Role-based interaction infrastructures for Internet agents

被引:0
|
作者
Cabri, G [1 ]
Leonardi, L
Zambonelli, FR
机构
[1] Univ Modena, Dipartimento Ingn Informaz, I-41100 Modena, Italy
[2] Univ Modena, Dipartimento Sci & Metodi Ingn, I-42100 Reggio Emilia, Italy
来源
关键词
agents; roles; Internet applications; interactions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With no doubt the Internet will achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In such a scenario, appropriated methodologies are needed to manage the interactions among agents. The BRAIN framework proposes an interaction model based on roles, each one composed by a set of capabilities and an expected behavior. The achieved advantages are agent-oriented features, separation of concerns and reuse of solutions and experiences. In this paper we present two interaction infrastructures, Rolesystem and RoleX, which rely on the above mentioned role-based interaction model. These infrastructures allow agents to assume roles and to interact. An application example and the comparison with other approaches show the effectiveness of our approach.
引用
收藏
页码:2262 / 2270
页数:9
相关论文
共 50 条
  • [41] Role-based recommendation and trust evaluation
    Wang, Yan
    Varadharajan, Vijay
    9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 278 - +
  • [42] Modeling role-based agent team
    Zhang, Yu
    Advances in Artificial Intelligence, 2007, 4509 : 1 - 13
  • [43] Secure role-based workflow models
    Kandala, S
    Sandhu, R
    DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 45 - 58
  • [44] Authorization management for role-based collaboration
    Ahn, GJ
    Zhang, LH
    Shin, DW
    Chu, B
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4128 - 4134
  • [45] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [46] Generic constructions for role-based encryption
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (05) : 417 - 430
  • [47] Role-based shared mental models
    Zhang, Yu
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 424 - 431
  • [48] Role-based delegation with negative authorization
    Wang, H
    Cao, JL
    Ross, D
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 307 - 318
  • [49] Role-based privilege and trust management
    Shin, D
    Ahn, GJ
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 401 - 410
  • [50] Separation of duty in role-based environments
    Simon, RT
    Zurko, ME
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 183 - 194