Implementing role-based interactions for Internet agents

被引:3
|
作者
Cabri, G [1 ]
Leonardi, L [1 ]
Zambonelli, F [1 ]
机构
[1] Univ Modena, Dipartimento Ingn Informazione, I-41100 Modena, Italy
关键词
D O I
10.1109/SAINT.2003.1183078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale decentralized environments, such as the Internet, achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In such a scenario, interactions among agents are an issue that must be faced in an appropriate way. In the BRAIN framework, interactions among agents are fruitfully modeled on the basis of roles, which define a set of capabilities and an expected behavior. This approach achieves several advantages, such as agent-oriented features, separation of concerns and reuse of solutions and experiences. In this paper we propose an interaction infrastructure, called Rolesystem, which relies on the above mentioned role-based interaction model. This infrastructure allows agents to dynamically assume roles and interact accordingly. An application example and the comparison with other approaches show the effectiveness of our approach.
引用
收藏
页码:380 / 387
页数:8
相关论文
共 50 条
  • [41] Research on role-based learning technologies
    Slator, BM
    Clark, J
    Juell, P
    McClean, P
    Saini-Eidukat, B
    Schwert, DP
    White, AR
    IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2001, : 37 - 40
  • [42] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [43] A Role-Based Fuzzy Assignment Model
    ZUO Bao-he
    Journal of Systems Science and Systems Engineering, 2002, (02) : 190 - 196
  • [44] Role-based Templates for Cloud Monitoring
    The An Binh Nguyen
    Siebenhaar, Melanie
    Hans, Ronny
    Steinmetz, Ralf
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 242 - 250
  • [45] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [46] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [47] Role-based recommendation and trust evaluation
    Wang, Yan
    Varadharajan, Vijay
    9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 278 - +
  • [48] Modeling role-based agent team
    Zhang, Yu
    Advances in Artificial Intelligence, 2007, 4509 : 1 - 13
  • [49] Secure role-based workflow models
    Kandala, S
    Sandhu, R
    DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 45 - 58
  • [50] Authorization management for role-based collaboration
    Ahn, GJ
    Zhang, LH
    Shin, DW
    Chu, B
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4128 - 4134