Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel3
outlinetrue
indent20px

This page collects wireframes (mockup screenshots, to varying degrees of detail) that show how human beings might experience interactions with devices and software services that implement parts of the User-Managed Access (UMA) proposition.

One of the biggest issues in user-managed access is the "management" part that users must perform, such as setting policies, approving access in real time, and introducing hosts to chosen authorization managers (AMs). The SMART project has been at the forefront of user experience (UX) studies and test implementation work for UMA. Additionally, along the way, various participants have produced wireframes (mockup screenshots) to express UMA's potential. This page collects such material, some of which is now historical. Domenico Catalano is the UMA group's Graphics/UX Editor . We will add more wireframes and other user experience resources here as they are createdand has created many of the wireframes you see here.

SMART Project Implementation

You can now try the SMARTAM 2.0 experience for yourself!

Python Prototype

Christian Scholz's Python prototype (now out of date) has generated these screens:

...

See the SMART FAQ for up-to-date information about the SMART project.

Simplified CV Scenario

This set of wireframes was originally developed for the UMA webinar held on 29 Jan 2010 to map protocol details to user experience realities. The webinar overview slides explain the scenario setup and how often the various interactions are performed (most are one-time-only setup; the rest are optional).

Click the image to see the wireframes. (There are "click-throughs" on the screens to give you a simulated user experience; the instructions on the right-hand side indicate where most of the links are.)

Image RemovedImage Added

Setting Policies and Terms

This is a single screen that was developed early in the ProtectServe/UMA process to explore policies and negotiation terms that might be interesting to an authorizing user. It is discussed further in the Issues section of the Scenarios and Use Cases document.

Real-Time Consent Gathered Out-of-Band

If some sort of "ask me for consent" option is presented to a user as shown in the above sections, in many cases the consent will need to be gathered in an out-of-band fashion. Mobile devices are popular for such a purpose. This set of wireframes was developed to explore how consent might be gathered from an authorizing user given that a requester has approached a host at a time when the user is not logged in to either of them. (Some reasons for needing real-time consent are discussed in the Requester Identification section of the Scenarios and Use Cases document.)

Click the image to see the wireframes.

Image RemovedImage Added

Access Analytics

The benefit of being able to forge data-sharing relationships with others would be blunted if the authorizing user didn't have the opportunity to review the details of resource access after the fact. This set of wireframes was developed to explore the kinds of resource-access analytics a user might want to review, partly to manage sharing at the right level and partly as a tool for assessing privacy risk.

Click the image to see the wireframes.

Image RemovedImage Added

UMA Trusted Claims

The UMA protocol supports the policy-driven ability of an AM to demand claims from a requesting party before authorization is granted. The claims may be self- asserted or third-party-asserted. This set of wireframes was developed to explore a person-to-person data sharing scenario in which the Authorizing User wants to restrict sharing to a specific Requesting Party identity. For such a policy to be meaningful it requires the AM to establish of trust of third- party identity claim issuers. The Wireframe includes the subject registration and the Claims Host registration as part of bootstrapping trust process.

Exploring visualization techniques to enhance Privacy Control UX for UMA

The study explores visualization techniques to enhance privacy control user experiece for UMA protocol, applied to Newcastle University's SmartAM project. The goal is to mitigate risks of lost of privacy and the exploitation of online personal data caused from user difficulty to maintain data control, correlate web resources and assign privileges for specific scope in the data sharing process. The approach (see the following presentations) introduces the Connection and Control bridge concepts and visualization tools for this purpose.

...

UMA/SmartAM UX Study (Part 3) (Control bridge concept/UX)

Python Prototype

Christian Scholz's Python prototype (now out of date) has generated these screens: