A Theory of Agreements and Protection

We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their obligations as event structures. We define a general notion of agreement, by interpreting contracts as multi-player concurrent games. A participan...

Full description

Saved in:
Bibliographic Details
Published inPrinciples of Security and Trust pp. 186 - 205
Main Authors Bartoletti, Massimo, Cimoli, Tiziana, Zunino, Roberto
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
Abstract We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their obligations as event structures. We define a general notion of agreement, by interpreting contracts as multi-player concurrent games. A participant agrees on a contract if she has a strategy to reach her objectives (or make another participant chargeable for a violation), whatever the moves of her adversaries. We then tackle the problem of protection. A participant is protected by a contract when she has a strategy to defend herself in all possible contexts, even in those where she has not reached an agreement. We show that, in a relevant class of contracts, agreements and protection mutually exclude each other. We then propose a novel formalism for modelling contractual obligations: event structures with circular causality. Using this model, we show how to construct contracts which guarantee both agreements and protection.
AbstractList We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their obligations as event structures. We define a general notion of agreement, by interpreting contracts as multi-player concurrent games. A participant agrees on a contract if she has a strategy to reach her objectives (or make another participant chargeable for a violation), whatever the moves of her adversaries. We then tackle the problem of protection. A participant is protected by a contract when she has a strategy to defend herself in all possible contexts, even in those where she has not reached an agreement. We show that, in a relevant class of contracts, agreements and protection mutually exclude each other. We then propose a novel formalism for modelling contractual obligations: event structures with circular causality. Using this model, we show how to construct contracts which guarantee both agreements and protection.
Author Bartoletti, Massimo
Cimoli, Tiziana
Zunino, Roberto
Author_xml – sequence: 1
  givenname: Massimo
  surname: Bartoletti
  fullname: Bartoletti, Massimo
  organization: Università degli Studi di Cagliari, Italy
– sequence: 2
  givenname: Tiziana
  surname: Cimoli
  fullname: Cimoli, Tiziana
  organization: Università degli Studi di Cagliari, Italy
– sequence: 3
  givenname: Roberto
  surname: Zunino
  fullname: Zunino, Roberto
  organization: Università di Trento and COSBI, Italy
BookMark eNotkMtOwzAQRQ0UibTkD1hkw9Iw44lfy6qigFQJFmVtOYlTysNGSTb8PW7p3VzpjDTSuXM2iykGxm4Q7hBA31ttOHFVC07KEHB0CGeszJgyPDI8ZwUqRE5U2ws2Px2ENTNWAIHgVtd0xcpx_IAco8HUVLDbZbV9D2n4rVJfLXdDCN8hTmPlY1e9DmkK7bRP8Zpd9v5rDOWpF-xt_bBdPfHNy-PzarnhLUmYeFBa6tYjoKLOk22ksSjBQNMK34HtgxW-rTVYNEEKK4LREhvZda2UfaNowcT_3_Fn2MddGFyT0ueYdd1hCJeNHbms5o7S7jAE_QFFEEua
CitedBy_id crossref_primary_10_4204_EPTCS_131_2
crossref_primary_10_4204_EPTCS_166_9
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2013
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2013
DOI 10.1007/978-3-642-36830-1_10
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783642368301
3642368301
EISSN 1611-3349
Editor Mitchell, John C.
Basin, David
Editor_xml – sequence: 1
  givenname: David
  surname: Basin
  fullname: Basin, David
  email: basin@inf.ethz.ch
– sequence: 2
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  email: mitchell@cs.stanford.edu
EndPage 205
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-c350t-e6757ca10163da39b58915080bc2ad09fe92ac470918e5292e8751b5ddc55fb63
ISBN 3642368298
9783642368295
ISSN 0302-9743
IngestDate Tue Jul 16 20:59:44 EDT 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c350t-e6757ca10163da39b58915080bc2ad09fe92ac470918e5292e8751b5ddc55fb63
OpenAccessLink https://link.springer.com/content/pdf/10.1007/978-3-642-36830-1_10.pdf
PageCount 20
ParticipantIDs springer_books_10_1007_978_3_642_36830_1_10
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings
PublicationTitle Principles of Security and Trust
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssj0000870843
ssj0002792
Score 2.0404518
Snippet We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their...
SourceID springer
SourceType Publisher
StartPage 186
SubjectTerms Circular Causality
Circular Dependency
Event Structure
Fair Play
Winning Strategy
Title A Theory of Agreements and Protection
URI http://link.springer.com/10.1007/978-3-642-36830-1_10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS8NAFB5cbh7cUVHJQU9lJM1kshw8FFFE1IutiJeQmUyglwZqevHX-83WVFsEvYQ0hEzyvuH1bd97hFzwOsvgdnCaslzSOBeSZnUd06RSMhOxioTpM_v0nNyP4oc3_tbN2DTsklZcyc-VvJL_oIprwFWzZP-A7PyhuIBz4IsjEMbxh_H7Pcxqm174MLkpxnhxc-hMMmCoiRRdjHLaNkDH5u2fYCwDnnnqAeeWID0cf2KnzJX0-2wyNlO5Xe11s7i3Bo7Sb8xYOOzK8uQc8aA11V0WbS0G9XH96DIVz01rCsB6fpiE1y1LgcbeL324DCcEBlqSRXZ0pqdmQe3CcbGaTFlNm-j-icz2K3Xas--7YltdavjYyzp-sawDi1GsxkLaLzTRbj3Nodo2B7cPj6_zUFsInWSm2rg_aN0z0SaX7Ftpyo9_68w2Zeq-YoFuuWrJpQS6sUuGO2RLc1UCTSKBMHfJmprskW0v3MAJd59cDgKLWNDUQYdYAMSCDrEDMrq7Hd7cUzcgg0rGw5YqeHupLHUAhlUly4UeEQmLOxQyKqswr1UelTJOYRNmikd5pOCd9gWvKsl5LRJ2SDYmzUQdkSBWKhEpHlX381iUQuA3T8NKMVHHmZTHpOe_s9Bb_qPw_a4hlYIVkEphpFJoqZz86e5TstFOZ-oM1l0rzh16XyZLSE4
link.rule.ids 785,786,790,799,27958
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Principles+of+Security+and+Trust&rft.au=Bartoletti%2C+Massimo&rft.au=Cimoli%2C+Tiziana&rft.au=Zunino%2C+Roberto&rft.atitle=A+Theory+of+Agreements+and+Protection&rft.series=Lecture+Notes+in+Computer+Science&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642368295&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=186&rft.epage=205&rft_id=info:doi/10.1007%2F978-3-642-36830-1_10
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon