Role-based interaction infrastructures for Internet agents

被引:0
|
作者
Cabri, G [1 ]
Leonardi, L
Zambonelli, FR
机构
[1] Univ Modena, Dipartimento Ingn Informaz, I-41100 Modena, Italy
[2] Univ Modena, Dipartimento Sci & Metodi Ingn, I-42100 Reggio Emilia, Italy
来源
关键词
agents; roles; Internet applications; interactions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With no doubt the Internet will achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In such a scenario, appropriated methodologies are needed to manage the interactions among agents. The BRAIN framework proposes an interaction model based on roles, each one composed by a set of capabilities and an expected behavior. The achieved advantages are agent-oriented features, separation of concerns and reuse of solutions and experiences. In this paper we present two interaction infrastructures, Rolesystem and RoleX, which rely on the above mentioned role-based interaction model. These infrastructures allow agents to assume roles and to interact. An application example and the comparison with other approaches show the effectiveness of our approach.
引用
收藏
页码:2262 / 2270
页数:9
相关论文
共 50 条
  • [21] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [22] Role-Based Systems are Autonomic
    Zhu, Haibin
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2008, : 144 - 152
  • [23] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
  • [24] Role-based measurement of performance
    Murdoch, J
    Fernandes, KJ
    Astley, K
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1586 - 1591
  • [25] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [26] Constrained role-based delegation
    Zhang, LH
    Ahn, GJ
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
  • [27] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
  • [28] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [29] Sender-Receiver Role-Based Energy-Aware Scheduling for Internet of Underwater Things
    Xu, Ming
    Liu, Ling
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (02) : 324 - 336
  • [30] Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control
    Janardhanan, Janani
    Sharbaf, Mehrdad S.
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1315 - 1319