Abstract
Enterprises must respect a number of regulations, with multilevel nature and which change along time. They must not only adapt their business interactions to the regulations and their changes but also evaluate the risks of violation of the new rules and to account for responsibilities. This work proposes a methodological framework for modeling and engineering business protocols, which gives primary position to the notions of commitment and responsibility, and supports the analysis of risks of violation when a new regulation is issued. We build on 2CL commitment-based protocols and introduce 2CL Methodology, a software engineering methodology for such protocols, which includes guidelines for specifying 2CL business protocols, for specialising them, and for composing a new 2CL protocol based on a set of given 2CL protocols. We developed a set of integrated software tools for the design and the analysis of 2CL protocols, with the aim of concretely supporting, on the one hand, designers in the task of identifying exposure to risks of violation, and, on the other hand, the management in the task of reasoning about accountability and of decision making. The proposal is evaluated by using a real-world case study from the banking sector.
Similar content being viewed by others
Notes
Other graphs, as well as other examples, can be found at http://di.unito.it/2CL.
The collected questionnaires are available at http://di.unito.it/questionnaire.
References
Baldoni, M., Baroglio, C., & Marengo, E. (2010). Behavior-oriented commitment-based protocols. In Proceedings of ECAI, Vol. 215 of Frontiers in artificial intelligence and applications (pp. 137–142). Amsterdam: IOS Press.
Baldoni, M., Baroglio, C., Brunkhorst, I., Henze, N., Marengo, E., & Patti, V. (2011). Constraint modeling for curriculum planning and validation. International Journal of Interactive Learning Environments, 19(1), 83–123.
Baldoni, M., Baroglio, C., Marengo, E., & Patti, V. (2011). Grafting regulations into business protocols: Supporting the analysis of risks of violation. In Forth international workshop on requirements engineering and law (RELAW 2011), held in conjunction with the 19th IEEE International Requirements Engineering Conference (pp. 50–59). Trento: IEEE Xplore.
Baldoni, M., Baroglio, C., Patti, V., & Marengo. E. (2012). Supporting the analysis of risks of violation in business protocols: The MiFID case study. In Information systems: Crossroads for organization, management, accounting and engineering (pp. 545–553). Berlin: Springer.
Baldoni, M., Baroglio, C., & Capuzzimati, F. (2013). 2COMM: A commitment-based MAS architecture. In M. Cossentino, A. El Fallah Seghrouchni, & M. Winikoff (Eds.), Proceedings of the 1st international workshop on engineering multi-agent systems, EMAS 2013, held in conjuction with AAMAS 2013, pp. 17–32, St. Paul, Minnesota.
Baldoni, M., Baroglio, C., Capuzzimati, F., Marengo, E., & Patti, V. (2013). A generalized commitment machine for 2CL protocols and its implementation. In Post-proceedings of the 10th international workshop on declarative agent languages and technologies X, DALT 2012. Revised selected and invited papers, No. 7784 in LNAI (pp. 96–115). Heidelberg: Springer.
Baldoni, M., Baroglio, C., Marengo, E., & Patti, V. (2013). Constitutive and regulative specifications of commitment protocols: A decoupled approach. ACM Transactions on Intelligent Systems and Technology, 4(2), 22:1–22:25.
Bentahar, J., El-Menshawy, M., Qu, H., & Dssouli, R. (2012). Communicative commitments: Model checking and complexity analysis. Knowledge-Based Systems, 35, 21–34.
Chesani, F., Mello, P., Montali, M., & Torroni, P. (2013). Representing and monitoring social commitments using the event calculus. Autonomous Agents and Multi-Agent Systems, 27(1), 85–130.
Chopra, A. (2009). Commitment alignment: Semantics, patterns, and decision procedures for distributed computing. PhD thesis, North Carolina State University, Raleigh, NC.
Chopra A. K., & Singh M. P. (2008). Constitutive interoperability. In L. Padgham, D. C. Parkes, J. P. Müller, & S. Parsons (Eds.), AAMAS (2) (pp. 797–804). IFAAMAS.
Chopra, A. K., & Singh, M. P. (2011). Specifying and applying commitment-based business patterns. In Proceedings of AAMAS. IFAAMAS.
Chopra, A. K., Artikis, A., Bentahar, J., Colombetti, M., Dignum, F., Fornara, N., Jones, A. J. I., Singh, M. P., & Yolum, P. (2013). Research directions in agent communication. ACM Transactions on Intelligent Systems and Technology, 4(2), 20:1–20:23.
Dam, K. H. (2003). Evaluating and comparing agent-oriented software engineering methodologies. PhD thesis, Applied Science in Information Technology, School of Computer Science and Information Technology, RMIT University, Australia.
Dam, K. H., & Winikoff, M. (2003). Comparing agent-oriented methodologies. In AOIS. Lecture notes in computer science (Vol. 3030, pp. 78–93). Berlin: Springer.
D’Aprile, D., Giordano, L., Martelli, A., Pozzato, G., Rognone, D., & Theseider Duprè, D. (2012). Business process compliance verification: An annotation based approach with commitments. In Information systems: Crossroads for organization, management, accounting and engineering (pp 563–570).
Desai, N., Mallya, A. U., Chopra, A. K., & Singh, M. P. (2005). Interaction protocols as design abstractions for business processes. IEEE Transactiions on Software Engineering, 31(12), 1015–1027.
Desai, N. V., Chopra, A. K., Arrott, M., Specht, B., & Singh, M. P. (2007). Engineering foreign exchange processes via commitment protocols. In IEEE international conference on SCC (pp. 514–521).
Desai, N., Chopra, A. K., & Singh, M. P. (2009). Amoeba: A methodology for modelling and evolving cross-organizational business processes. ACM Transactions on Software Engineering and Methodology, 19(2), Article 6.
Directive 2004/39/EC of the European Parliament and of the Council of 21 April 2004 on markets in financial instruments.
Dunin-Keplicz, B., & Verbrugge, R. (2003). Evolution of collective commitment during teamwork. Fundamenta Informaticae, 56(4), 329–371.
El-Menshawy, M., Bentahar, J., Qu, H., & Dssouli, R. (2011). On the verification of social commitments and time. In 10th international conference on autonomous agents and multiagent systems (AAMAS 2011), Taipei, Taiwan, May 2–6, 2011, pp. 483–490. IFAAMAS.
El Menshawy, M., Bentahar, J., El Kholy, W., & Dssouli, R. (2012). Reducing model checking commitments for agent communication to model checking ARCTL and GCTL*. Autonomous Agents and Multi-Agent Systems, 27(3), 375–418.
El-Menshawy, M., Bentahar, J., El Kholy, W., & Dssouli, R. (2013). Verifying conformance of multi-agent commitment-based protocols. Expert Systems with Applications, 40(1), 122–138.
Fornara, N., & Colombetti, M. (2004). A commitment-based approach to agent communication. Applied Artificial Intelligence, 18(9–10), 853–866.
Fornara, N., & Colombetti, M. (2010). Representation and monitoring of commitments and norms using OWL. AI Communications, 23(4), 341–356.
Fornara, N., & Colombetti, M. (2012). Specifying and enforcing norms in artificial institutions: A retrospective review. In Declarative agent languages and technologies IX—9th international workshop, DALT 2011. Revised selected and invited papers, Vol. 7169 of Lecture notes in computer science (pp. 117–119). Heidelberg: Springer.
Gerard, S. N., & Singh, M. P. (2013). Formalizing and verifying protocol refinements. ACM Transactions on Intelligent Systems and Technology (TIST), 4(2).
Gibilaro, G. (2007). Cassazione Civile Sentenza, Sez. SS.UU., 19/12/2007, n. 26724 e 26725. Intermediazione finanziaria, nullità del contratto e risarcimento del danno.
Jones, A. J. I., & Sergot, M. (1994). On the characterization of law and computer systems: The normative systems perspective. Chichester: Wiley.
Kammer, P. J., Bolcer, G. A., Taylor, R. N., Hitomi, A. S., & Bergman, M. (2000). Techniques for Supporting Dynamic and Adaptive Workflow. Computer Supported Cooperative Work, 9(3/4), 269–292.
Mallya, A., & Singh, M. P. (2007). An algebra for commitment protocols. Autonomous Agents and Multi-Agent Systems, 14(2), 143–163.
Marengo, E. (2012). 2CL protocols: Interaction patterns specification in commitment protocols. PhD thesis, Università degli Studi di Torino, Research Doctorate in Science and High Technology, Specialization in Computer Science.
Miller, T., & McGinnis, J. (2008). Amongst first-class protocols. In Proceedings of enginerring societies in the agents world VIII. LNCS (Vol. 4995, pp. 208–223). Heidelberg: Springer.
Montali, M. (2010). Specification and verification of declarative open interaction models: A logic-based approach. (Vol. 56). LNBIP. Heidelberg: Springer.
Montali, M., Pesic, M., van der Aalst, W. M. P., Chesani, F., Mello, P., & Storari, S. (2010). Declarative specification and verification of service choreographies. ACM Transactions on the Web (TWEB), 4(1), 1–62.
Organisation for Economic Co-operation and Development. (1980). OECD guidelines on the protection of privacy and transborder flows of personal data. Available online. http://www.oecd.org/.
Pesic, M. (2008). Constraint-based workflow management systems: Shifting control to users. PhD thesis, Eindhoven University of Technology.
Pesic, M., & van der Aalst, W. M. P. (2006). A declarative approach for flexible business processes management. In Business process management workshops (BPM 2006). LNCS (Vol. 4103, pp. 169–180). Berlin: Springer.
Pesic, M., Schonenberg, H., & van der Aalst, W. (2007). DECLARE: Full support for loosely-structured processes. In Proceedings of the 11th IEEE international enterprise distributed object computing conference. Washington, DC: IEEE Computer Society.
Regev, G., Bider, I., & Wegmann, A. (2007). Defining business process flexibility with the help of invariants. Software Process: Improvement and Practice, 12(1), 65–79.
Reichert, M., & Dadam, P. (1998). \(\text{ ADEPT }_{{\rm flex}}\)-Supporting dynamic changes of workflows without losing control. Journal of Intelligent Information Systems, 10(2), 93–129.
Searle, J. (1995). The construction of social reality. New York: Free Press.
Singh, M. P. (1999). An ontology for commitments in multiagent systems. Artificial Intelligence and Law, 7(1), 97–113.
Singh, M. P. (2007). Formalizing communication protocols for multiagent systems. In Proceedings of the 20th international joint conference on artificial intelligence (IJCAI 2007) (pp. 1519–1524). Hyderabad: AAAI Press.
Singh, M. P., Chopra, A. K., & Desai, N. V. (2008). Commitment-based service-oriented architecture. IEEE Computer, 42(11), 72–79.
Telang, P. R., & Singh, M. P. (2010). Abstracting business modeling patterns from RosettaNet. In Service-oriented computing: Agents, semantics, and engineering. Berlin: Springer.
Telang, P. R., & Singh, M. P. (2012). Comma: A commitment-based business modeling methodology and its empirical evaluation. In Proceedings of international conference on autonomous agents and multiagent systems, AAMAS 2012 (pp. 1073–1080). IFAAMAS.
Telang, P. R., & Singh, M. P. (2012). Specifying and verifying cross-organizational business models: An agent-oriented approach. IEEE Transactions on Services Computing, 5(3), 305–318.
van der Aalst, W. M. P., & van Hee, K. M. (2012). Workflow management: Models, methods, and systems. Cambridge, MA: MIT Press.
van der Aalst, W. M. P., Weske, M., & Grünbauer, D. (2005). Case handling: A new paradigm for business process support. Data and Knowledge Engineering, 53(2), 129–162.
van der Aalst, W., Pesic, M., & Schonenberg, H. (2009). Declarative workflows: Balancing between flexibility and support. Computer Science—Research and Development, 23, 99–113.
Winikoff, M., Liu, W., & Harland, J. (2004). Enhancing commitment machines. In Proceedings of DALT 2004. LNCS (Vol. 3476, pp. 198–220). Heidelberg: Springer.
Wooldridge, M. J. (2002). An introduction to multiagent systems. Chichester: Wiley.
Yolum, P. (2007). Design time analysis of multiagent protocols. Data and Knowledge Engineering, 63(1), 137–154.
Yolum, P., & Singh, M. P. (2001). Commitment machines. In Intelligent agents VIII, Proceedings of ATAL. LNCS (Vol. 2333, pp. 235–247). Heidelberg: Springer.
Yolum, P., & Singh, M. P. (2001). Designing and executing protocols using the event calculus. In Proceedings of the 5th international conference on autonomous agents (pp. 27–28).
Yolum, P., & Singh, M. P. (2002). Flexible protocol specification and execution: applying event calculus planning using commitments. In Proceedings of AAMAS.
Acknowledgments
This research was partially funded by “Regione Piemonte” through the project ICT4LAW. The authors would like to thank the anonymous reviewers for the valuable comments, which helped improving the quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Baldoni, M., Baroglio, C., Marengo, E. et al. Engineering commitment-based business protocols with the 2CL methodology. Auton Agent Multi-Agent Syst 28, 519–557 (2014). https://doi.org/10.1007/s10458-013-9233-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10458-013-9233-1