Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Click the image to see the wireframes. (There are "click-throughs" on the screens to give you a simulated user experience; the instructions on the right-hand side indicate where most of the links are.)

Image RemovedImage Added

Setting Policies and Terms

...

Click the image to see the wireframes.

Image RemovedImage Added

Access Analytics

...

Click the image to see the wireframes.

Image RemovedImage Added

UMA Trusted Claims

The UMA protocol supports the policy-driven ability of an AM to demand claims from a requesting party before authorization is granted. The claims may be self- asserted or third-party-asserted. This set of wireframes was developed to explore a person-to-person data sharing scenario in which the Authorizing User wants to restrict sharing to a specific Requesting Party identity. For such a policy to be meaningful it requires the AM to establish of trust of third- party identity claim issuers. The Wireframe includes the subject registration process and the Claims Host registration as part of bootstrapping trust process. Image Modifiedhttp://kantarainitiative.org/confluence/download/attachments/41026357/Trusted_claims_UXlogo.jpg