Selective and locally controlled transport of privileges
ACM Transactions on Programming Languages and Systems (TOPLAS) - Lecture notes in computer science Vol. 174
Programming in Prolog (2nd ed.)
Programming in Prolog (2nd ed.)
A law-based approach to object-oriented programming
OOPSLA '87 Conference proceedings on Object-oriented programming systems, languages and applications
Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
Distributed algorithms and protocols
Distributed algorithms and protocols
Communication, scheduling, and resource management in SINA
Journal of Object-Oriented Programming
Computer networks
A software development environment for law-governed systems
SDE 3 Proceedings of the third ACM SIGSOFT/SIGPLAN software engineering symposium on Practical software development environments
PROCOL: a parallel object language with protocols
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
Controllable delegation: an exercise in law-governed systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
Configuration management by consensus: an application of law-governed systems
SDE 4 Proceedings of the fourth ACM SIGSOFT symposium on Software development environments
Software Engineering Journal - Special issue on software process and its support
Ensuring integrity by adding obligations to privileges
ICSE '85 Proceedings of the 8th international conference on Software engineering
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Grids: A new program structuring mechanism based on layered graphs
POPL '84 Proceedings of the 11th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Configuration management by consensus: an application of law-governed systems
SDE 4 Proceedings of the fourth ACM SIGSOFT symposium on Software development environments
Coordinating rule-based software processes with ESP
ACM Transactions on Software Engineering and Methodology (TOSEM)
AAAI '98/IAAI '98 Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence
Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Law-governed peer-to-peer auctions
Proceedings of the 11th international conference on World Wide Web
Yeast: A General Purpose Event-Action System
IEEE Transactions on Software Engineering
Establishing Enterprise Communities
EDOC '01 Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing
Regulating Work in Digital Enterprises: A Flexible Managerial Framework
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
Scalable Regulation of Inter-enterprise Electronic Commerce
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
On the role of roles: from role-based to role-sensitive access control
Proceedings of the ninth ACM symposium on Access control models and technologies
COLING '92 Proceedings of the 14th conference on Computational linguistics - Volume 2
Decentralized Peer-to-Peer Auctions
Electronic Commerce Research
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
The concept of decentralized and secure electronic marketplace
Electronic Commerce Research
Informing Regulatory Dynamics in Open MASs
Coordination, Organizations, Institutions, and Norms in Agent Systems II
Specifying norm-governed computational societies
ACM Transactions on Computational Logic (TOCL)
On shouting "Fire!": regulating decoupled communication in distributed systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
On partially controlled multi-agent systems
Journal of Artificial Intelligence Research
IJCAI'01 Proceedings of the 17th international joint conference on Artificial intelligence - Volume 2
Regularity-based trust in cyberspace
iTrust'03 Proceedings of the 1st international conference on Trust management
Establishing global properties of multi-agent systems via local laws
E4MAS'06 Proceedings of the 3rd international conference on Environments for multi-agent systems III
Providing contextual norm information in open multi-agent systems
AOIS'06 Proceedings of the 8th international Bi conference on Agent-oriented information systems IV
In vivo evolution of policies that govern a distributed system
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Bridging the gap between inter-communication boundary and internal trusted components
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Hi-index | 0.00 |
In order to facilitate enforcement of protocols, an architecture for distributed systems is introduced under which all interactions between objects are governed by an explicit and strictly enforced set of rules, called the law of the system. This law is global in the sense that all the objects of the system are made to obey it, but the maintenance of the law and its enforcement are performed locally, at each object (or node). The term law is used to emphasized that it not only provides the specification of protocols, but actually governs the system by enforcing them. In other words, under this architecture a protocol can be established simply by writing it into the law of a system, without having to worry about the programs that drive the various objects that might populate that system. The law, then, is the enforced specification of protocols. It is shown that various familiar protocols can be established under this architecture. A technique for online distributed updating of the global law of a system is presented.