Law Governed Peer-to- Peer Auctions Marcus Fontoura IBM Almaden Research Center Mihail Ionescu Naftaly Minsky Rutgers University.

Slides:



Advertisements
Similar presentations
EzScoreboard.com A Fully Integrated Administration Service.
Advertisements

DISTRIBUTED COMPUTING PARADIGMS
What is Business-to-Business E-Commerce? Any activity between companies that is supported electronically - - Online purchasing - Online sales -
E-Commerce Based Agents over P2P Network Arbab Abdul Waheed MSc in Smart Systems Student # Nov 23, 2008 Artificial Intelligence Zhibing Zhang.
4.02 Compliance Training Brian A. Dahl Senior Counsel Takeda Pharmaceuticals North America, Inc. November 14, 2003.
0 McLean, VA August 8, 2006 SOA, Semantics and Security.
A.Micol IVOA Registry REGISTRY WG Mar 2003 A Science Case (and 1000 Questions) for the IVOA Registry.
Cultural Heritage in REGional NETworks REGNET Auction System.
Dynamic views of clinical statements - a short contribution to the debate HL7 WGM – Clinical Statement Project David Markwell.
E-Auctions. Electronic CommercePrentice Hall © Learning Objectives 1.Define the various types of e-auctions and list their characteristics. 2.Describe.
RDFTL: An Event-Condition- Action Language for RDF George Papamarkos Alexandra Poulovassilis Peter T. Wood School of Computer Science and Information Systems.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Web Service Architecture
Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
TSpaces Services Suite: Automating the Development and Management of Web Services Presenter: Kevin McCurley IBM Almaden Research Center Contact: Marcus.
Tuesday, June 10, 2003 Web Services Brief Overview & Security Assertion Coordinator Pattern by Mohammad Abushadi & Riaz Ahmed for Security Group CSE -
Web Services Nasrullah. Motivation about web service There are number of programms over the internet that need to communicate with other programms over.
1 Towards Decentralized and Secure Electronic Marketplace Yingying Chen, Naftaly Minsky, Constantin Serban, and Wenxuan Zhang Dept of Computer Science.
Introduction E-Commerce is firmly established: –1997: $500M –2001: $50B Amazon.com: –First big online retailer –New business model: no brick-and-mortar.
An agent-mediated B2B marketplace University of Wollongong CSCI321 project Final Presentation Auction explanation.
Flexible Regulation of Virtual Enterprises Naftaly Minsky Rutgers University Joint work with Xuhui Ao.
A Dependable Auction System: Architecture and an Implementation Framework
A Multicriteria Model for Electronic Auctions Marie-Jo Bellosta, Im`ene Brigui Sylvie Kornman Daniel Vanderpooten Presented By Guoliang Qian.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Naftaly Minsky Rutgers University Law-Governed Interaction: a Decentralized Access-Control Mechanism.
Naftaly Minsky Rutgers University Preventing Theft By Keeping Good Company.
Spring 99 1 Lecture Notes on SE An internet trading framework: Introduction Consider a set of internet vendors that sell to internet clients airplane tickets,
SaaS Software Container By Brian Moore Paul Kopacz.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Selling Pre-Owned Medical Equipment On MedWOW.com.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Filename\location Agent Mediated Electronic Commerce Dr. Chris Preist HP Labs.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Auctions Yunon Chuang. What are auctions? n Auction Markets: –traders transact directly against the orders of other traders by communication through a.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Development of ODR in China
EService Process Descriptions. COSCA/NACM Standards for Electronic Filing Processes Technical and Business Approaches Section 1.2A Court rules may provide.
Naftaly Minsky Rutgers University Imposing Order Over Irregular & Open Systems.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
A NEW MARKET PLAYER: THE AGGREGATOR AND ITS INTERACTION WITH THE CONSUMER interaction Ramón Cerero, Iberdrola Distribución Paris, June 9th 2010 ADDRESS.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Explain why the global market is important.
University of Piraeus Department of Technology Education and Digital Systems Centre for Research and Technology - Hellas(C.E.R.T.H.) Informatics and Telematics.
DISTRIBUTED COMPUTING PARADIGMS. Paradigm? A MODEL 2for notes
Business-to-Business Authors: Authors: Mladenka Jakovljevic, Prof. Dr. Veljko Milutinovic,
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
Supervision SICOR Securities, Inc.. Why? NASD 3110 requires the firm to “…establish and maintain a system to supervise the activities of each registered.
E-Marketplaces: Mechanisms, Tools, and Impacts of E-commerce.
INRIA - Progress report DBGlobe meeting - Athens November 29 th, 2002.
Features Available Today :  Online Real-Estate Forms and Instructions  Online Approvals with RERA  User to User Discussion Forums  Complaint Capture.
Introduction to Web Services. Agenda Motivation History Web service model Web service components A walkthrough examples.
Course: COMS-E6125 Professor: Gail E. Kaiser Student: Shanghao Li (sl2967)
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Web Services An Introduction Copyright © Curt Hill.
Introduction to Web Services Presented by Sarath Chandra Dorbala.
© 2004 IBM Corporation WS-ResourceFramework Service Groups Tom Maguire.
Towards Decentralized Resource Allocation for Collaborative Peer- to-Peer Learning Environments Xavier Vilajosana, Daniel Lázaro and Joan Manuel Marquès.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Fall 2006CS 395: Computer Security1 Key Management.
CUSTOMER IDENTIFIES A NEEDS SEARCH FOR SERVICES OR PRODUCT TO SATISFY THE NEED SELECT A VENDOR & NEGOTIATE THE PRICE RECEIVES THE PRODUCT OR SERVICE MAKE.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 9 Web Services.
Module Overview Installing and Configuring a Network Policy Server
Sabri Kızanlık Ural Emekçi
Fundamentals of business law, 10e
Chapter 2: Introduction to Electronic Commerce
Choosing the Discovery Model Martin Forsberg
Presentation transcript:

Law Governed Peer-to- Peer Auctions Marcus Fontoura IBM Almaden Research Center Mihail Ionescu Naftaly Minsky Rutgers University

Agenda zOnline auctions zLimitations of centralized auction services zLaw governed interaction zLaw governed interaction and auctions zSample auction law zRelated work zConclusions and future work

Online auctions zBuyers and sellers scattered across the globe interact to close deals zFaster and less expensive transactions with no geographical barrier zForecast Research expects that in 2003 there will be a market of 14 million consumers and $19 billion in sales

Limitations of centralized auction services zThe auction algorithm ySeveral types of such algorithms can be used (like open-cry, sealed, variations, etc.) zCertification yHow to compute reputation and trust information about the auction participants zAuditing yWhat needs to be audited, and by whom zThe treatment of complaints yHow to handle inappropriate behavior of auction participants

Law governed interaction (1/4) zLGI is a message-exchange mechanism that allows an open group of distributed agents to engage in a mode of interaction governed by an explicitly specified policy, called the law of the group zThe group of agents interacting via L-messages is called a community C zFor each agent x in a given community has a control-state CS(x) zAgents are black box components

Law governed interaction (2/4) zAlthough the law L of a community C is global it is enforceable locally at each member of C yL only regulates local events at individual agents yThe ruling of L for an event e at agent x depends only on e and the local control-state CS(x) of x yThe ruling of L at x can mandate only local operations to be carried out at x, such as an update of CS(x)

Law governed interaction (3/4)

Law governed interaction (4/4) zSome LGI primitives returns true if term t is present in the control state, and fails otherwise y+t adds term t to the control state; y-t removes term t from the control state; yforward(x,m,y) sends message m from x to y; triggers at y an arrived (x,m,y) event zA law is represented as Prolog in Moses

Law governed interaction and auctions (1/4) zAuction registry y The auction registry is a separate agent that holds the selling offers as a tuple {ProductName, Description, SellerAddress, AuctionLaw, Timeout} zSellers and Buyers yAll the interaction between sellers and buyers is governed by LGI according to the auction policies (laws) specified in the registry tuples zThe actual exchange of product and money between the buyer that wins the auction and the seller is handled offline

Law governed interaction and auctions (2/4) zSellers send messages to the auction registry to insert or delete auction tuples zBuyers make requests for offers that meet some conditions zWhen a buyer discovers about an interesting auction, it can join the community that is conducting the auction zBuyers and sellers exchange messages according to the law specified in the auction tuple zThey interact directly, in a peer-to-peer communication model

Law governed interaction and auctions (3/4) Seller Buyer Auction registry 1. Register auction 2. Find about auctions 3. P2P interaction zInteraction among sellers, buyers, and the auction registry

P2P interaction on auction L Seller 1 Buyer 1 Seller 2 Auditor X Auction registry Register auction K: open-cry law Register auction L: sealed-bed law Find about auctions P2P interaction on auction K P2P interaction on auction L Auditor Y Complaints agent Z Buyer 2 Find about auctions Law governed interaction and auctions (4/4)

Sample auction law (1/5) Initializations R1. Directory(auditor, R2. Authority(ca,URL( R3. InitialCS([]) Certification R4. certified(X,certificate(issuer(ca),subject(Y),attributes([seller(N)]))) :- do(deliver(X,certificate(issuer(ca),subject(Y),attributes([seller(N)])),X)), do(+certified),do(+role(seller)),repealObligation(endCertified(X)), imposeObligation(endCertified(X),100), do(deliver(X,attributes([seller(N)],auditor)

Sample auction law (2/5) Seller starts the auction R5. sent(X,start(P,T),X) :- do(+P), do(+max(P,0)), do(+winner(P,X)), do(imposeObligation(timeout(P),T)), do(deliver(X,start(P,T),auditor)

Sample auction law (3/5) The open cry auction R6. sent(X,offer(P,M),Y) :- do(forward(X,offer(P,M),Y)), do(deliver(X,offer(P,M,Y),auditor) R7. arrived(X,offer(P,M),Y) :- M>Q, not do(-max(P,Q)), do(+max(P,M)), do(-winner(P,Z)), do(+winner(P,X)), do(forward(Y,accepted(P,M),X)), do(deliver(Y, accepted(P,T,X),auditor), do(forward(Y,outbid(P,M),Z)), do(deliver(Y,outbid(P,T,Z),auditor)

Sample auction law (4/5) zAuditing yAuditor is an agent that is not involved in the auction but that receives copies of the messages that were exchanged yAgents can request copies of the messages exchanged during the auction yAn auction can have more than one auditor yAn agent can choose not to participate in an auction if it does not trust its auditors yThe law imposes no restrictions in the way auditors handle the messages they receive.

Sample auction law (5/5) zTreatment of complaints yAn agent can complain about another agent (A) if he or she thinks that A did not have a correct behavior. xNot sending the item once the auction is over zPrevention of the artificial increase of the price by the seller zThe complaints agent can talk to the auditor to retrieve copies of all the exchanged messages and the real IDs (as are written in the certificates) of the agents

Related Work zCentralized auction services yB2B yB2C zAuctionBot yConfigurable auction policy zUDDI yAuction registry

Conclusions and Future Work (1/2) zSellers can set up their own auction policies and these policies are explicitly stated, readable by everybody, and strictly enforced by the LGI mechanism zAuctions are conducted in a totally distributed manner, through a peer-to-peer communication protocol zThere is no centralized authority that can act as a trusted mediator. zThird parties, such as auditors and complaints agents, can participate on the auctioning process under a given law zThis architecture is not limited to auctions, but it can be applied to any online trading model

Conclusions and Future Work (2/2) zDefinition of laws for other types of negotiation yEspecially interested in studying the behavior of agents in the presence of several optional (and conflicting) laws zIntegration with Web services yUDDI and WSDL zWeb-based user interface for the system