Virtual Organizations as Normative Multiagent Systems Guido Boella Università di Torino, Joris Hulstijn Vrije Universiteit, Amsterdam,

Slides:



Advertisements
Similar presentations
Annual Conference of ITA ACITA 2009 Agent Support for Policy-driven Collaborative Planning in Ad-hoc Teams Martin J. Kollingbaum, Timothy J. Norman Computing.
Advertisements

Adjustable Deliberation for Self-Managing Systems: Supporting Situated Autonomic Computing Prof. A. Taleb-Bendiab School of Computing Liverpool John Moores.
Workpackage 2: Norms
Agents, Power and Norms Michael Luck, Fabiola López y López University of Southampton, UK Benemérita Universidad Autonoma de Puebla, Mexico.
Title: Intelligent Agents A uthor: Michael Woolridge Chapter 1 of Multiagent Systems by Weiss Speakers: Tibor Moldovan and Shabbir Syed CSCE976, April.
High Performance Computing Course Notes Grid Computing.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
On the Economics of P2P Systems Speaker Coby Fernandess.
Analyzing Control Trust in Normative Multiagent Systems Joris Hulstijn 1 Yao-Hua Tan 1 Leendert van der Torre 2.
COMPUTER SIMULATION MODELS AND MULTILEVEL CANCER CONTROL INTERVENTIONS Joseph Morrissey, Kristen Hassmiller Lich, Rebecca Anhang Price, Jeanne Mandelblatt.
Intelligent Agents for norm-regulated MAS Alberto Sardinha Ricardo Gralhoz José Viterbo Karin Breitman.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Faculty of Management and Organization Emergence of social constructs and organizational behaviour How cognitive modelling enriches social simulation Martin.
Adding Organizations and Roles as Primitives to the JADE Framework NORMAS’08 Normative Multi Agent Systems, Matteo Baldoni 1, Valerio Genovese 1, Roberto.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
CoLaB 22nd December 2005 Secure Access to Service-based Collaborative Workflow for DAME Duncan Russell Informatics Institute University of Leeds, UK.
Trust and Grid Computing Systems Presented By: Woodas Lai.
1 Using Certified Policies to Regulate E-Commerce Transactions Victoria Ungureanu Rutgers University.
Institutional Social Dynamic Dependence Networks Serena Villata University of Turin.
Staff Sexual Misconduct Agency Culture Prepared by: A.T. Wall March 7-12, 2004.
Knowledge Management Solutions
Conceptual Modeling of the Healthcare Ecosystem Eng. Andrei Vasilateanu.
Filename\location Agent Mediated Electronic Commerce Dr. Chris Preist HP Labs.
The Law of the European Union Information and Communication.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
© ESTRELLA, IST A quick ‘n easy intro to LKIF Core Rinke Hoekstra.
The Gaia System Spring 2004: Gaia Larry Rudolph Not Invented Here Lots of Pervasive Computing Projects Carnegie Mellon Univ. U. Washington Georgia.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
People, Process, Technology. Communication Quality Experience(QCE ) What does this mean Why is it important How does it effect us Why do we need it How.
Virtual Enterprise Normative Framework within Electronic Institutions Henrique Lopes Cardoso 1,2, Eugénio Oliveira 1
30 May 2001Autonomous Agents1 The BOID architecture ( Conflicts Between Beliefs, Obligations, Intentions and Desires ) Jan Broersen Mehdi Dastani Joris.
Joaquim Filipe School of Technology Polytechnic Institute of Setúbal Portugal This work has been supported in part by.
A Modeling Language to Model Norms Karen Figueiredo Viviane Torres da Silva Universidade Federal Fluminense (UFF)
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
25-26 Oct. 2001, BNAIC’011 An Alternative Classification of Agent Types based on BOID Conflict Resolution Jan Broersen Mehdi Dastani Zisheng Huang Joris.
E-Science Meeting March Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Modeling  Conversation  Policies using Permissions  and  Obligations Lalana Kagal and Tim Finin University of Maryland, Baltimore County AAMAS Workshop.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
Issues of Quality and Trust in Computing Jo Lumsden Aston University Birmingham, UK.
A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
Intelligent agents, ontologies, simulation and environments for norm-regulated MAS Deliberative Normative Agents Ricardo Gralhoz Governance in Open Multi-Agent.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lecture 13 Externalities, public goods, common-property resources.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Printed by Definition of Grid Resource Scheduling Scheduling diverse applications on heterogeneous, distributed, dynamic grid computing.
A Policy Based Approach to Security for the Semantic Web Lalana Kagal, Tim Finin and Anupam Joshi.
Model Checking Grid Policies JeeHyun Hwang, Mine Altunay, Tao Xie, Vincent Hu Presenter: tanya levshina International Symposium on Grid Computing (ISGC.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
A Logical Framework for Web Service Discovery The Third International Semantic Web Conference Hiroshima, Japan, Michael Kifer 1, Rubén Lara.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
Organizations as Socially Constructed Agents in the Agent Oriented Paradigm Guido Boella Leon van der Torre.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
What Are Institutions?. Key Definitions (I) Social structures include all sets of social relations, including the episodic and those without rules, as.
IR 306 Foreign Policy Analysis
Intelligent Agents: Technology and Applications Unit Five: Collaboration and Task Allocation IST 597B Spring 2003 John Yen.
A Framework for Contractual Resource Sharing in Coalitions Babak Sadighi Firozabai (SICS), Marek Sergot (IC), Anna Squicciarini (UoM) and Elisa Bertino.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Service-Oriented Computing: Semantics, Processes, Agents
Robert Muthuri, Guido Boella, Joris Hulstijn
Access Control What’s New?
Presentation transcript:

Virtual Organizations as Normative Multiagent Systems Guido Boella Università di Torino, Joris Hulstijn Vrije Universiteit, Amsterdam, Leendert van der Torre CWI, Amsterdam,

HICSS'05Boella, Hulstijn, van der Torre2 Virtual Organizations Virtual Organizations: individuals and institutions that need to coordinate resources and services across institutional boundaries (Foster et al) Infrastructures: e.g. GRID, CSCW, KM, … Users form a virtual community, with shared norms and objectives. Align community norms with infrastructure rules? –Client-server: global policies, but no local control –Peer-to-peer: local control, but no global policies Need a conceptual model of norms at different levels of control.

HICSS'05Boella, Hulstijn, van der Torre3 Normative Multiagent Systems Normative system: set of norms (obligations) with an enforcement mechanism. Multiagent system: set of autonomous agents with beliefs, goals, actions... Model interaction between agents by recursive modeling Model normative system N as any other agent [Boella & Van der Torre KR’04,AAMAS’04]

HICSS'05Boella, Hulstijn, van der Torre4 Overview (i). Example (ii). NMAS (iii). Conclusions 1.How can the behavior of an individual agent in a virtual organization be described? 2.How can agents change a virtual organization? 3.How can agents in a virtual organization establish normative relations or contracts with each other? 4.How can we deal with norms that operate at different levels of control?

(i). Example

HICSS'05Boella, Hulstijn, van der Torre6 Distributed Access Control Global norms, but local access control. –owners have the right to entitle access to a resource –storage providers can grant or withhold access [Firozabadi and Sergot 2002] So a 2 must –check ID a 1, –check entitlement a 1 –weigh obligations against own goals userstorage provider owner entitle access request access ? a1a1 a2a2 a3a3

HICSS'05Boella, Hulstijn, van der Torre7 Observations Dynamic: agents can enter, leave and alter the normative system. Interactive: agents can agree on a contract (set of mutual obligations), enforced by N. Obligations are effective only when accompanied by an enforcement mechanism. Violation detection and sanctioning can be delegated to other agents. Roles: subjects, defenders, normative system

(ii). NMAS

HICSS'05Boella, Hulstijn, van der Torre9 Individual Agent Focus on goal generation Use sets of production rules P  Q to represent beliefs and goals, with a priority order <. Belief rules: information about current state Goal rules: information about ideal future state < Beliefs Goals Observations Actions Goals Goal Generation Planning & Scheduling

HICSS'05Boella, Hulstijn, van der Torre10 Example 1. Belief: at party 2. Goal: at party  drink beer 3. Goal: drink beer  smoke cigarette 4. Goal: ¬ smoke cigarette Priority: 1 > { 2, 4 } > 3 Outcome: { at party, drink beer, ¬ smoke cigarette },

HICSS'05Boella, Hulstijn, van der Torre11 Recursive Modeling Profile (set of P  Q rules) depends on role. Used for trust and deception. agent A deliberates about optimal decision – considers optimal decision of agent B agent B deliberates about optimal decision – considers optimal decision of agent A agent A deliberates about optimal decision – considers optimal decision of agent B

HICSS'05Boella, Hulstijn, van der Torre12 Constitutive Rules Establish institutional facts by constitutive rules [Searle 1995]. E.g. counts as an entitlement to lunch, at the HICSS conference. “P counts as Q in institutional context C” whenever C  P  Q is a belief of N Joris Hulstijn Thursday January 6, lunch ticket

HICSS'05Boella, Hulstijn, van der Torre13 Norms Obligation of A to N to bring about P in context C, under sanction S iff 1. Goal of N: C  P 2. Goal of N: (C  ¬P)  Viol(A, ¬P) 3. Goal of N: ¬ Viol(A, ¬ P) 4. Goal of N: Viol(A, ¬ P)  S 5. Goal of N: ¬ S 6. Goal of A: ¬ S 7. Goal of A: ¬P A: 6 > 7, N: 2 > 3, 4 > 5 My wish is your command?

HICSS'05Boella, Hulstijn, van der Torre14 Dynamics The fact that normative rules 1-6 hold, is itself an institutional fact, i.e. a belief of N. A performative speech act counts as the creation of an institutional fact in context C, provided … –preparatory conditions hold, and –sincerity, propositional and essential conditions hold. Owner a entitles b access to d, means either 1. create an obligation for all to grant b access to d, or 2. create a credential, used with a general access obligation.

(iii). Conclusions

HICSS'05Boella, Hulstijn, van der Torre16 Four kinds of Structures A regards N - e.g. decide to violate or not N regards A’s behavior - e.g. decide how to enforce A 1 regards A 2 given N - e.g. decide whether to trust N 1 regards N 2, given A’s behavior given N - e.g. decide to delegate or not A : N AN N : A AN N : N AN A : A AN

HICSS'05Boella, Hulstijn, van der Torre17 Conclusions Virtual organizations as normative multiagent systems. 1.Individual agents are modeled goal generation, based on beliefs, goals and priorities. 2.Dynamics can be captured by constitutive rules. 3.Using recursive modeling and interaction, complex normative relations can be broken down into four types: A:N, N:A, A:A (N) and N:N (A). 4.Norms at different levels of control, can be dealt with by delegation to embedded normative multiagent systems, leading to different roles: subjects, defenders and the normative system.

HICSS'05Boella, Hulstijn, van der Torre18 References G. Boella and L. van der Torre. Regulative and constitutive norms in normative multiagent systems. KR’04. G. Boella and L. van der Torre. Attributing mental attitudes to normative systems. AAMAS’04. J. R. Searle. The Construction of Social Reality. The Free Press, New York, Ronald M. Lee. Bureaucracies as deontic systems. ACM Transactions on Information Systems, 6(2):87 – 108, Jones, A.J.I. & Sergot, M.J. On the characterisation of law and computer systems In: Deontic Logic in Computer Science, Wiley 1993, L. Kagal, T. Finin, A. Joshi Trust-Based Security in Pervasive Computing Environments, Communication of the IEEE, 34 (12), 154 – 157, 2001

HICSS'05Boella, Hulstijn, van der Torre19 Distributed Access Control (2) 1.Goal of N: req(a 3,d)  cred(a 1,a 3,d)  acc(a 2,a 3,d) 2.Goal of N: req(a 3,d)  cred(a 1,a 3,d)  ¬ acc(a 2,a 3,d)  Viol(a 2, ¬ acc(a 2,a 3,d)) Goal of N: ¬ Viol(a 2, ¬ acc(a 2,a 3,d)) Goal of N: Viol(a 2, ¬ acc(a 2,a 3,d))  ban(a 2 ) Goal of N: ¬ ban(a 2 ) Goal of a 2 : ¬ ban(a 2 ) Goal of a 2 : ¬ acc(a 2,a 3,d) for a 2: 6 > 7 for N: 2 > 3, 4 > 5 userstorage provider owner entitle access request access ? a1a1 a2a2 a3a3

HICSS'05Boella, Hulstijn, van der Torre20 Example Obligation of a to n not to overfish in spring, under sanction of paying a fine. 1.Goal of n: spring  ¬ overfish Goal of n: spring  overfish  Viol(overfish, a) Goal of n: ¬ Viol(overfish, a) Goal of n: spring  Viol(overfish, a)  fine Goal of n: ¬ fine Goal of a: ¬ fine Belief of a,n: spring Goal of a: overfish Works only in case Desire 8 < Desire 6