ABSTRACT
Commitment protocols are modularized specifications of interactions understood in terms of commitments. Purchase is a classic example of a protocol. Although a typical protocol would capture the essence of the interactions desired, in practice, it should be adapted depending on the circumstances or context and the agents' preferences based on that context. For example, when applying purchase in different contexts, it may help to allow sending reminders for payments or returning goods to obtain a refund. We contextualize a protocol by adapting it via different transformations.Our contributions are the following: (1) a protocol is transformed by composing its specification with a transformer specification; (2) contextualization is characterized operationally by relating the original and transformed protocols; and (3) contextualization is related to protocol compliance.
- Paolo Bresciani, Anna Perini, Paolo Giorgini, Fausto Giunchiglia, and John Mylopoulos. Tropos: An agent-oriented software development methodology. Journal of Autonomous Agents and Multiagent Systems, 8(3):203--236, May 2004. Google ScholarDigital Library
- Enrico Giunchiglia, Joohyung Lee, Vladimir Lifschitz, Norman McCain, and Hudson Turner. Nonmonotonic causal theories. Artificial Intelligence, 153(1--2):49--104, 2004. Google ScholarDigital Library
- Ashok U. Mallya and Munindar P. Singh. An algebra for commitment protocols. Journal of Autonomous Agents and Multiagent Systems special issue on Agent Communication, 2006. To appear. Google ScholarDigital Library
- Hamza Mazouzi, Amal El Fallah Seghrouchni, and Serge Haddad. Open protocol design for complex interactions in multi-agent systems. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, pages 517--526, 2002. Google ScholarDigital Library
- H. Van Dyke Parunak. Visualizing agent conversations: Using enhanced Dooley graphs for agent design and analysis. In Proceedings of the 2nd International Conference on Multiagent Systems, pages 275--282. AAAI Press, 1996.Google Scholar
- Munindar P. Singh. An ontology for commitments in multiagent systems: Toward a unification of normative concepts. Artificial Intelligence and Law, 7:97--113, 1999.Google ScholarDigital Library
- Clemens Szyperski. Components and the way ahead. In Gary T. Leavens and Murali Sitaraman, editors, Foundations of Component-Based Systems, chapter 1, pages 1--20. Cambridge University Press, 2000. Google ScholarDigital Library
- Uniform commercial code. http://www.law.cornell.edu/ucc/ucc.table.html.Google Scholar
- Mahadevan Venkatraman and Munindar P. Singh. Verifying compliance with commitment protocols: Enabling open Web-based multiagent systems. Journal of Autonomous Agents and Multi-Agent Systems, 2(3):217--236, September 1999. Google ScholarDigital Library
- Benjamin Vitteau and Marc-Philippe Huget. Modularity in interaction protocols. In Frank Dignum, editor, Advances in Agent Communication, volume 2922 of Lecture Notes in Computer Science, pages 291--309, 2004.Google Scholar
Index Terms
- Contextualizing commitment protocol
Recommendations
New Efficient Non-malleable Commitment Schemes
ALPIT '07: Proceedings of the Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007)Non-malleable commitment is recently one of research focuses in international cryptographic community. It has many important applications in e-commerce, and plays important role in constructing other cryptographic protocols. Most existing non-malleable ...
The Decentralized Non-Blocking Atomic Commitment Protocol
SPDP '95: Proceedings of the 7th IEEE Symposium on Parallel and Distributeed ProcessingIn a transactional system, an atomic commitment protocol ensures that for any transaction, all data managers agree on the same outcome: commit or abort. A non-blocking atomic commitment protocol enables an outcome to be decided at every correct data ...
Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment
In this paper, we have discussed the issues concerning the basic concept and classification of OT (Oblivious Transfer). We have proposed secure verifiable non-interactive oblivious transfer protocols for the exchange of secrets on distributed ...
Comments