Verification of Itineraries for Mobile Agent Enabled Interorganizational Workflow
نویسندگان
چکیده
We apply mobile agents to synchronize workflows of different organizations resulting in an interorganizational workflow. This paper models agent enabled interorganizational workflows using Interorganizational Workflow Nets. This model provides a means to verify the correctness (and, so the viability) of the itineraries of agents used in enacting interorganizational workflows. We also outline an algorithm for our verification method. We believe that our formal apparatus provides a sound basis for building mobile agent enabled interorganizational workflows that work.1
منابع مشابه
Defend mobile agent against malicious hosts in migration itineraries
Agent integrity verification and fault-tolerance are the two prevalent methods among the solutions to the Problem of Malicious Hosts in Mobile agent system. Agent integrity verification enables the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent based on agent integrity verification [6]. A known drawback of such method is that i...
متن کاملInterorganizational Workflow Execution Based on Process Agents and ECA Rules
Flexibility, adaptation and distribution have been regarded as major challenges of modern interorganizational workflow. To address these issues, this paper proposes an interorganizational workflow execution framework based on process agents and ECA rules. In our framework, an interorganizational workflow is modeled as a multiagent system with a process agent for each organization. The whole exe...
متن کاملDesigning Negotiation Mechanisms for Self-centered Interorganizational Workflow
Different organizations have different backgrounds of culture and knowledge which might lead to potential conflicts in the modern interorganizational workflow. Another fact in this research area is that each organization wants to keep some parts of its local workflow secret to other organizations. Considering the above features, this thesis proposes an approach of modeling the selfcentered inte...
متن کاملSecuring dynamic itineraries for mobile agent applications
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and d...
متن کاملSpecification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks
Existing mobile agent-enabled anomaly detection schemes have not considered temporal behavior for their correct functioning and detection of temporal anomalies. This study employs a holistic system approach to design an Enhanced mobile Agent-enabled Anomaly Detection System (EAADS) by designing two new algorithms. The proposed algorithms are not only important for the completeness of the EAADS,...
متن کامل