skip to main content
research-article

Accountable Protocols in Abductive Logic Programming

Published:24 April 2018Publication History
Skip Abstract Section

Abstract

Finding the entity responsible for an unpleasant situation is often difficult, especially in artificial agent societies.

SCIFF is a formalization of agent societies, including a language to describe rules and protocols, and an abductive proof procedure for compliance checking. However, how to identify the entity responsible for a violation is not always clear.

In this work, a definition of accountability for artificial societies is formalized in SCIFF. Two tools are provided for the designer of interaction protocols: a guideline, in terms of syntactic features that ensure accountability of the protocol, and an algorithm (implemented in a software tool) to investigate if, for a given protocol, nonaccountability issues could arise.

References

  1. Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Marco Montali. 2006a. An abductive framework for a-priori verification of Web services. In Proceedings of the 8th Symposium on Principles and Practice of Declarative Programming. 39--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, Marco Montali, Sergio Storari, and Paolo Torroni. 2006. Computational logic for run-time verification of Web services choreographies: Exploiting the SOCS-SI tool. In Proceedings of Web Services and Formal Methods: The 3rd International Workshop (WS-FM’06). 58--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, Marco Montali, and Paolo Torroni. 2007. A rule-based approach for reasoning about collaboration between smart Web services. In Web Reasoning and Rule Systems. Lecture Notes in Computer Science, Vol. 4524. Springer, 279--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2006b. Compliance verification of agent interaction: A logic-based software tool. Applied Artificial Intelligence 20, 2--4, 133--157.Google ScholarGoogle ScholarCross RefCross Ref
  5. Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2006c. Security protocols verification in abductive logic programming: A case study. In Engineering Societies in the Agents World VI. Lecture Notes in Artificial Intelligence, Vol. 3963. Springer, 106--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2008. Verifiable agent interaction in abductive logic programming: The SCIFF framework. ACM Transactions on Computational Logic 9, 4, 29:1--29:43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Marco Alberti, Anna Ciampolini, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2003. A social ACL semantics by deontic constraints. In Multi-Agent Systems and Applications III. Lecture Notes in Artificial Intelligence, Vol. 2691. Springer, 204--213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, Giovanni Sartor, and Paolo Torroni. 2006d. Mapping deontic operators to abductive expectations. Computational and Mathematical Organization Theory 12, 2--3, 205--225. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2004. Modeling interactions using social integrity constraints: A resource sharing case study. In Declarative Agent Languages and Technologies. Lecture Notes in Artificial Intelligence, Vol. 2990. Springer, 243--262.Google ScholarGoogle Scholar
  10. Marco Alberti, Marco Gavanelli, Evelina Lamma, Giovanni Sartor, and Paolo Torroni. 2006e. Un sistema basato su logica computazionale per il trattamento degli operatori deontici. In La Gestione e la Negoziazione Automatica dei Diritti sulle Opere dell’Ingegno Digitali: Aspetti Giuridici e Informatici, S. Bisi and C. di Cocco (Eds.). Gedit, Bologna, Italy, 1--33.Google ScholarGoogle Scholar
  11. Matteo Baldoni, Cristina Baroglio, Elisa Marengo, and Viviana Patti. 2012. Supporting the analysis of risks of violation in business protocols: The MiFID case study. In Information Systems: Crossroads for Organization, Management, Accounting and Engineering. Physica-Verlag HD, Heidelberg, Germany, 545--553.Google ScholarGoogle Scholar
  12. Matteo Baldoni, Cristina Baroglio, Katherine M. May, Roberto Micalizio, and Stefano Tedeschi. 2016. Computational accountability. In Proceedings of the CEUR Workshop on Deep Understanding and Reasoning: A Challenge for Next-Generation Intelligent Agents.Google ScholarGoogle Scholar
  13. Armin Biere, Alessandro Cimatti, Edmund M. Clarke, Ofer Strichman, and Yunshan Zhu. 2003. Bounded model checking. Advances in Computers 58, 117--148.Google ScholarGoogle ScholarCross RefCross Ref
  14. Olivier Boissier, Marco Colombetti, Michael Luck, John-Jules Ch. Meyer, and Axel Polleres. 2013. Norms, organizations, and semantics. Knowledge Engineering Review 28, 1, 107--116.Google ScholarGoogle ScholarCross RefCross Ref
  15. Mark Bovens. 1998. The Quest for Responsibility: Accountability and Citizenship in Complex Organizations. Cambridge University Press, Cambridge, MA.Google ScholarGoogle Scholar
  16. C. Castelfranchi. 1995. Commitments: From individual intentions to groups and organizations. In Proceedings of the 1st International Conference on Multiagent Systems. 41--48.Google ScholarGoogle Scholar
  17. J. G. Cederquist, R. Conn, M. A. C. Dekker, S. Etalle, and J. I. den Hartog. 2005. An audit logic for accountability. In Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’05). IEEE, Los Alamitos, CA, 34--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Federico Chesani, Paola Mello, Marco Montali, and Sergio Storari. 2007. Testing careflow process execution conformance by translating a graphical language to computational logic. In Proceedings of the 11th Conference on Artificial Intelligence in Medicine (AIME’07). 479--488. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Federico Chesani, Paola Mello, Marco Montali, and Paolo Torroni. 2011. Modeling and verifying business processes and choreographies through the abductive proof procedure SCIFF and its extensions. Intelligenza Artificiale 5, 1, 101--105.Google ScholarGoogle ScholarCross RefCross Ref
  20. Amit K. Chopra and Munindar P. Singh. 2014. The thing itself speaks: Accountability as a foundation for requirements in sociotechnical systems. In Proceedings of the IEEE 7th International Workshop on Requirements Engineering and Law (RELAW’14). IEEE, Los Alamitos, CA, 22.Google ScholarGoogle Scholar
  21. Anna Ciampolini, Paola Mello, Marco Montali, and Sergio Storari. 2005. Using social integrity constraints for on-the-fly compliance verification of medical protocols. In Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems (CBMS’05). IEEE, Los Alamitos, CA, 503--505. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. Cox, J. D. Tygar, and M. Sirbu. 1995. NetBill security and transaction protocol. In Proceedings of the 1st USENIX Workshop on Electronic Commerce. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Thomas Eiter and Georg Gottlob. 1995. The complexity of logic-based abduction. Journal of the ACM 42, 1, 3--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Fornara and M. Colombetti. 2003. Defining interaction protocols using a commitment-based agent communication language. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’03). ACM, New York, NY, 520--527. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. T. H. Fung and R. A. Kowalski. 1997. The IFF proof procedure for abductive logic programming. Journal of Logic Programming 33, 2, 151--165.Google ScholarGoogle ScholarCross RefCross Ref
  26. J. Jaffar and M. J. Maher. 1994. Constraint logic programming: A survey. Journal of Logic Programming 19--20, 503--582.Google ScholarGoogle ScholarCross RefCross Ref
  27. Özgür Kafalı, Nirav Ajmeri, and Munindar P. Singh. 2016. Revani: Revising and verifying normative specifications for privacy. IEEE Intelligent Systems 31, 5, 8--15.Google ScholarGoogle ScholarCross RefCross Ref
  28. Rajashekar Kailar. 1996. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering 22, 5, 313--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. C. Kakas, R. A. Kowalski, and F. Toni. 1993. Abductive logic programming. Journal of Logic and Computation 2, 6, 719--770.Google ScholarGoogle ScholarCross RefCross Ref
  30. Marco Montali. 2010. Specification and Verification of Declarative Open Interaction Models: A Logic-Based Approach. Lecture Notes in Business Information Processing, Vol. 56. Springer.Google ScholarGoogle Scholar
  31. Roger M. Needham and Michael D. Schroeder. 1978. Using encryption for authentication in large networks of computers. Communications of the ACM 21, 12, 993--999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Maja Pesic and Wil M. P. van der Aalst. 2006. A declarative approach for flexible business processes management. In Business Process Management Workshops. Lecture Notes in Computer Science, Vol. 4103. Springer, 169--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Fariba Sadri, Francesca Toni, and Paolo Torroni. 2003. Minimally intrusive negotiating agents for resource sharing. In Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI’03). 796--801. http://dl.acm.org/citation.cfm?id&equal;1630659.1630774 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Munindar P. Singh. 1998. Agent communication languages: Rethinking the principles. IEEE Computer 31, 12, 40--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Paolo Torroni, Federico Chesani, Paola Mello, Pinar Yolum, Munindar P. Singh, Marco Alberti, Marco Gavanelli, and Evelina Lamma. 2009. Modeling interactions via commitments and expectations. In Handbook of Research on Multi-Agent Systems: Semantics and Dynamics of Organizational Models, V. Dignum (Ed.). Information Science Reference, Hershey, PA, 263--284. http://www.igi-global.com/reference/details.asp?ID=33141Google ScholarGoogle Scholar
  36. Ibo Van de Poel, Lambèr Royakkers, and Sjoerd D. Zwart. 2015. Moral Responsibility and the Problem of Many Hands. Routledge.Google ScholarGoogle Scholar
  37. Jan Wielemaker, Tom Schrijvers, Markus Triska, and Torbjörn Lager. 2012. SWI-prolog. Theory and Practice of Logic Programming 12, 1--2, 67--96. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Accountable Protocols in Abductive Logic Programming

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 18, Issue 4
            Special Issue on Computational Ethics and Accountability, Special Issue on Economics of Security and Privacy and Regular Papers
            November 2018
            348 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/3210373
            • Editor:
            • Munindar P. Singh
            Issue’s Table of Contents

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 April 2018
            • Accepted: 1 June 2017
            • Revised: 1 May 2017
            • Received: 1 January 2017
            Published in toit Volume 18, Issue 4

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader