Component-based Software Protocol Approach

نویسندگان

  • Jin Baek Kim
  • Gregory E. Kersten
  • Stefan Strecker
  • Ka Pong Law
چکیده

A major challenge in developing an e-negotiation system (ENS) is that the context of negotiations such as negotiators’ characteristics, negotiation processes, negotiation rules, and social implication are different case-by-case. This context dependency makes it difficult to develop a general ENS applicable to wide variety of negotiation problems. In this paper, in order to mitigate the context dependency issue, we propose to adopt the component-oriented software protocol approach to e-negotiation systems and present a framework for e-negotiation protocols that implements this approach. According to this framework, an ENS is developed by designing a high level e-negotiation protocol which specifies the rules on allowed activities at a certain state and the rules on how to change them depending on the activities performed. Then, this designed e-negotiation protocol is executed by a general purpose ENS platform, which integrates software components and executes the protocol. This approach allows one to easily develop or modify ENS so that it can best fit into the context. We prove validity of our framework by redeveloping two existing ENS’s SimpleNS and Inspire – using the framework for e-negotiation protocol model and an ENS platform that understands and executes the defined protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Protocol Reconfiguration Using Component-Based Design

Previous modular protocol design and implementation allow a flexible configuration and reconfiguration of protocol layers or full protocol stacks. However, in our days, software engineering technologies introduce new methods for designing and specifying modular software. Such a technology is the component-based software technology. Using those techniques, a software system could be modular. Thi...

متن کامل

Temporal Logic Based Specification of Component Interaction Protocols

The interaction protocols of software components are critical to their proper understanding and use. In this paper, we introduce a temporal logic based approach to the specification of component interaction protocols. The protocol specifications take the form of interaction constraints on a component’s signature elements (i.e., attributes, operations and events). In particular, this approach al...

متن کامل

Refinement of Open Protocols for Modelling and Analysis of Complex Interactions in Multi-agent Systems

This paper proposes to study a refinement of open and concurrent interaction protocols, allowing hierarchical construction of complex interactions in multi-agent systems. The generic approach presented in this paper integrates Petri nets formalism and component based approach. The study of the refinement of the protocols by the principle of component-substitutability has been used to address on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005