Skip to main content

Role Assignment in Institutional Clouds for Rule-Based Enterprise Management

  • Conference paper
Rule-Based Modeling and Computing on the Semantic Web (RuleML 2011)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7018))

  • 817 Accesses

Abstract

In the context of engineering cloud computing applications for enterprise management, we want to represent a theory of institutions and role assignment in terms of a formal specification of rule-based action and agency. We consider how a tripartite distinction of institutional rules, as either constitutional-, collective- and operational-choice rules, can be mapped to a protocol stack for dynamic specifications. The mapping is illustrated with a specification and animation of changeable role assignment protocols, in which both institutional rules and institutional change are given a uniform and integrated specification in a formal action language. This shows how institutionalised principles of collective action can be transformed into runtime rule-based reasoning for self-organisation of ‘institutional clouds’ for enterprise management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ardagna, D., Panicucci, B., Passacantando, M.: A game theoretic formulation of the service provisioning problem in cloud systems. In: WWW 2011, pp. 177–186 (2011)

    Google Scholar 

  2. Artikis, A.: Dynamic protocols for open agent systems. In: Proc. AAMAS 2009, pp. 97–104. IFAAMAS (2009)

    Google Scholar 

  3. Artikis, A., Sergot, M., Pitt, J.: Specifying norm-governed computational societies. ACM Transactions on Computational Logic 10(1), 1–42 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  4. Birman, K., Chockler, G., van Renesse, R.: Toward a cloud computing research agenda. SIGACT News 40(2), 68–80 (2009)

    Article  Google Scholar 

  5. Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 1–38 (2009)

    Article  MATH  Google Scholar 

  6. Easwaran, A., Pitt, J.: Supply chain formation in open, market-based multi-agent systems. International Journal of Computational Intelligence and Applications 2(3), 349–363 (2002)

    Article  Google Scholar 

  7. Garey, M., Johnson, D., Sethi, R.: The complexity of flowshop and jobshop scheduling. Mathematics of Operations Research 1(2), 117–129 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  8. Jones, A., Sergot, M.: A formal characterisation of institutionalised power. Journal of the IGPL 4(3), 427–443 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  9. Kowalski, R., Sergot, M.: A logic-based calculus of events. New Generation Computing 4, 67–95 (1986)

    Article  Google Scholar 

  10. Ostrom, E.: Governing the Commons. CUP (1990)

    Google Scholar 

  11. Pitt, J., Schaumeier, J., Artikis, A.: The axiomatisation of socio-economic principles for self-organising systems. In: Proceedings SASO 2011 (2011)

    Google Scholar 

  12. Pudjianto, D., Ramsay, C., Strbac, G.: Microgrids and virtual power plants: concepts to support the integration of distributed energy resources. Proc. IMechE, A: J. of Power and Energy 222, 731–741 (2008)

    Article  Google Scholar 

  13. Sadighi Firozabadi, B., Sergot, M.: Contractual access control. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 96–103. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: Toward a unified standard. In: 5th ACM Workshop Role-Based Access Control, RBAC 2000, pp. 47–63 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pitt, J., Schaumeier, J., Artikis, A. (2011). Role Assignment in Institutional Clouds for Rule-Based Enterprise Management. In: Olken, F., Palmirani, M., Sottara, D. (eds) Rule-Based Modeling and Computing on the Semantic Web. RuleML 2011. Lecture Notes in Computer Science, vol 7018. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24908-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24908-2_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24907-5

  • Online ISBN: 978-3-642-24908-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics