS findings as laid out in that later document.

As a point of interest with which to explore the actors and to test the generalised use-cases given in section 2.3, Appendix XXXX n. XXXX gives some example user stories.

Terms defined

Types of grid users and very basic example scenarios

We propose the following types of grid users and give some example use scenarios. Terms in italics are defined in the previous section.

Service end-user (SEU)

Typical characteristic: No computing expertise

Power user agnostic of ''grid resource node'' (PUA)

Typical characteristic: Develops programs and data but does not care where processing takes place

Power user requiring specific ''grid resource nodes'' (PUS)

Typical characteristic: As PUA but may have more platform etc. dependent expertise and some sysadmin expertise

Power user developing a service (PUDS)

Typical characteristic: As PUA/PUS but developing expertise like SP

Service Provider (SP)

Typical characteristic: As PUA/PUS but has expertise in authZ and possibly identity management

Infrastructure sysadmin (GRID-SYS)

Typical characteristic: System administration of grid nodes with possibly infrastructure delivery and security expertise

Third party beneficiary TPB (non-user)

Typical characteristic: Person or organisation who does not interact directly with the grid but where his/her/its personal data are being handled on the grid

ESPGRIDwiki: UseCasesPaperNotes (last edited 2013-05-17 16:26:46 by localhost)