Authenticate Using Pseudonymous Identity Use Case

From IDESG Wiki
Revision as of 03:00, 28 June 2018 by Omaerz (Talk | contribs) (4 revisions imported: Initial Upload of old pages from IDESG Wiki)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Title:


Use Case Description: [Use an action verb name to describe the use case, not including the primary actor name, but identifying any subject actors. Verb modifiers may be used to refine the use case. Examples:  authenticate to system with trusted identity, authenticate to system with pseudonymous identity, match names between systems, verify attributes with privacy protection]


Use Case Category:


Contributor:


Use Case Details

Actors:


Goals:


Assumptions:


Requirements:


Process Flow:


Success Scenario:


Error Conditions:


Relationships

References and Citations