Information Technology Reference
In-Depth Information
Figure 5. Mobile Grid Computing system for Media application
We use the reusable artifacts of the repository
where many of these use cases for Grid systems
and diagrams that can be easily used in this ap-
plication and that help us obtain use cases, actors
and associations that are necessary in this applica-
tion are defined.
To identify the use cases and security use cases
of the Grid system, we have to follow the steps
defined in this task of the SecMobGrid process.
Next we apply each one of these steps for this
application.
cases defined in the previous task. In the repository
we have a set of generic use cases which have a
common behaviour for any Grid systems and have
been identified in other executions of the process
and that can be used in this application. We select
some of these generic Grid use cases that have
relation with the functional use cases identified
previously and which are defined in Table 2.
Step 2.2: Identify Security Assets
On mobile Grid environments we can identify a
set of assets that we must protect for obtaining a
secure grid system, which are the following: User
and system data (stored, transmitted); Identity in-
formation; Credentials (private keys, passwords);
Accounting; CPU-/Storage-/Mobile devices-/
Network-resources; General system.
Step 2.1: Identify Generic Grid
UC for the application
We must act on the repository of Grid use cases
to identify the generic Grid use cases that are
needed to extract and that are related to the use
Search WWH ::




Custom Search