Information Technology Reference
In-Depth Information
Figure 4. Detailed description of the Task 2 using SPEM 2.0
Grid technology evident in both scenarios which
represent, however, a plethora of relevant business
cases which share these two common characteris-
tics: the need for fast access to distributed content.
Following the process of analysis defined in
the definition of mobile grid security use cases
activity aforementioned, we will identify and
analyze security requirements involved in this case
study helping of security repository and mobile
grid security uses cases. For all possible use cases
defined for this application, we are only going to
consider three use cases (due to space constraints),
defined in Table 1, which we are going to work
with in the following tasks.
Once we have identified some of functional
use cases of the application, now, we must iden-
tify all the use cases and security use cases for
the Grid system that are related to the functional
use cases of the application. These use cases for
the Grid system include Grid use cases, security
use cases, Grid security use cases, misuse cases
and mobile use cases together with Grid actors
and Misactors, all of them defined with the Gri-
dUCSec-profile.
Search WWH ::




Custom Search