Implementing role-based interactions for Internet agents

被引:3
|
作者
Cabri, G [1 ]
Leonardi, L [1 ]
Zambonelli, F [1 ]
机构
[1] Univ Modena, Dipartimento Ingn Informazione, I-41100 Modena, Italy
关键词
D O I
10.1109/SAINT.2003.1183078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale decentralized environments, such as the Internet, achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In such a scenario, interactions among agents are an issue that must be faced in an appropriate way. In the BRAIN framework, interactions among agents are fruitfully modeled on the basis of roles, which define a set of capabilities and an expected behavior. This approach achieves several advantages, such as agent-oriented features, separation of concerns and reuse of solutions and experiences. In this paper we propose an interaction infrastructure, called Rolesystem, which relies on the above mentioned role-based interaction model. This infrastructure allows agents to dynamically assume roles and interact accordingly. An application example and the comparison with other approaches show the effectiveness of our approach.
引用
收藏
页码:380 / 387
页数:8
相关论文
共 50 条
  • [31] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [32] Constrained role-based delegation
    Zhang, LH
    Ahn, GJ
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
  • [33] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
  • [34] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [35] Sender-Receiver Role-Based Energy-Aware Scheduling for Internet of Underwater Things
    Xu, Ming
    Liu, Ling
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (02) : 324 - 336
  • [36] Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control
    Janardhanan, Janani
    Sharbaf, Mehrdad S.
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1315 - 1319
  • [37] Role-based Runtime Model Synchronization
    Werner, Christopher
    Schoen, Hendrik
    Kuehn, Thomas
    Goetz, Sebastian
    Assmann, Uwe
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313
  • [38] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [39] Experiences and perspectives of a role-based IdM
    Ritter, Christopher
    Hildmann, Thomas
    Kao, Odej
    Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), 2010, P-166 : 83 - 92
  • [40] Role-Based Generic Model Refactoring
    Heimann, Jan
    Seifert, Mirko
    Assmann, Uwe
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PT II, 2010, 6395 : 78 - 92