W3C home > Mailing lists > Public > public-ws-chor@w3.org > November 2003

Feedback on usecases

From: Mayilraj Krishnan <mkrishna@cisco.com>
Date: Sat, 15 Nov 2003 09:50:01 -0800
Message-Id: <>
To: Steve Ross-Talbot <steve@enigmatec.net>, public-ws-chor@w3.org

I see the usecases 1&2 captured most of the core requirements that we discussed
in the last F2F.
(1) Shall we change the title for usecase1 to "Travel Agent" rather than 
"Quote Request"?
(2) In usecase1, puzzled by the word "Reference passing". I don't remember 
this term in the requirements/usecases. What do we mean by "Reference 
passing"?(vs Message Exchange)
(3) Usecase2 requirements section needs more editing (Section
(point 2)variable timeout is applicable to usecase1 rather than usecase2.
(point 3) quotes send back to "buyer or supplier" rather than "travel agent"
(4) One core requirement that is missing in the usecases is security or 
privacy issue (Yaron's usecase
referred that one as  "Segmentation"). In last F2F we categorized that one 
as "information hiding"
in the interfaces section.

At 12:39 PM 11/10/2003 +0000, you wrote:
>We had a pretty productive two days in sunny (but very cold) Brighton. We 
>did two main things:
>         1. We went through the 11 use cases and consolidated them into 
> two usecases.
>         2. We went through all of the requirements and the editors 
> directions from the last F2F and re-did the editors spreadsheet
>                 including clarifying and wordsmithing as best we could.
>Firstly thanks to my colleagues Abbie, Martin, Ed and Daniel as well as 
>Tony who all contributed to the use cases below as well
>as the spreadsheet (which Daniel will send out in due course).
>We hope to get the usecases and requirements as well as , mission 
>statement, CSF and preamble (to include uses of a CDL) before then
>end of this week. In order to get our proverbial skates on and get this 
>out we wanted to run the use cases (and requirements from Daniel)
>past the group at the next conf call. We have the rationale with us and 
>would be happy to talk through it on the call. We believe that we have
>represented all of the requirements and CSF that can be derived from the 
>original 11 use cases into the two that are enclosed.
>Enjoy the fruit of our labours. We look forward to your constructive 
>direction and comments and would like to get these agreed at the next conf 
>Steve T
>This email is confidential and may be protected by legal privilege. If you 
>are not the intended recipient,  please do not copy or disclose its 
>content but  delete the email and contact the sender immediately. Whilst 
>we run antivirus software on all internet emails we are not liable for any 
>loss or damage. The recipient is advised to run their own antivirus software.
Received on Saturday, 15 November 2003 12:50:24 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 21:01:01 UTC