Role-based interaction infrastructures for Internet agents

被引:0
|
作者
Cabri, G [1 ]
Leonardi, L
Zambonelli, FR
机构
[1] Univ Modena, Dipartimento Ingn Informaz, I-41100 Modena, Italy
[2] Univ Modena, Dipartimento Sci & Metodi Ingn, I-42100 Reggio Emilia, Italy
来源
关键词
agents; roles; Internet applications; interactions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With no doubt the Internet will achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In such a scenario, appropriated methodologies are needed to manage the interactions among agents. The BRAIN framework proposes an interaction model based on roles, each one composed by a set of capabilities and an expected behavior. The achieved advantages are agent-oriented features, separation of concerns and reuse of solutions and experiences. In this paper we present two interaction infrastructures, Rolesystem and RoleX, which rely on the above mentioned role-based interaction model. These infrastructures allow agents to assume roles and to interact. An application example and the comparison with other approaches show the effectiveness of our approach.
引用
收藏
页码:2262 / 2270
页数:9
相关论文
共 50 条
  • [31] Role-based Runtime Model Synchronization
    Werner, Christopher
    Schoen, Hendrik
    Kuehn, Thomas
    Goetz, Sebastian
    Assmann, Uwe
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313
  • [32] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [33] Experiences and perspectives of a role-based IdM
    Ritter, Christopher
    Hildmann, Thomas
    Kao, Odej
    Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), 2010, P-166 : 83 - 92
  • [34] Role-Based Generic Model Refactoring
    Heimann, Jan
    Seifert, Mirko
    Assmann, Uwe
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PT II, 2010, 6395 : 78 - 92
  • [35] Research on role-based learning technologies
    Slator, BM
    Clark, J
    Juell, P
    McClean, P
    Saini-Eidukat, B
    Schwert, DP
    White, AR
    IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2001, : 37 - 40
  • [36] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [37] A Role-Based Fuzzy Assignment Model
    ZUO Bao-he
    Journal of Systems Science and Systems Engineering, 2002, (02) : 190 - 196
  • [38] Role-based Templates for Cloud Monitoring
    The An Binh Nguyen
    Siebenhaar, Melanie
    Hans, Ronny
    Steinmetz, Ralf
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 242 - 250
  • [39] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [40] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136