Executing explicitly represented protocols

نویسندگان

  • Joaquim Freire
  • Luis Botelho
چکیده

This paper describes an approach that enables agents to execute any interaction protocol that can be expressed in the proposed XML representation. Therefore, agents will be capable of executing any protocol representation received in run-time. In our approach, explicitly represented protocols are converted in an agent internal structure more suitable for being processed than XML. The internal representation of the protocol is converted to a set of production rules that control the behaviour of the agent according to the protocol. The used XML representation, which closely mirrors AUML protocol diagrams, is defined by an XML Schema. The proposal defines a protocol independent interface between the agent private decision processes and the protocol execution process through which the agent can inform the protocol execution process of its decisions regarding protocol alternative courses of action. Workshop Topics and Area

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Logic of Secure Systems and its Application to Trusted Computing (CMU-CyLab-09-001)

We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared memory, a simple form of access control on memory, machine resets, cryptographic operations, network communication, and dynamically loading and executing unknown (and potentially untrusted) code. The adversary’s capabi...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Constitutive and Regulative Specifications of Commitment Protocols: A Decoupled Approach (Extended Abstract)

We analyze the emerging trends from research on multi-agent interaction protocols, on workflows and on business processes. We propose a definition of commitment-based interaction protocols, characterized by the decoupling of the constitutive and the regulative specifications, where the latter is explicitly represented based on constraints among commitments. The 2CL language, for writing regulat...

متن کامل

Cooperation Mechanisms in a Multi -

In the paper we present our work on design and analysis of agent cooperation in distributed systems. The work is not completed yet, so that some parts of it, especially the formal framework, should be viewed as a preliminary version. Multi-agent systems are represented by BDI-automata, i.e., asynchronous automata composed of non-deterministic agents equipped with mental attitudes like belief, d...

متن کامل

Web Based Security Protocols for Embedded System

Security can mean resistance to casual or prankster attacks like most viruses and security can also mean resistance to DOS attacks. But in this paper, security will mean the embedded devices’ ability to contain sensitive information and to hold down its end of a secure communication. In this paper we also are studying about various types of protocols which are used in networks security. These a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002