A Modeling Language to Model Norms Karen Figueiredo Viviane Torres da Silva Universidade Federal Fluminense (UFF)

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

Agents, Power and Norms Michael Luck, Fabiola López y López University of Southampton, UK Benemérita Universidad Autonoma de Puebla, Mexico.
Giving a formal meaning to “Specialization” In these note we try to give a formal meaning to specifications, implementations, their comparisons. We define.
A Component Based Programming Framework for Autonomic Applications Hua Liu, Manish Parashar, and Salim Hariri ICAC ‘04 John Otto Wi06 CS 395/495 Autonomic.
1 JAC : Aspect Oriented Programming in Java An article review by Yuval Nir and Limor Lahiani.
Process Model for Access Control Wael Hassan University of Ottawa Luigi Logrippo, Université du Québec en Outaouais.
Adding Organizations and Roles as Primitives to the JADE Framework NORMAS’08 Normative Multi Agent Systems, Matteo Baldoni 1, Valerio Genovese 1, Roberto.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
Detail Design Extending UML and Object Design. Object Design.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Kmi.open.ac.uk Semantic Execution Environments Service Engineering and Execution Barry Norton and Mick Kerrigan.
Using the Vanderbilt Generic Modeling Environment (GME) to Address SOA QoS Sumant Tambe Graduate Intern, Applied Research, Telcordia Technologies Inc.
WebDynpro for ABAP Short introduction.
Introduction to Business Courses The proposed Introduction to Business Courses consist of three one-credit courses. – BUS 100: Functional Areas of Business.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
*Law and Coordination Rodrigo Paes. © LES/PUC-Rio Agenda Integration Coordination BPEL example Birth *Law and Coordination Further Steps.
The Data Attribution Abdul Saboor PhD Research Student Model Base Development and Software Quality Assurance Research Group Freie.
Ontology Development Kenneth Baclawski Northeastern University Harvard Medical School.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Towards Translating between XML and WSML based on mappings between.
Topics Covered: Software requirement specification(SRS) Software requirement specification(SRS) Authors of SRS Authors of SRS Need of SRS Need of SRS.
Sweetening Regulated Open Multi-Agent Systems with a Formal Support for Agents to Reason About Laws Carolina Howard Felicíssimo Key points of my paper.
CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models Bernard Stepien, University of Ottawa Hemanth Khambhammettu Kamel.
Supporting Heterogeneous Users in Collaborative Virtual Environments using AOP CoopIS 2001 September 5-7, Trento, Italy M. Pinto, M. Amor, L. Fuentes,
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Contextual Regulations in Open Multi-Agent Systems Carolina Howard Felicíssimo Advisor: Prof. Carlos José Pereira de Lucena.
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
Building Tools by Model Transformations in Eclipse Oskars Vilitis, Audris Kalnins, Edgars Celms, Elina Kalnina, Agris Sostaks, Janis Barzdins Institute.
Programming in Java Unit 3. Learning outcome:  LO2:Be able to design Java solutions  LO3:Be able to implement Java solutions Assessment criteria: 
An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date:
Contextual Regulations in Open Multi-Agent Systems Carolina Howard Felicíssimo Advisor: Prof. Lucena.
Copyright 2002 Prentice-Hall, Inc. Chapter 2 Object-Oriented Analysis and Design Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey.
A Framework for the Reconfiguration of Ubicomp Systems Pau Giner, Carlos Cetina, Joan Fons, Vicente Pelechano.
Lecture 7: Requirements Engineering
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Composition of UML Described Refactoring Rules Presented by Chin-Yi Tsai.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
CS551 - Lecture 8 1 CS551 Modelling with Objects (Chap. 3 of UML) Yugi Lee STB #555 (816)
NIST Standard for Role- Based Access Control Present by Wenyi Ni.
9-1 © Prentice Hall, 2007 Chapter 9: Analysis Classes Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph S. Valacich, Jeffrey.
Automata Based Method for Domain Specific Languages Definition Ulyana Tikhonova PhD student at St. Petersburg State Politechnical University, supervised.
DOMAIN MODEL: ADDING ATTRIBUTES Identify attributes in a domain model. Distinguish between correct and incorrect attributes.
Object-Oriented Modeling: Static Models. Object-Oriented Modeling Model the system as interacting objects Model the system as interacting objects Match.
COMP 6471 Software Design Methodologies Winter 2006 Dr Greg Butler
Requirements Engineering-Based Conceptual Modelling From: Requirements Engineering E. Insfran, O. Pastor and R. Wieringa Presented by Chin-Yi Tsai.
A View-based Methodology for Collaborative Ontology Engineering (VIMethCOE) Ernesto Jiménez Ruiz Rafael Berlanga Llavorí Temporal Knowledge Bases Group.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Chapter 5 System Modeling. What is System modeling? System modeling is the process of developing abstract models of a system, with each model presenting.
7-1 © Prentice Hall, 2007 Topic 7: Analysis Classes Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph S. Valacich, Jeffrey.
Winter 2007SEG2101 Chapter 31 Chapter 3 Requirements Specifications.
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
Inferring Declarative Requirements Specification from Operational Scenarios IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 24, NO. 12, DECEMBER, 1998.
UML Profile BY RAEF MOUSHEIMISH. Background Model is a description of system or part of a system using well- defined language. Model is a description.
DISCUSSION ABOUT REGISTRATION OF RM-ODP LIBRARY EXAMPLE BASED ON MFI Yuan Lin, Wang Jian, Wang Chong, Liang Peng, Feng Zaiwen.
1 Ontology Evolution within Ontology Editors Presentation at EKAW, Sigüenza, October 2002 L. Stojanovic, B. Motik FZI Research Center for Information Technologies.
A UML-Based Pattern Specification Technique Presented by Chin-Yi Tsai IEEE TRANSACTION ON SOFTWARE ENGINEERING, VOL. 30, NO. 3, MARCH 2004 Robert B. France,
1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Analysis Classes Unit 5.
Security analysis of COM with Alloy
SysML 2.0 Requirements for Visualization
Object-Oriented Analysis and Design
Lecture 2 The Relational Model
TIM 58 Chapter 8: Class and Method Design
Daniel Amyot and Jun Biao Yan
Seminar 3 UML Class Diagram.
Chapter 20 Object-Oriented Analysis and Design
Access Control What’s New?
NIST Standard for Role-Based Access Control
Presentation transcript:

A Modeling Language to Model Norms Karen Figueiredo Viviane Torres da Silva Universidade Federal Fluminense (UFF)

Outline  Introduction  Goals of the paper  Background –Metamodeling –RBAC –SecureUML+ComponentUML  NormML  Validating Norms –Well-formed rules –Checking for conflicts  Conclusion

Outline  Introduction  Goals of the paper  Background –Metamodeling –RBAC –SecureUML+ComponentUML  NormML  Validating Norms –Well-formed rules –Checking for conflicts  Conclusion

Introduction  Norms regulate the behavior of agents in open MAS  Norms can be defined at design time and at runtime  The definition of norms at design time is important to: – keep the alignment of the norms with the systems elements, such as its entities and the actions that they execute – detect and solve some conflicts between norms at design time (at least, part of the conflicts)

Our goals on this paper...  To investigate the properties and the characteristics of norms  To find out if the MAS languages, methodologies and models give support to – The modeling of such properties – To the checking of conflicts at design time  To present the preliminary version of the normative modeling language called NormML

Properties and Characteristics of a Norm  Based on the study of 10 specification and implementation languages for norms  Premise: Norms restrict the behavior of system entities during a period of time and define the sanctions applied when violated or fulfilled.  Static aspects: the key elements that compose a norm – Deontic concept, involved entities, actions, activation constraints, sanctions and context  Dynamic aspects – Creation, cancelation and delegation

Static Aspects  Deontic concept: the restriction kind – permission, obligation or prohibition  Entity whose behavior is being regulated: – agents, all agents playing a given role, an agent playing a given role or group of agents  Action/state being regulated: – communicative or non-communicative actions – state of the system  Activation/deactivation constraints: – the execution of an action, time intervals, achievement of system state or the activation/deactivation/fulfillment/violation of a norm  Sanction: – punishments or rewards  Context: – Organization, environment, interaction or scene

Outline  Introduction  Goals of the paper  Background –Metamodeling –RBAC –SecureUML+ComponentUML  NormML  Validating Norms –Well-formed rules –Checking for conflicts  Conclusion

Background  Metamodels: define the vocabulary used by the modeling languages – Models are instances of metamodels – Well-formed rules: invariants of the metamodel that guarantees the consistency of the models to its metamodel  Role Based Access Control (RBAC) – security policies specify the permissions that a user has under a given role, while trying to access system resources

Background  SecureUML+ComponentUML – Designed specifically for RBAC modeling – Well-defined syntax – Has a formal semantics

Outline  Introduction  Goals of the paper  Background –Metamodeling –RBAC –SecureUML+ComponentUML  NormML  Validating Norms –Well-formed rules –Checking for conflicts  Conclusion

NormML: a normative modeling language

Deontic Concepts  Obligation  Prohibition  Permission

Involved Entities  Role  Agent  Agent playing Role  Organization

ActionsI/II  Each resource kind is related to a set of actions that can be used to control the access to the resource.  Atomic and composite actions ResourceActions Entitycreate, read, update, delete, full access Attributeread, update, full access Methodexecute AssociationEndread, update, full access AgentActionexecute Messagesend, receive, full access

ActionsI/II

Activation / Deactivation Constraint  Norm is active during a certain period of time delimited by –The execution of actiond –The achievement of deadlined –The achievement of a given state

Sanctions  Punishment if the agent violates the norm  Reward if the agent fulfils the norm

Context  The scope of the norm –The organization where the norm is defined –The environment where the norm is defined

ExampleI/II  N1: All agents executing in the context of the environment MarketPlace are prohibited to read and update— attributeFullAccess—the attribute price of the entity good.

ExampleII/II  N2: Sellers are permitted, in the context of the organization WebStore that inhabits the environment MarketPlace, to update the attribute price of the entity good before it opens for sale.

Outline  Introduction  Goals of the paper  Background –Metamodeling –RBAC –SecureUML+ComponentUML  NormML  Validating Norms –Well-formed rules –Checking for conflicts  Conclusion

Vadating the NormsI/III 1.Well-formed rules –Invariants of the metamodel that its models must fulfill –Written in OCL a)E.g.:The resource Attribute can only be linked to the actions AtomicRead, AtomicUpdate and AttributeFullAccess b)E.g.:The resource AgentAction can only be linked to the action AtomicExecute

Validating the NormsII/III 2.Checking for conflicts between norms a)Deontic concept: –Obligation x prohibition –Permission x prohibition –Permission x obligation in the period the permission is not activated b)Entities whose behavior are being regulated: –agents, all agents playing a given role, an agent playing a given role or group of agents –between norms applied to the same entity; –between a norm defined to a role and a norm defined to an agent that can play a role; –between norms applied to different roles played by the same agent; –between the norms applied to roles in a hierarchy of roles;

Validating the NormsIII/III c)Actions/state being regulated: –the actions being regulated by the norms are of the same type on the same resource –one of the actions is an AtomicRead and the other an AtomicUpdate to the same attribute of an Entity or the same association end of an Association –one of the actions is an AttributeFullAccess and the other is an AtomicRead or an AtomicUpdate to the same attribute of the same Entity – ….. d)Activation/deactivation constraints: –one of the norms is not restricted to any condition: it is always active –the periods established by the invariants Before, After, Between intersect

Example of Conflict organization WebStore is situation in environment MarketPlaceN1 is applied to all agents and N2 to agents playing the role Seller N1 is a prohibition and N2 a permission N1: attributeFullAccess N2: attributeUpdate N1: always activated N2: before clause

Outline  Introduction  Goals of the paper  Background –Metamodeling –RBAC –SecureUML+ComponentUML  NormML  Validating Norms –Well-formed rules –Checking for conflicts  Conclusion

Conclusion  None of the analyzed modeling languages gives support to the modeling of the main elements that compose a norm  Such elements were found out after studing 10 specification and implementation languages –Current version of NormML is able to model all the elements that compose a norm  OCL invariants and queries are being implemented and checked by using EOS, a Java component which implements OCL2.0 evaluation on model scenarios  Future work: –To finish the algorith to check for conflicts –To finish the implementation of all well-formeness rules –....

A Modeling Language to Model Norms Thank!! Karen Figueiredo Viviane Torres da Silva {kfigueiredo, Universidade Federal Fluminense