Use Case Development Cathy Tilton, Daon Scott Shorter, Electrosoft Services 7 February 2013.

Slides:



Advertisements
Similar presentations
COBIT® 5 for Assurance Introduction
Advertisements

TFTM TFTM Committee working call to discuss how to describe the “IDESG-Acknowledged Identity Ecosystem” in its interim or long term state October.
Use-case Modeling.
Chapter 14 Requirements and Specifications. Copyright © 2005 Pearson Addison-Wesley. All rights reserved Software Engineering The implementation.
© 2005 Prentice Hall4-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Chapter 3: The Project Management Process Groups
Senior Design – Acceptance Test Plan Review The goal is to: define the criteria for approving the application. Tightly coupled to the Requirements document.
Use Case Development Scott Shorter, Electrosoft Services January/February 2013.
This section has been adapted from Dr. Scott Fleming of U. Memphis Details about Use Cases.
What is Business Analysis Planning & Monitoring?
OSIAM4HE Proposed org structure Authored by the strategy and organization team.
SCC Activities C. Tilton. Standards Are applied to SOMETHING Within some CONTEXT Something = ID Ecosystem Context = Use Cases 2.
The Software Development Life Cycle: An Overview
Functional Model Workstream 1: Functional Element Development.
S/W Project Management
RUP Requirements RUP Artifacts and Deliverables
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 06. Requirements.
SCC Report Out C. Tilton. Workplan PriorityWork ItemLead 1Use CasesS. Shorter 2Standards Adoption PolicyJ. Clark 3aStandards InventoryS. Shorter 3bCatalog.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Instructore: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Requirement engineering.
Use Cases Ivar Jacobson - guru at Rational Corp., defined UML.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
Developing Use Cases in a Group Carolyn L. Cukierman Face-to-Face Technology Conference March 27, 2000.
Internet Software Development Putting it all together Paul J Krause.
10/12/ Recall The Team Skills 1. Analyzing the Problem (with 5 steps) 2. Understanding User and Stakeholder Needs 1. Interviews & questionnaires.
Chapter 6 Use Cases. Use Cases: –Text stories Some “actor” using system to achieve a goal –Used to discover and record requirements –Serve as input to.
Software Requirements (Advanced Topics) “Walking on water and developing software from a specification are easy if both are frozen.” --Edward V Berard.
Copyright 2002 Prentice-Hall, Inc. Chapter 2 Object-Oriented Analysis and Design Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey.
Chapter 9 요구사항 모델링: 시나리오 기반 방법론 Requirements Modeling: Scenario-Based Methods 임현승 강원대학교 Revised from the slides by Roger S. Pressman and Bruce R. Maxim.
Lecture 7: Requirements Engineering
STANDARDS COORDINATION COMMITTEE PLENARY BREAKOUT 18 SEPTEMBER 2014 Interoperability Requirements.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
A Use Case Primer 1. The Benefits of Use Cases  Compared to traditional methods, use cases are easy to write and to read.  Use cases force the developers.
Faculty of Applied Engineering and Urban Planning Software Engineering Department Software Engineering Lab Use Cases Faculty of Information system Technology.
1 Structuring Systems Requirements Use Case Description and Diagrams.
PSCIOC-PSSDC Workplan Coordination Strategy– Draft Coordination Committee Telecon
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
Requirement engineering Good Practices for Requirements Engineering
By Germaine Cheung Hong Kong Computer Institute
Use Cases CS 6961 – Lecture 4 Nathan Dykman. Neumont UniversityCS Lecture 102 Administration Homework 1 is due –Still reviewing the proposal, but.
Data Segmentation for Privacy November 16 th, 2011.
Proposed Privacy Taxonomy for IOT Scott Shorter, Electrosoft, These slides are based on work contributed to the IDESG Use Case AHG in January.
© 2007 Open Grid Forum Enterprise Best (Community) Practices Workshop OGF 22 - Cambridge Nick Werstiuk February 25, 2007.
Requirement Engineering. Recap Elaboration Behavioral Modeling State Diagram Sequence Diagram Negotiation.
1 What is the Software Life Cycle? The stages of developing a software application Requirements Analysis High-level Design Plan Low-level Design Implementation.
Electronic Submission of Medical Documentation (esMD)
Requirement engineering & Requirement tasks/Management. 1Prepared By:Jay A.Dave.
UML - Development Process 1 Software Development Process Using UML.
Use Case Model Use case description.
Omniran CF00 1 Key Concepts of Authentication and Trust Establishment Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
Outlines Overview Defining the Vision Through Business Requirements
Chapter 6: Structuring Requirements: Use Case Description and Diagrams Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
Chapter 7 Part II Structuring System Process Requirements MIS 215 System Analysis and Design.
Requirements. Outline Definition Requirements Process Requirements Documentation Next Steps 1.
1 Team Skill 3 Defining the System Part 1: Use Case Modeling Noureddine Abbadeni Al-Ain University of Science and Technology College of Engineering and.
Update from the Faster Payments Task Force
Recall The Team Skills Analyzing the Problem (with 5 steps)
Use Case Model Use case diagram.
Systems Analysis and Design 5th Edition Chapter 4. Use Case Analysis
Systems Analysis and Design 5th Edition Chapter 4. Use Case Analysis
Systems Analysis and Design 5th Edition Chapter 4. Use Case Analysis
Chapter 9 Requirements Modeling: Scenario-Based Methods
Guidance notes for Project Manager
Project Management Process Groups
HingX Project Overview
Appropriate Access InCommon Identity Assurance Profiles
Object-Oriented Software Engineering
Chapter 5 Understanding Requirements.
Presentation transcript:

Use Case Development Cathy Tilton, Daon Scott Shorter, Electrosoft Services 7 February 2013

Outline 2 What is a use case Purpose of use cases Levels of use cases What’s been done so far General approach Timeline Workshop plans What can be done between now and then

What is a use case? 3 Different for engineers than for business owners, users, or other species I like this one: a methodology used in system analysis to identify, clarify, and organize system requirements the use case is made up of a set of possible sequences of interactions between systems and users in a particular environment and related to a particular goal

Purpose of use cases (within the IDESG) 4 Basis for the development of other work products – provides context Method of eliciting requirements Helps define the problem(s) we are trying to solve “Determine commonalities so as to be able to design services” Guide our collective efforts – keep us aligned

Levels 5 Target – “scenario” level: What & Why High Level Low Level WHY HOW (diagram inspired by Writing Effective Use Cases, Alistair Cockburn) Once defined, progressively lower level use cases can be derived as needed Lower levels may have a specific focus (e.g., privacy, security, user experience,…)

What has been done so far 6 Use case template Draft list of potential use cases Began to identify sources of existing use cases Generated sample use cases Began collection effort

Use case template 7 Title & brief description Category Contributor Actors Goals Assumptions Requirements Process flow Success scenario Error conditions Citations

Use Case Template 8 Use Case: Name the use case here. Use an action verb name to describe the use case, not including the primary actor name, but identifying any subject actors. Verb modifiers may be used to refine the use case. Examples: authenticate to system with trusted identity, authenticate to system with pseudonymous identity, match names between systems, verify attributes with privacy protection Category: Describe what category the use case belongs to. (Categories of Use Cases slide for a list of categories and their descriptions). Contributor:Identify the person or organization that contributed the use case, including their stakeholder group. Actors: Identify actors associated with the use case. Provide the primary actor first. Actors can include people, roles, organizations, software processes or services. Actors should be listed in the Actor Template format provided in Table 2. Goals: A general description of the intended outcome of the use case from the perspective of the primary actor, including any artifacts created. This section may address risks and threats related to the use case and how they may be mitigated. Assumptions: A listing of any assumptions made about the use case including its actors, services, environment, etc. Pre-conditions – Conditions that must be met for to the use case being possible Post-conditions – Any assumed actions that take place upon completion of the use case Requirements: A listing of any requirements that must be met, these can be references to published standards and guidelines or requirements stated by the contributor. Examples : FIPS 201, ISO 27001, etc. Process Flow:A text or graphic description of the overall process flow of the use case. Success Scenario: Describe the successful execution of the use case here as a sequence of numbered steps. If multiple paths or multiple outcomes are permitted to occur, they should all be documented. Error Conditions: Describe errors that can take place, considering what can go wrong at each step of the success scenario. For each error, describe how the actors should handle the results. Citations:Provide any citations to additional information or references.

Use Case Template - Terms 9 TermDefinition Use Case A use case is the statement of the goal the primary actor has toward the system's declared responsibilities, and the collection of possible scenarios between the system under discussion and various actors, showing how the primary actor’s goal might be delivered or might fail. Actor An actor is something with behavior. Actors can include people, organizations, software processes or services, depending on the level of the use case. Primary Actor The primary actor is one whose goal the use case is supposed to satisfy. Secondary Actor A secondary actor is an external actor against which the system under design has a goal. There can be more than one secondary actor. Scenario A scenario is a sequence of interactions that happens under certain conditions, with the intent to achieve the primary actor’s goal, and having a particular result with respect to that goal. Typically, a scenario is phrased in generic terms, using placeholders for the identity of the primary actor and the actual values passed around. Step A step is a unit of writing in a use case. Usually one sentence, describing the behavior of only one actor. Steps may be described at various levels of detail, depending on the purpose.

Use Case Template - Categories 10 CategoryDescription Identity Registration Use cases in which initial identity claims are verified (through “identity proofing” processes) and applicants become users. Authentication Use cases in which claims about identities pertaining to registered users are verified. Identity Management Use cases for creating and maintaining online identities and trust frameworks. PrivacyUse cases supporting the protection of user privacy. Trust/Assurance Use cases pertaining to the establishment of trust and assurance in Identity Ecosystem participants. InteroperabilityUse cases pertaining to confirming and testing interoperability. Consumer ChoiceUse cases that support customer choice in Identity Ecosystems. E-NotarizationUse cases supporting binding high-value online transactions.

User Level Example –Two-Party Delegation 11 Use Case:Two-Party Delegation Category:Authentication Contributor:Scott Shorter Actors: Service Provider, Third-Party Service, User Goals: The goal is for a Service Provider to issue delegation credentials that are tailored for access to data for a Third Party Service on behalf of the User. Assumptions: Pre-conditions – User can authenticate to Service Provider, Third-Party Service does not have Delegated Credentials for User yet Post-conditions – Service Provider grants or denies access to Third-Party Service Requirements: Process Flow: 1.User accesses Third-Party Service which wants data from Service Provider 2.Third-Party Service requests Delegated Credentials for User 3.Service Provider obtains User consent for delegation 4.Service Provider grants Delegated Credentials to Third-Party Service Success Scenario: Third Party Service can access limited User data from Service Provider Error Conditions: Third-Party Service forges User consent for Delegation Citations:NIST IR 7817, Section 2.1.1

General Approach 12 Collection phase Filter Analyze and abstract Create deliverable set (v1)

Potential collaboration process (general) 13 Concept -> draft outline Contributions Wiki Initial/sample contentAdvertise Expanded content Review & Comment Jumpstart Existing Sources Moderate (format, apply criteria) ROW Steward Refined content Snapshot for Formalization (adoption) From stakeholders (including groups, workshops)

Where do use cases come from? 14 Existing sources e.g., NIST, OASIS Stakeholder (& stakeholder rep) contributions

How are they to be developed? 15 Multiple suggestions AHG with online meetings Each committee create their Top-3 Series of joint meetings Wiki (anyone in IDESG) Distributed small group sessions “Analyst group”

Timeline 16 Goal: Within 9 months, have an initial draft set of use cases Near term: February March April Collection Filter Draft criteria Workshop Wiki launched Wiki designPopulate Wiki NOTE: Notional – not socialized

(Proposed) May Workshop 17 Desired outcome: Agreed set of use cases for analysis (~10) Review filtered set of use cases Apply criteria Refinements Preconditions Agree set of criteria Committees, plenary members submit candidate use cases by 1 April

Needed 18 Criteria to be applied Priorities Levels Relevance Cross section How? Solicit inputs Joint meeting (or AHG) to review & define list

Between now and then 19 Get Wiki setup and operational Continue collection Agree criteria Detailed workshop planning Content & process We need you Committees Work with us on above Individuals Work with us on above

Questions? 20