Contract representation for run-time monitoring and enforcement

被引:14
|
作者
Molina-Jimenez, C [1 ]
Shrivastava, S [1 ]
Solaiman, E [1 ]
Warne, J [1 ]
机构
[1] Univ Newcastle Upon Tyne, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
D O I
10.1109/COEC.2003.1210239
中图分类号
F [经济];
学科分类号
02 ;
摘要
Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguities that the original human-oriented text is likely to contain. The conversion process involves the conversion of the original text into mathematical notation. This paper discusses how standard conventional contracts can be described by means of Finite State Machines (FSMs). This mathematical description helps eliminate ambiguities from the original text before the contract is coded into a computer program. The paper describes how to map the rights and obligations extracted from the clauses of the contract into the states, transition and output functions, and input and output symbols of a FSM. The FSM representation can be used to guarantee that the clauses stipulated in the contract are observed when the contract is executed. The paper describes the middleware required for the enactment of the contract represented as a FSM.
引用
收藏
页码:103 / 110
页数:8
相关论文
共 50 条
  • [1] On run-time enforcement of policies
    Shah, Harshit
    Shyamasundar, R. K.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 268 - +
  • [2] Run-Time Enforcement of Nonsafety Policies
    Ligatti, Jay
    Bauer, Lujo
    Walker, David
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
  • [3] Gate automata-driven run-time enforcement
    Costa, Gabriele
    Matteucci, Ilaria
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 518 - 524
  • [4] Practical Run-Time Norm Enforcement with Bounded Lookahead
    Alechina, Natasha
    Bulling, Nils
    Dastani, Mehdi
    Logan, Brian
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 443 - 451
  • [5] Run-time monitoring of distributed applications
    Logean, X
    Dietrich, F
    Karamyan, H
    Koppenhöfer, S
    [J]. MIDDLEWARE'98: IFIP INTERNATIONAL CONFERENCE ON DISTRIBUTED SYSTEMS PLATFORMS AND OPEN DISTRIBUTED PROCESSING, 1998, : 459 - 474
  • [6] Run-Time Monitoring of Electronic Contracts
    Kyas, Marcel
    Prisacariu, Cristian
    Schneider, Gerardo
    [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2008, 5311 : 397 - 407
  • [7] A run-time representation of scheme record types
    Keep, Andrew W.
    Dybvig, R. Kent
    [J]. JOURNAL OF FUNCTIONAL PROGRAMMING, 2014, 24 (06) : 675 - 716
  • [8] Specification and optimal reactive synthesis of run-time enforcement shields
    Pandya, Paritosh K.
    Wakankar, Amol
    [J]. INFORMATION AND COMPUTATION, 2022, 285
  • [9] Specification and Optimal Reactive Synthesis of Run-time Enforcement Shields
    Pandya, Paritosh K.
    Wakankar, Amol
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2019, (305): : 91 - 106
  • [10] Run-time Requirement Enforcement for Loop Programs on Processor Arrays
    Witterauf, Michael
    Teich, Juergen
    [J]. PROCEEDINGS OF THE 2018 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2018, : 22 - 32