A Verifiable Logic-Based Agent Architecture

  • Marco Alberti
  • Federico Chesani
  • Marco Gavanelli
  • Evelina Lamma
  • Paola Mello
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4203)


In this paper, we present the \({\mathcal{S}}\)CIFF platform for multi-agent systems.

The platform is based on Abductive Logic Programming, with a uniform language for specifying agent policies and interaction protocols. A significant advantage of the computational logic foundation of the \({\mathcal{S}}\)CIFF framework is that the declarative specifications of agent policies and interaction protocols can be used directly, at runtime, as the programs for the agent instances and for the verification of compliance.

We also provide a definition of conformance of an agent policy to an interaction protocol (i.e., a property that guarantees that an agent will comply to a given protocol) and a operational procedure to test conformance.


Multiagent System Logic Programming Integrity Constraint Agent Policy Interaction Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Guerin, F., Pitt, J.: Proving properties of open agent systems. In: Castelfranchi, C., Lewis Johnson, W. (eds.) Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2002), Part II, Bologna, Italy, pp. 557–558. ACM Press, New York (2002)CrossRefGoogle Scholar
  2. 2.
    Merz, S.: Model checking: A tutorial overview. In: Cassez, F., Jard, C., Rozoy, B., Dermot, M. (eds.) MOVEP 2000. LNCS, vol. 2067, pp. 3–38. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: The SCIFF abductive proof-procedure. In: Bandini, S., Manzoni, S. (eds.) AI*IA 2005. LNCS (LNAI), vol. 3673, pp. 135–147. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Compliance verification of agent interaction: a logic-based tool. Applied Artificial Intelligence 20, 133–157 (2006)CrossRefGoogle Scholar
  5. 5.
    Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Security protocols verification in abductive logic programming: a case study. In: Dikenelli, O., Gleizes, M.-P., Ricci, A. (eds.) ESAW 2005. LNCS (LNAI), vol. 3963, pp. 106–124. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Kowalski, R.A., Sadri, F.: From logic programming towards multi-agent systems. Annals of Mathematics and Artificial Intelligence 25, 391–419 (1999)MATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Bellifemine, F., Bergenti, F., Caire, G., Poggi, A.: Jade - a java agent development framework. In: Bordini, R.H., Dastani, M., Dix, J., Fallah-Seghrouchni, A.E. (eds.) Multi-Agent Programming: Languages, Platforms and Applications. Multiagent Systems, Artificial Societies, and Simulated Organizations, vol. 15, pp. 125–147. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    FIPA: Foundation for Intelligent Physical Agents, Home Page:
  9. 9.
    Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive Logic Programming. Journal of Logic and Computation 2, 719–770 (1993)CrossRefMathSciNetGoogle Scholar
  10. 10.
    Kakas, A.C., Mancarella, P.: On the relation between Truth Maintenance and Abduction. In: Fukumura, T. (ed.) Proceedings of the 1st Pacific Rim International Conference on Artificial Intelligence, PRICAI 1990, pp. 438–443. Ohmsha Ltd., Nagoya, Japan (1990)Google Scholar
  11. 11.
    Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. Journal of Logic Programming 33, 151–165 (1997)MATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Denecker, M., Schreye, D.D.: SLDNFA: an abductive procedure for abductive logic programs. Journal of Logic Programming 34, 111–167 (1998)MATHCrossRefMathSciNetGoogle Scholar
  13. 13.
    Jaffar, J., Maher, M.: Constraint logic programming: a survey. Journal of Logic Programming 19-20, 503–582 (1994)CrossRefMathSciNetGoogle Scholar
  14. 14.
    Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: The SOCS computational logic approach for the specification and verification of agent societies. In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS, vol. 3267, pp. 324–339. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    FIPA Query Interaction Protocol, Published on August 10 (2001), available for download from the FIPA website
  16. 16.
    Gavanelli, M., Lamma, E., Mello, P.: Proof of properties of the SCIFF proof-procedure (Technical Report CS-2005-01)Google Scholar
  17. 17.
    Gavanelli, M., Lamma, E., Mello, P.: Proof of completeness of the SCIFF proof-procedure (Technical Report CS-2005-02)Google Scholar
  18. 18.
    Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Security protocols verification in Abductive Logic Programming: A case study. In: Pettorossi, A., Proietti, M., Senni, V. (eds.) CILC 2005 - Convegno Italiano di Logica Computazionale, Università degli Studi di Roma Tor Vergata (2005)Google Scholar
  19. 19.
    Baldoni, M., Baroglio, C., Martelli, A., Patti, V., Schifanella, C.: Verifying the conformance of web services to global interaction protocols: A first step. In: Bravetti, M., Kloul, L., Zavattaro, G. (eds.) EPEW/WS-EM 2005. LNCS, vol. 3670, Springer, Heidelberg (2005)CrossRefGoogle Scholar
  20. 20.
    Endriss, U., Maudet, N., Sadri, F., Toni, F.: Protocol conformance for logic-based agents. In: Gottlob, G., Walsh, T. (eds.) Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, Acapulco, Mexico (IJCAI 2003), Morgan Kaufmann Publishers, Acapulco (2003)Google Scholar
  21. 21.
    Endriss, U., Maudet, N., Sadri, F., Toni, F.: Logic-based agent communication protocols. In: Dignum, F.P.M. (ed.) ACL 2003. LNCS (LNAI), vol. 2922, pp. 91–107. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  22. 22.
    Russo, A., Miller, R., Nuseibeh, B., Kramer, J.: An abductive approach for analysing event-based requirements specifications. In: Stuckey, P.J. (ed.) ICLP 2002. LNCS, vol. 2401, pp. 22–37. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Marco Alberti
    • 1
  • Federico Chesani
    • 2
  • Marco Gavanelli
    • 1
  • Evelina Lamma
    • 1
  • Paola Mello
    • 2
  1. 1.ENDIFUniversity of FerraraItaly
  2. 2.DEISUniversity of BolognaItaly

Personalised recommendations