HICSS36-eService-1 A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment Dickson K.W. CHIU Dept. of Computer Science & Engineering,

Slides:



Advertisements
Similar presentations
Introduction to Web Bill of Lading Q Proprietary and Confidential Copyright © 2005 INTTRA Inc. 2 Agenda Industry Challenges INTTRA Solution Value.
Advertisements

Drt 6455 eCommerce Law lesson 4.2 – IT and eConsumer associate professor faculty of law university of montreal university of montreal chair in e-Security.
Requirements Engineering Process
Building a Knowledge Management System as a Life Cycle
Page 1 CSISS LCenter for Spatial Information Science and Systems 03/19/2008 GeoBrain BPELPower Workflow Engine Liping Di, Genong Yu Center.
1 4th International Trade Statistics Expert Meeting Methodological issues relating to partner countries Presentation by Poland Room document 2.
1 Making Contract Opportunities and Awards More Transparent Ahmet Arif Sezgin Public Procurement Authority of Turkey Rabat 03 April 2008.
SDI Business Phases and derived INSPIRE Horizontal Services Relates to INSPIRE DT Network Services, DT Sharing Relates to OGC GeoDRM WG, Price & Order.
1 Welcome Safety Regulatory Function Handbook April 2006.
©2003, Karl Aberer, EPFL, School of Computer and Communication Sciences Some Requirements for Semantic Web Serivce from CROSSFLOW and OPELIX Karl Aberer.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
IBM Governmental Programs © 2003 IBM Corporation IBMs Global Supply Chain Evolution in Post ITA Environment Douglas Gregory VP IBM Governmental Programs.
1 Copyright © 2005, Oracle. All rights reserved. Introduction.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Copyright © 2006 Data Access Technologies, Inc. Open Source eGovernment Reference Architecture Approach to Semantic Interoperability Cory Casanave, President.
Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
Höchstleistungsrechenzentrum Stuttgart SEGL Parameter Study Slide 1 Science Experimental Grid Laboratory (SEGL) Dynamical Parameter Study in Distributed.
Limitations of the relational model 1. 2 Overview application areas for which the relational model is inadequate - reasons drawbacks of relational DBMSs.
|epcc| NeSC Workshop Open Issues in Grid Scheduling Ali Anjomshoaa EPCC, University of Edinburgh Tuesday, 21 October 2003 Overview of a Grid Scheduling.
Week 2 The Object-Oriented Approach to Requirements
14. LETTERS OF CREDIT: PROCEDURES 1. LETTERS OF CREDIT I.THE NEED FOR LETTERS OF CREDIT A. USES TO THE SELLER WITH A FIRST-TIME CUSTOMER WITH A CREDIT.
SAP - Online Transaction Processing (OLTP)
Samuil Angelov, Paul Grefen Computer Science Department Information Systems Group University of Twente Automated Contract Handling
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
CWM Patterns using BPMN Vandana Kabilan Royal Institute of Technology.
Web Service Architecture
Practical Car Ijarah.
1 1Line Training Capacity Release - Phase II Awards and Recall/Reput.
Lecture 5: Requirements Engineering
1. 2 Captaris Workflow Microsoft SharePoint User Group 16 May 2006.
Supply Chain / Hoko Student will understand the roles supply chains in a business: Define a supply chain Understand the components and the effects of a.
14-1 © Prentice Hall, 2004 Chapter 14: OOSAD Implementation and Operation (Adapted) Object-Oriented Systems Analysis and Design Joey F. George, Dinesh.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
From Model-based to Model-driven Design of User Interfaces.
Alert Driven Process Integration and Exception Handing: A Case Study on Audit Confirmation with Web Service Mandy Y.S. Tong Dept. of Computer Science,
HICSS 36 On the e-Negotiation of Unmatched Logrolling Views Presenter S.C. Cheung Department of Computer Science Hong Kong.
6/1/2015Ch.31 Defining Enterprise Architecture Bina Ramamurthy.
Transparent Robustness in Service Aggregates Onyeka Ezenwoye School of Computing and Information Sciences Florida International University May 2006.
HICSS 36 Data-driven Methodology to Extending Workflows to E-services over the Internet Presenter: Dickson K.W. CHIU Chinese University of HK Co-authors:
1 Enhancing E-service Collaboration with Enforcement and Relationship Management: a Methodology from Requirements to Event Driven Realization Dickson K.W.
AlertsHICSS37-1 Alert-driven E-Service Management Dickson K.W. Chiu, Benny Kwok, Ray Wong Dept. of Computer Science & Engineering, Chinese University of.
A Meta-model for e-Contract Template Variable Dependencies Facilitating e-Negotiation Dickson K.W. CHIU Dept. of Computer Science & Engineering, Chinese.
Satzinger, Jackson, and Burd Object-Orieneted Analysis & Design
1 A Web Services Implementation Framework for Financial Enterprise Content Management Kevin H.S. Kwok and Dickson K.W. Chiu Dept. of Computer Science &
AlertsICWS Alert-driven Process Integration in a Web Services Environment Eleanna KAFEZA, S.C. CHEUNG Dept. of Computer Science, Hong Kong University.
HICSS 36 A Watermarking Infrastructure for Enterprise Document Management Presenter S.C. Cheung Department of Computer Science.
Event Based Implicit Invocation By Ajay Mansata. INTRODUCTION An Architectural style defines a family of systems. An Architectural style defines a family.
Department of Computer Science 1 CSS 496 Business Process Re-engineering for BS(CS)
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Process-oriented System Automation Executable Process Modeling & Process Automation.
MDC Open Information Model West Virginia University CS486 Presentation Feb 18, 2000 Lijian Liu (OIM:
CH1 INTERNATIONAL TRADE CONTRACTS
Kevin Hudson Oracle Corporation October Evolution of Oracle from Application to Infrastructure.
Enterprise Systems & Architectures. Enterprise systems are mainly composed of information systems. Business process management mainly deals with information.
E-Science Meeting April Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
Software Requirements Engineering: What, Why, Who, When, and How
Effective e-Government Process Monitoring and Interoperation: A Case Study on the Removal of Unauthorized Building Works in Hong Kong Dickson K. W. CHIU.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
CSE300 EAIusing EJB & XML CSE Enterprise Application Integration Using EJB and XML by Prithwis Sett Mumtaz Lohawala Nayana Paranjape.
The official electronic registered mail (posta elettronica certificata – PEC)
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
Policy-oriented Enterprise Management for SAP Business Modeling
Part 3 Design What does design mean in different fields?
and Contract Management
Procure-to-Pay (Services) Scenario Overview
Alerts for Healthcare Process and Data Integration
Procure-to-Pay (Services) Scenario Overview
EPAL and Management of Privacy Obligations
Enterprise Integration
Presentation transcript:

HICSS36-eService-1 A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment Dickson K.W. CHIU Dept. of Computer Science & Engineering, Chinese University of Hong Kong Shing-Chi CHEUNG, Sven TILL Dept. of Computer Science Hong Kong University of Science & Technology {scc,

HICSS36-eService-2 Introduction e-Contract Computerized facilitation or automation of a contract Cross-organizational business processes over the Internet e-Service system to readily create e-contracts with enforcement measures will soon become a critical success factor Particularly applicable to standard business interactions, such as the purchase and sale of goods. e-Contract templates Reduce effort in development and support of the contracts whole lifecycle (such as negotiation, enactment and enforcement The PURCHASER shall send a Letter of Credit for the GOODS to the SUPPLIER in the currency of [ ] within [ ] days of the invoice date. The SUPPLIER shall on receipt of the Letter of Credit ships the GOODS to the PURCHASER within [ ] days and provides the PURCHASER with shipment details.

HICSS36-eService-3 e-Contract Enforcement Recognition (monitoring) and handling of contract breaches Enforcement and enactment are handled differently (enactment deals with regular activities) Compliance of a contract has to be kept under constant surveillance Monitoring of variables – states of the business process Challenges constantly checking validity of all these variables incurs tremendous overheads extended across organizational boundaries may include confidential information, e.g., bank accounts

HICSS36-eService-4 Objectives A meta-model of e-contracts and e-contract templates - address specific semantic requirement of contracts for supporting B2B applications An architecture for cross-organizational e-contract enforcement (in addition to enactment) A methodology for elicitation of e-contract enforcement based on this multiple layer architecture A feasible implementation outline for e-contract enforcement with Enterprise Java Bean (EJB) and Web services

HICSS36-eService-5 Three Layer Architecture for E-contract Enforcement LayerPerspectiveArtifacts DocumentUsers, managers Meta-model for e-contracts and templates: Contract clauses (Obligation, Permission, Prohibition) and Parties BusinessSystem analyst Meta-model for e-contract enforcement: Business events, Business rules, Business actions and Business entities Implemen- tation ProgrammersBusiness action implementation (Enterprise JavaBeans components) Cross-organizational interface (Web services XML schemas)

HICSS36-eService-6 Meta-Model of an e-Contract Template e-Contract Template * 1 1..* Template Variable 2..* involves * refines ObligationPermissionProhibition e-ContractParty Contract Clause references Accepted Value 1

HICSS36-eService-7 A Sales e-Contract Template as an Instance of the Meta-model Sales :e-Contract Template Shipping & Insurance :Contract Clause Pricing :Contract Clause Delivery :Contract Clause insurance premium :Template Variable freight :Template Variable quantity :Template Variable delivery date :Template Variable return policy :Template Variable unit price :Template Variable Deposit Payment :Contract Clause deposit :Template Variable Purchaser :Party Supplier :Party involves

HICSS36-eService-8 E-Contract Lifecycle Business Information Exchange Contract Enactment Contract Enforcement Contract Negotiation Based on business experience and requirements, contract templates (with variables) are abstracted from previous contracts A contract template is modeled as an e-Contract template Each successful e-Negotiation will lead to an e-Contract Enforcement and enactment are executed differently and in parallel

HICSS36-eService-9 System Architecture Motivated by the active database paradigm Event - occurrence of something interesting to the system itself or to user applications Event driven execution of rules in event-condition-action (ECA) form ECA (active) rules: On event if condition then action Exceptions and alerts are events too (action = handler) Ensure efficiency and timeliness - monitor becomes only active when an interesting event occurs Contract EnforcerContract Enactor Event Adapter External Web Service Interface Event A Party as an e-Service Provider Database Event Repository Event Subscribers List Business Entities Internet Event Ext. Event Other Parties Timer Event

HICSS36-eService-10 From Contract Clause to ECA rules Improvement from deontic logic – well-defined execution semantics and when to execute BAO stands for an object that encapsulates a business action whose execution triggers the object creation Case study – Terms and Conditions of Sale, Service and Technical Support, Dell, Hong Kong Clause type EventConditionAction Obligation (Shall …) onDay(deadline (BAO ) ) NOT occurred( BAO ) raise( exception( BAO ) ) Prohibition (Shall not …) onOccurred( BAO) prohibitionCondition( BAO ) Permission (may …) NOT permitted( BAO )

HICSS36-eService-11 Enforcing Obligation Upon reaching the deadline T obl, a temporal event is generated by the Timer Contract enforcer (of counter party of the action) check if the obliged party has performed the required business action A obl, searching the log file for invoked actions / occurrence of related events If the obligation has not been fulfilled, the contract enforcer raises an exception E: onDay( deadline( BAO ) ) C: NOT occurred( BAO ) A: raise( exception( BAO ) )

HICSS36-eService-12 Enforcing Obligation Example 7.1 Dell shall deliver the Products to the place of delivery designated by Customer and agreed to by Dell as evidenced in Customers invoice (Place of Delivery) Enforcement rule (Customer)Enactment rule (DELL) E: onDay( deadline( DELIVER ) ) C: NOT occurred( DELIVER ) A: raise( exception( DELIVER ) ) E: onDay( before( deadline( DELIVER ), 6 ) ) C: valid( place( DELIVER ) ) & ready( DELIVER ) A: perform( DELIVER ) 10.7 …Dell shall respond to a request for such Emergency Service as soon as practicable after its receipt of such request. Analyst has to clarify and substitute ambiguities with concrete deadline in the formulation E: onDay( after( receiptDate( EMERGENCY_REQUEST ), N ) ) ) C: NOT responded( EMERGENCY_REQUEST ) ) A: raise( exception( EMERGENCY_REQUEST )

HICSS36-eService-13 Enforcing Prohibition Enforcement rule formEnforcement rule (Both Parties) E: onOccurred( BAO ) C: NOT permitted( BOA ) A: raise( exception( BAO ) ) E: onOccurred( INFO ) C: confidential( INFO ) A: raise( exception( INFO ) ) The contract enforcer should treat an occurrence of a prohibited action as an exception. Problem - observation of prohibitions if a party performs a prohibited action, the party will probably try to hide or distract this fact as long as possible unless the party does this by mistake or misunderstandings) autonomous nature of different organizations Example Each party shall treat as confidential all information obtained from the other pursuant to a Contract which is marked 'confidential …

HICSS36-eService-14 Enforcing Permission Enforcement rule formEnforcement rule example (Both Parties) E: onOccurred( BAO ) C: prohibitionCondition( BAO ) A: raise( exception( BAO ) ) E: onOccurred( REFUSE_ORDER ) C: NOT badlisted( customer( REFUSE_ORDER ) ) A: raise( exception( REFUSE_ORDER ) ) Temporary allowance to perform an otherwise prohibited action within a certain allowed time period under certain situations (i.e., events plus conditions) otherwise exception Example … Dell shall be entitled to refuse to accept orders placed by the Customer if the Customer breaches or Dell, on reasonable grounds, suspects that the Customer will breach this warranty …

HICSS36-eService-15 Enforcing Permission - Problem Enforcement rule formEnforcement rule example (Both Parties) E: onOccurred( BAO ) C: prohibitionCondition( BAO ) A: raise( exception( BAO ) ) E: onOccurred( LEVY ) C: NOT ( dateOfCancellation( order( LEVY ) ) > dateOfManufacture( order( LEVY ) ) & cancellationApproved( order( LEVY ) ) ) A: raise( exception( LEVY ) ) Example … If Dell allows a Customer to cancel its order after manufacture but before shipment of the Product, Dell shall be entitled to levy a cancellation charge equal to 20% of the price of the Products. … Customer can hardly know the commencement of manufacture of the product - almost non-monitorable Dell may improve the situation by informing the customer when the commencement starts through its enactment system. (CRM!)

HICSS36-eService-16 Discussion of Problems General measures to handle contract breaches or exception involves domain specific knowledge explicitly specified in other contract clauses implicitly regulated by laws and standards Ambiguity and impreciseness of natural languages reference to other laws, regulations, standard trade practices parties involved should discuss and clarify the matter amend existing or forthcoming contracts accordingly Autonomous nature of individual organizations Required events might not be monitorable Cooperation and trust - improves the transparency of operations (CRM!) Add explicit clauses in the contract to demand these events Lack of e-services standards

HICSS36-eService-17 Implementation Outline Event Adaptor – event publish-and-subscribe paradigm Web Services Manager Event Adapter publish subscribe receive notify Database Event Repository Subscribers List Security Policies Web Services Manager receive event Counter Party Party request subscribe request interface depend event subscription request component NOTATIONS

HICSS36-eService-18 Web Services of the Event Adaptor Publish Web service invoked by the event adaptor input parameter is the occurred event or exception checks the subscribers list and the security policies, and then notifies the valid subscribers (via , fax, ICQ message, or even via another Web service) Subscribe Web service registers requests for an event subscription parameters: the requester, the subscribed event, and how the requester wants to receive the event notification Receive Web service receive subscribed events published by the counter party received events are recorded at the Event Repository and forwarded to the Event Adapter in turn transforms them into the forms as required by the Contract Enforcer and the Contract Enacter

HICSS36-eService-19 Conclusions A meta-model for e-Contracts and e-Contract templates A pragmatic architecture for cross-organizational e- contract enforcement comprising three layers, viz., document layer, business layer, and implementation layer A methodology for developing e-contract enforcement rules, in an e-service environment, using a suppliers example An system implementation outline based on Web-service and EJB

HICSS36-eService-20 Future Work Methodologies for preventive measures avoiding contract breaches Process adaptation for interoperability - Workflow Views Based E- Contracts in a Cross-Organization E-Service Environment. (Distributed and Parallel Databases, 2002) ECCRM - An Event Driven Approach to Customer Relationship Management in an e-Brokerage Environment (HICSS36) B2B integration - A Data-driven Methodology to Extending Workflows Across Organizations over the Internet (HICSS36) e-Negotiation based on contract templates On e-Negotiation of Unmatched Logrolling Views (HICSS36) A Contract Template Driven Approach to e-Negotiation Processes (PACIS 2002) A Meta-model for e-Contract Template Variable Dependencies Facilitating e-Negotiation (ER2002) Enterprise Document Management A Watermarking Infrastructure for Enterprise Document Management (HICSS36)