A Theory of Agreements and Protection
We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their obligations as event structures. We define a general notion of agreement, by interpreting contracts as multi-player concurrent games. A participan...
Saved in:
Published in | Principles of Security and Trust pp. 186 - 205 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their obligations as event structures. We define a general notion of agreement, by interpreting contracts as multi-player concurrent games. A participant agrees on a contract if she has a strategy to reach her objectives (or make another participant chargeable for a violation), whatever the moves of her adversaries. We then tackle the problem of protection. A participant is protected by a contract when she has a strategy to defend herself in all possible contexts, even in those where she has not reached an agreement. We show that, in a relevant class of contracts, agreements and protection mutually exclude each other. We then propose a novel formalism for modelling contractual obligations: event structures with circular causality. Using this model, we show how to construct contracts which guarantee both agreements and protection. |
---|---|
AbstractList | We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their obligations as event structures. We define a general notion of agreement, by interpreting contracts as multi-player concurrent games. A participant agrees on a contract if she has a strategy to reach her objectives (or make another participant chargeable for a violation), whatever the moves of her adversaries. We then tackle the problem of protection. A participant is protected by a contract when she has a strategy to defend herself in all possible contexts, even in those where she has not reached an agreement. We show that, in a relevant class of contracts, agreements and protection mutually exclude each other. We then propose a novel formalism for modelling contractual obligations: event structures with circular causality. Using this model, we show how to construct contracts which guarantee both agreements and protection. |
Author | Bartoletti, Massimo Cimoli, Tiziana Zunino, Roberto |
Author_xml | – sequence: 1 givenname: Massimo surname: Bartoletti fullname: Bartoletti, Massimo organization: Università degli Studi di Cagliari, Italy – sequence: 2 givenname: Tiziana surname: Cimoli fullname: Cimoli, Tiziana organization: Università degli Studi di Cagliari, Italy – sequence: 3 givenname: Roberto surname: Zunino fullname: Zunino, Roberto organization: Università di Trento and COSBI, Italy |
BookMark | eNotkMtOwzAQRQ0UibTkD1hkw9Iw44lfy6qigFQJFmVtOYlTysNGSTb8PW7p3VzpjDTSuXM2iykGxm4Q7hBA31ttOHFVC07KEHB0CGeszJgyPDI8ZwUqRE5U2ws2Px2ENTNWAIHgVtd0xcpx_IAco8HUVLDbZbV9D2n4rVJfLXdDCN8hTmPlY1e9DmkK7bRP8Zpd9v5rDOWpF-xt_bBdPfHNy-PzarnhLUmYeFBa6tYjoKLOk22ksSjBQNMK34HtgxW-rTVYNEEKK4LREhvZda2UfaNowcT_3_Fn2MddGFyT0ueYdd1hCJeNHbms5o7S7jAE_QFFEEua |
CitedBy_id | crossref_primary_10_4204_EPTCS_131_2 crossref_primary_10_4204_EPTCS_166_9 |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2013 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2013 |
DOI | 10.1007/978-3-642-36830-1_10 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783642368301 3642368301 |
EISSN | 1611-3349 |
Editor | Mitchell, John C. Basin, David |
Editor_xml | – sequence: 1 givenname: David surname: Basin fullname: Basin, David email: basin@inf.ethz.ch – sequence: 2 givenname: John C. surname: Mitchell fullname: Mitchell, John C. email: mitchell@cs.stanford.edu |
EndPage | 205 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-c350t-e6757ca10163da39b58915080bc2ad09fe92ac470918e5292e8751b5ddc55fb63 |
ISBN | 3642368298 9783642368295 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 16 20:59:44 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c350t-e6757ca10163da39b58915080bc2ad09fe92ac470918e5292e8751b5ddc55fb63 |
OpenAccessLink | https://link.springer.com/content/pdf/10.1007/978-3-642-36830-1_10.pdf |
PageCount | 20 |
ParticipantIDs | springer_books_10_1007_978_3_642_36830_1_10 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin, Heidelberg |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSubtitle | Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings |
PublicationTitle | Principles of Security and Trust |
Publisher | Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin Heidelberg |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany |
SSID | ssj0000870843 ssj0002792 |
Score | 2.0404518 |
Snippet | We present a theory of contracts. Contracts are interacting processes with an explicit notion of obligations and objectives. We model processes and their... |
SourceID | springer |
SourceType | Publisher |
StartPage | 186 |
SubjectTerms | Circular Causality Circular Dependency Event Structure Fair Play Winning Strategy |
Title | A Theory of Agreements and Protection |
URI | http://link.springer.com/10.1007/978-3-642-36830-1_10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS8NAFB5cbh7cUVHJQU9lJM1kshw8FFFE1IutiJeQmUyglwZqevHX-83WVFsEvYQ0hEzyvuH1bd97hFzwOsvgdnCaslzSOBeSZnUd06RSMhOxioTpM_v0nNyP4oc3_tbN2DTsklZcyc-VvJL_oIprwFWzZP-A7PyhuIBz4IsjEMbxh_H7Pcxqm174MLkpxnhxc-hMMmCoiRRdjHLaNkDH5u2fYCwDnnnqAeeWID0cf2KnzJX0-2wyNlO5Xe11s7i3Bo7Sb8xYOOzK8uQc8aA11V0WbS0G9XH96DIVz01rCsB6fpiE1y1LgcbeL324DCcEBlqSRXZ0pqdmQe3CcbGaTFlNm-j-icz2K3Xas--7YltdavjYyzp-sawDi1GsxkLaLzTRbj3Nodo2B7cPj6_zUFsInWSm2rg_aN0z0SaX7Ftpyo9_68w2Zeq-YoFuuWrJpQS6sUuGO2RLc1UCTSKBMHfJmprskW0v3MAJd59cDgKLWNDUQYdYAMSCDrEDMrq7Hd7cUzcgg0rGw5YqeHupLHUAhlUly4UeEQmLOxQyKqswr1UelTJOYRNmikd5pOCd9gWvKsl5LRJ2SDYmzUQdkSBWKhEpHlX381iUQuA3T8NKMVHHmZTHpOe_s9Bb_qPw_a4hlYIVkEphpFJoqZz86e5TstFOZ-oM1l0rzh16XyZLSE4 |
link.rule.ids | 785,786,790,799,27958 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Principles+of+Security+and+Trust&rft.au=Bartoletti%2C+Massimo&rft.au=Cimoli%2C+Tiziana&rft.au=Zunino%2C+Roberto&rft.atitle=A+Theory+of+Agreements+and+Protection&rft.series=Lecture+Notes+in+Computer+Science&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642368295&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=186&rft.epage=205&rft_id=info:doi/10.1007%2F978-3-642-36830-1_10 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |