Difference between revisions of "User:Infinity Linden/OGP Trust Model UseCases"
Jump to navigation
Jump to search
Dale Innis (talk | contribs) (few more cases) |
|||
Line 11: | Line 11: | ||
* Attacker contacts RD1, attempts to masquerade as AD1 | * Attacker contacts RD1, attempts to masquerade as AD1 | ||
* Attacker contacts RD1, authenticates as an otherwise-unknown ADz (what should an unknown AD be able to do?) | * Attacker contacts RD1, authenticates as an otherwise-unknown ADz (what should an unknown AD be able to do?) | ||
[[Category:AW_Groupies]] | |||
[[Category:Grid_Interoperability]] |
Revision as of 10:05, 12 August 2008
We are gathering use-cases here, starting at the high "what the user actually does" level.
- User from one grid teleports to another, and her inventory comes along
- User from one grid teleports to another, and her attachments come along
- User from one grid teleports to another, and rezzes an object from inventory there
- User from one grid teleports to another, and gives something from her inventory to another user there
- User from one grid teleports to another, and sells something from her inventory to another user there
- User from one grid teleports to another, and rezzes a vendor that another user than buys from
Some threat-model cases:
- Attacker contacts RD1, attempts to masquerade as AD1
- Attacker contacts RD1, authenticates as an otherwise-unknown ADz (what should an unknown AD be able to do?)