Verification of Itineraries for Mobile Agent Enabled Interorganizational Workflow

نویسندگان

  • Sea Ling
  • Seng Wai Loke
چکیده

We apply mobile agents to synchronize workflows of different organizations resulting in an interorganizational workflow. This paper models agent enabled interorganizational workflows using Interorganizational Workflow Nets. This model provides a means to verify the correctness (and, so the viability) of the itineraries of agents used in enacting interorganizational workflows. We also outline an algorithm for our verification method. We believe that our formal apparatus provides a sound basis for building mobile agent enabled interorganizational workflows that work.1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defend mobile agent against malicious hosts in migration itineraries

Agent integrity verification and fault-tolerance are the two prevalent methods among the solutions to the Problem of Malicious Hosts in Mobile agent system. Agent integrity verification enables the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent based on agent integrity verification [6]. A known drawback of such method is that i...

متن کامل

Interorganizational Workflow Execution Based on Process Agents and ECA Rules

Flexibility, adaptation and distribution have been regarded as major challenges of modern interorganizational workflow. To address these issues, this paper proposes an interorganizational workflow execution framework based on process agents and ECA rules. In our framework, an interorganizational workflow is modeled as a multiagent system with a process agent for each organization. The whole exe...

متن کامل

Designing Negotiation Mechanisms for Self-centered Interorganizational Workflow

Different organizations have different backgrounds of culture and knowledge which might lead to potential conflicts in the modern interorganizational workflow. Another fact in this research area is that each organization wants to keep some parts of its local workflow secret to other organizations. Considering the above features, this thesis proposes an approach of modeling the selfcentered inte...

متن کامل

Securing dynamic itineraries for mobile agent applications

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and d...

متن کامل

Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks

Existing mobile agent-enabled anomaly detection schemes have not considered temporal behavior for their correct functioning and detection of temporal anomalies. This study employs a holistic system approach to design an Enhanced mobile Agent-enabled Anomaly Detection System (EAADS) by designing two new algorithms. The proposed algorithms are not only important for the completeness of the EAADS,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001