Abstract
Finding the entity responsible for an unpleasant situation is often difficult, especially in artificial agent societies.
SCIFF is a formalization of agent societies, including a language to describe rules and protocols, and an abductive proof procedure for compliance checking. However, how to identify the entity responsible for a violation is not always clear.
In this work, a definition of accountability for artificial societies is formalized in SCIFF. Two tools are provided for the designer of interaction protocols: a guideline, in terms of syntactic features that ensure accountability of the protocol, and an algorithm (implemented in a software tool) to investigate if, for a given protocol, nonaccountability issues could arise.
- Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Marco Montali. 2006a. An abductive framework for a-priori verification of Web services. In Proceedings of the 8th Symposium on Principles and Practice of Declarative Programming. 39--50. Google ScholarDigital Library
- Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, Marco Montali, Sergio Storari, and Paolo Torroni. 2006. Computational logic for run-time verification of Web services choreographies: Exploiting the SOCS-SI tool. In Proceedings of Web Services and Formal Methods: The 3rd International Workshop (WS-FM’06). 58--72. Google ScholarDigital Library
- Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, Marco Montali, and Paolo Torroni. 2007. A rule-based approach for reasoning about collaboration between smart Web services. In Web Reasoning and Rule Systems. Lecture Notes in Computer Science, Vol. 4524. Springer, 279--288. Google ScholarDigital Library
- Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2006b. Compliance verification of agent interaction: A logic-based software tool. Applied Artificial Intelligence 20, 2--4, 133--157.Google ScholarCross Ref
- Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2006c. Security protocols verification in abductive logic programming: A case study. In Engineering Societies in the Agents World VI. Lecture Notes in Artificial Intelligence, Vol. 3963. Springer, 106--124. Google ScholarDigital Library
- Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2008. Verifiable agent interaction in abductive logic programming: The SCIFF framework. ACM Transactions on Computational Logic 9, 4, 29:1--29:43. Google ScholarDigital Library
- Marco Alberti, Anna Ciampolini, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2003. A social ACL semantics by deontic constraints. In Multi-Agent Systems and Applications III. Lecture Notes in Artificial Intelligence, Vol. 2691. Springer, 204--213. Google ScholarDigital Library
- Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, Giovanni Sartor, and Paolo Torroni. 2006d. Mapping deontic operators to abductive expectations. Computational and Mathematical Organization Theory 12, 2--3, 205--225. Google ScholarDigital Library
- Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. 2004. Modeling interactions using social integrity constraints: A resource sharing case study. In Declarative Agent Languages and Technologies. Lecture Notes in Artificial Intelligence, Vol. 2990. Springer, 243--262.Google Scholar
- Marco Alberti, Marco Gavanelli, Evelina Lamma, Giovanni Sartor, and Paolo Torroni. 2006e. Un sistema basato su logica computazionale per il trattamento degli operatori deontici. In La Gestione e la Negoziazione Automatica dei Diritti sulle Opere dell’Ingegno Digitali: Aspetti Giuridici e Informatici, S. Bisi and C. di Cocco (Eds.). Gedit, Bologna, Italy, 1--33.Google Scholar
- Matteo Baldoni, Cristina Baroglio, Elisa Marengo, and Viviana Patti. 2012. Supporting the analysis of risks of violation in business protocols: The MiFID case study. In Information Systems: Crossroads for Organization, Management, Accounting and Engineering. Physica-Verlag HD, Heidelberg, Germany, 545--553.Google Scholar
- Matteo Baldoni, Cristina Baroglio, Katherine M. May, Roberto Micalizio, and Stefano Tedeschi. 2016. Computational accountability. In Proceedings of the CEUR Workshop on Deep Understanding and Reasoning: A Challenge for Next-Generation Intelligent Agents.Google Scholar
- Armin Biere, Alessandro Cimatti, Edmund M. Clarke, Ofer Strichman, and Yunshan Zhu. 2003. Bounded model checking. Advances in Computers 58, 117--148.Google ScholarCross Ref
- Olivier Boissier, Marco Colombetti, Michael Luck, John-Jules Ch. Meyer, and Axel Polleres. 2013. Norms, organizations, and semantics. Knowledge Engineering Review 28, 1, 107--116.Google ScholarCross Ref
- Mark Bovens. 1998. The Quest for Responsibility: Accountability and Citizenship in Complex Organizations. Cambridge University Press, Cambridge, MA.Google Scholar
- C. Castelfranchi. 1995. Commitments: From individual intentions to groups and organizations. In Proceedings of the 1st International Conference on Multiagent Systems. 41--48.Google Scholar
- J. G. Cederquist, R. Conn, M. A. C. Dekker, S. Etalle, and J. I. den Hartog. 2005. An audit logic for accountability. In Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’05). IEEE, Los Alamitos, CA, 34--43. Google ScholarDigital Library
- Federico Chesani, Paola Mello, Marco Montali, and Sergio Storari. 2007. Testing careflow process execution conformance by translating a graphical language to computational logic. In Proceedings of the 11th Conference on Artificial Intelligence in Medicine (AIME’07). 479--488. Google ScholarDigital Library
- Federico Chesani, Paola Mello, Marco Montali, and Paolo Torroni. 2011. Modeling and verifying business processes and choreographies through the abductive proof procedure SCIFF and its extensions. Intelligenza Artificiale 5, 1, 101--105.Google ScholarCross Ref
- Amit K. Chopra and Munindar P. Singh. 2014. The thing itself speaks: Accountability as a foundation for requirements in sociotechnical systems. In Proceedings of the IEEE 7th International Workshop on Requirements Engineering and Law (RELAW’14). IEEE, Los Alamitos, CA, 22.Google Scholar
- Anna Ciampolini, Paola Mello, Marco Montali, and Sergio Storari. 2005. Using social integrity constraints for on-the-fly compliance verification of medical protocols. In Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems (CBMS’05). IEEE, Los Alamitos, CA, 503--505. Google ScholarDigital Library
- B. Cox, J. D. Tygar, and M. Sirbu. 1995. NetBill security and transaction protocol. In Proceedings of the 1st USENIX Workshop on Electronic Commerce. Google ScholarDigital Library
- Thomas Eiter and Georg Gottlob. 1995. The complexity of logic-based abduction. Journal of the ACM 42, 1, 3--42. Google ScholarDigital Library
- N. Fornara and M. Colombetti. 2003. Defining interaction protocols using a commitment-based agent communication language. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’03). ACM, New York, NY, 520--527. Google ScholarDigital Library
- T. H. Fung and R. A. Kowalski. 1997. The IFF proof procedure for abductive logic programming. Journal of Logic Programming 33, 2, 151--165.Google ScholarCross Ref
- J. Jaffar and M. J. Maher. 1994. Constraint logic programming: A survey. Journal of Logic Programming 19--20, 503--582.Google ScholarCross Ref
- Özgür Kafalı, Nirav Ajmeri, and Munindar P. Singh. 2016. Revani: Revising and verifying normative specifications for privacy. IEEE Intelligent Systems 31, 5, 8--15.Google ScholarCross Ref
- Rajashekar Kailar. 1996. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering 22, 5, 313--328. Google ScholarDigital Library
- A. C. Kakas, R. A. Kowalski, and F. Toni. 1993. Abductive logic programming. Journal of Logic and Computation 2, 6, 719--770.Google ScholarCross Ref
- Marco Montali. 2010. Specification and Verification of Declarative Open Interaction Models: A Logic-Based Approach. Lecture Notes in Business Information Processing, Vol. 56. Springer.Google Scholar
- Roger M. Needham and Michael D. Schroeder. 1978. Using encryption for authentication in large networks of computers. Communications of the ACM 21, 12, 993--999. Google ScholarDigital Library
- Maja Pesic and Wil M. P. van der Aalst. 2006. A declarative approach for flexible business processes management. In Business Process Management Workshops. Lecture Notes in Computer Science, Vol. 4103. Springer, 169--180. Google ScholarDigital Library
- Fariba Sadri, Francesca Toni, and Paolo Torroni. 2003. Minimally intrusive negotiating agents for resource sharing. In Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI’03). 796--801. http://dl.acm.org/citation.cfm?id&equal;1630659.1630774 Google ScholarDigital Library
- Munindar P. Singh. 1998. Agent communication languages: Rethinking the principles. IEEE Computer 31, 12, 40--47. Google ScholarDigital Library
- Paolo Torroni, Federico Chesani, Paola Mello, Pinar Yolum, Munindar P. Singh, Marco Alberti, Marco Gavanelli, and Evelina Lamma. 2009. Modeling interactions via commitments and expectations. In Handbook of Research on Multi-Agent Systems: Semantics and Dynamics of Organizational Models, V. Dignum (Ed.). Information Science Reference, Hershey, PA, 263--284. http://www.igi-global.com/reference/details.asp?ID=33141Google Scholar
- Ibo Van de Poel, Lambèr Royakkers, and Sjoerd D. Zwart. 2015. Moral Responsibility and the Problem of Many Hands. Routledge.Google Scholar
- Jan Wielemaker, Tom Schrijvers, Markus Triska, and Torbjörn Lager. 2012. SWI-prolog. Theory and Practice of Logic Programming 12, 1--2, 67--96. Google ScholarDigital Library
Index Terms
- Accountable Protocols in Abductive Logic Programming
Recommendations
Verifiable agent interaction in abductive logic programming: The SCIFF framework
SCIFF is a framework thought to specify and verify interaction in open agent societies. The SCIFF language is equipped with a semantics based on abductive logic programming; SCIFF's operational component is a new abductive logic programming proof ...
Expressing and Verifying Business Contracts with Abductive Logic Programming
SCIFF is a declarative language, based on abductive logic programming, that accommodates forward rules, predicate definitions, and constraints over finite domain variables. Its abductive declarative semantics can be related to that of deontic operators; ...
AILP abductive inductive logic programming
IJCAI'95: Proceedings of the 14th international joint conference on Artificial intelligence - Volume 2Inductive Logic Programming (ILP) is often situated as a research area emerging at the intersection of Machine Learning and Logic Programming (LP). This paper makes the link more clear between ILP and LP, in particular, between ILP and Abductive Logic ...
Comments