Model Checking Contractual Protocols

نویسنده

  • Aspassia Daskalopulu
چکیده

This paper discusses how model checking, a technique used for the verification of behavioural requirements of dynamic systems, can be usefully deployed for the verification of contracts. A process view of agreements between parties is taken, whereby a contract is modelled as it evolves over time in terms of actions or more generally events that effect changes in its state. Modelling is done with Petri Nets in the spirit of other research work on the representation of trade procedures. The paper illustrates all the phases of the verification technique through an example and argues that the approach is useful particularly in the context of pre-contractual negotiation and contract drafting. The work reported here is part of a broader project on the development of logic-based tools for the analysis and representation of legal contracts [4].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Simple Obligation and Right Model (SORM) - for the Runtime Management of Electronic Service Contracts

Online purchase and delivery of goods and services requires an electronic contracting process. Formalization of contractual content enables automatic delivery of services and monitoring of the terms and conditions of the contract at service runtime. The Simple Obligation and Right Model (SORM) provides an abstract, domain-independent model of contractual content. Model instances can be interpre...

متن کامل

Modeling and verifying choreographed multi-agent-based web service compositions regulated by commitment protocols

The competency to composeweb services from available services is one of themost crucial problems in the paradigm of service-oriented computing. Conventional software engineering approaches and even standard languages compose web services as workflow models that control the business logic required to coordinate data over participating services. Such models would not apply to the design of multi-...

متن کامل

Interorganizational Business Interactions: Contracts, Processes, Evolution

DESAI, NIRMIT VIKRAM. Interorganizational Business Interactions: Contracts, Processes, Evolution. (Under the direction of Professor Munindar P. Singh). Business process management in open environments remains a stubborn and important challenge. In open environments, autonomous organizations having heterogeneous information systems interact in an ever-evolving manner. The nature of the contractu...

متن کامل

Classical Security Protocols for QKD Systems

The purpose of this report is to document the three principal classes of classic cryptographic protocols which are needed in systems for quantum key distribution. We will detail the protocols used for secret–key reconciliation by public discussion, privacy ampli…cation by public discussion, and unconditionally secure authentication. We suggest the use of the model checking method for the analys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره cs.SE/0106009  شماره 

صفحات  -

تاریخ انتشار 2000