16,166 research outputs found

    Hypergame Analysis in E-Commerce: A Preliminary Report

    Get PDF
    In usual game theory, it is normally assumed that "all the players see the same game", i.e., they are aware of each other's strategies and preferences. This assumption is very strong for real life where differences in perception affecting the decision making process seem to be the rule rather the exception. Attempts have been made to incorporate misperceptions of various types, but most of these attempts are based on quantities (as probabilities, risk factors, etc.) which are too subjective in general. One approach that seems to be very attractive is to consider that the players are trying to play "different games" in a hypergame. In this paper, we present a hypergame approach as an analysis tool in the context of multiagent environments. Precisely, we first sketch a brief formal introduction to hypergames. Then we explain how agents can interact through communication or through a mediator when they have different views and particularly misperceptions on others' games. After that, we show how agents can take advantage of misperceptions. Finally, we conclude and present some future work. Dans les jeux classiques, il est supposĂ© que "tous les joueurs voient le mĂȘme jeu'', i.e., que les joueurs sont au courant des stratĂ©gies et des prĂ©fĂ©rences des uns et des autres. Aux vu des applications rĂ©elles, cette supposition est trĂšs forte dans la mesure oĂč les diffĂ©rences de perception affectant la prise de dĂ©cision semblent plus relevĂ©es de la rĂšgle que de l'exception. Des tentatives ont Ă©tĂ© faites, par le passĂ©, pour incorporer les distorsions aux niveaux des perceptions, mais la plupart de ces tentatives ont Ă©tĂ© essentiellement basĂ©es sur le "quantitatif" (comme les probabilitĂ©s, les facteurs de risques, etc.) et par consĂ©quent, trop subjectives en gĂ©nĂ©ral. Une approche qui semble ĂȘtre attractive pour pallier Ă  cela, consiste Ă  voir les joueurs comme jouant "diffĂ©rents jeux'' dans une sorte d'hyper-jeu. Dans ce papier, nous prĂ©sentons une approche "hyper-jeu'' comme outil d'analyse entre agents dans le cadre d'un environnement multi-agent. Nous donnons un aperçu (trĂšs succinct) de la formalisation d'un tel hyper-jeux et nous expliquerons ensuite, comment les agents pourraient intervenir via un agent-mĂ©diateur quand ils ont des perceptions diffĂ©rentes. AprĂšs cela, nous expliquerons comment les agents pourraient tirer avantage des perceptions diffĂ©rentes.Game Theory, Hypergame, Mediation, ThĂ©orie des jeux, hyper-jeux, mĂ©diation

    Trust and Risk in Business Networks: Towards a Due Diligence for Electronic Commerce

    Get PDF
    This paper develops a due diligence for electronic transactions with new partners in business networks with complex goods such as food products to enable the use of e-commerce potentials in first time transactions. The e-commerce due diligence is a means to reduce perceived risks and uncertainties for businesses and create trust and confidence in the electronic transaction with appropriate information. The paper presents a conceptual framework for the due diligence integrating the principles of transaction decision making and the four phases of a transaction process. The operationalization of the framework assigns trust signals and control elements to the four process phases to be communicated during the process.Trust, risk, electronic commerce, first time transactions, due diligence, food networks, Agribusiness, Institutional and Behavioral Economics, Marketing,

    Federated Robust Embedded Systems: Concepts and Challenges

    Get PDF
    The development within the area of embedded systems (ESs) is moving rapidly, not least due to falling costs of computation and communication equipment. It is believed that increased communication opportunities will lead to the future ESs no longer being parts of isolated products, but rather parts of larger communities or federations of ESs, within which information is exchanged for the benefit of all participants. This vision is asserted by a number of interrelated research topics, such as the internet of things, cyber-physical systems, systems of systems, and multi-agent systems. In this work, the focus is primarily on ESs, with their specific real-time and safety requirements. While the vision of interconnected ESs is quite promising, it also brings great challenges to the development of future systems in an efficient, safe, and reliable way. In this work, a pre-study has been carried out in order to gain a better understanding about common concepts and challenges that naturally arise in federations of ESs. The work was organized around a series of workshops, with contributions from both academic participants and industrial partners with a strong experience in ES development. During the workshops, a portfolio of possible ES federation scenarios was collected, and a number of application examples were discussed more thoroughly on different abstraction levels, starting from screening the nature of interactions on the federation level and proceeding down to the implementation details within each ES. These discussions led to a better understanding of what can be expected in the future federated ESs. In this report, the discussed applications are summarized, together with their characteristics, challenges, and necessary solution elements, providing a ground for the future research within the area of communicating ESs

    Contracts in e-commerce

    Get PDF

    Security Framework for Agent-Based Cloud Computing

    Get PDF
    Agent can play a key role in bringing suitable cloud services to the customer based on their requirements. In agent based cloud computing, agent does negotiation, coordination, cooperation and collaboration on behalf of the customer to make the decisions in efficient manner. However the agent based cloud computing have some security issues like (a.) addition of malicious agent in the cloud environment which could demolish the process by attacking other agents, (b.) denial of service by creating flooding attacks on other involved agents. (c.) Some of the exceptions in the agent interaction protocol such as Not-Understood and Cancel_Meta protocol can be misused and may lead to terminating the connection of all the other agents participating in the negotiating services. Also, this paper proposes algorithms to solve these issues to ensure that there will be no intervention of any malicious activities during the agent interaction

    Automating decisions for inter-enterprise collaboration management

    Get PDF
    Proceeding volume: 283/2008The current trend towards networked business forces enterprises to enter federated, loosely-coupled business networks, since much of the competition takes place between networks and value nets. The Pilarcos E2B interoperability middleware supports trend by providing services such as business service discovery and selection, interoperability management, eContracting and reputation-based trust management. Although these services automate the interoperability knowledge management and interoperability. testing, and may help in routine decisions, an essential element of the architecture involves oil expert system that automates or supports decisions oil joining collaborations, acting in them, or leaving them. The expert system focuses oil a single enterprise needs. This paper focuses on the ways of governing the automation level in the expert system in a way suitable for autonomous enterprises to control their participation in agile collaborations.Peer reviewe

    Adding X-security to Carrel: security for agent-based healthcare applications

    Get PDF
    The high growth of Multi-Agent Systems (MAS) in Open Networks with initiatives such as Agentcities1 requires development in many different areas such as scalable and secure agent platforms, location services, directory services, and systems management. In our case we have focused our effort on security for agent systems. The driving force of this paper is provide a practical vision of how security mechanisms could be introduced for multi-agent applications. Our case study for this experiment is Carrel [9]: an Agent-based application in the Organ and Tissue transplant domain. The selection of this application is due to its characteristics as a real scenario and use of high-risk data for example, a study of the 21 most visited health-related web sites on the Internet discovered that personal information provided at many of the sites was being inadvertently leaked for unauthorized persons. These factors indicate to us that Carrel would be a suitable environment in order to test existing security safeguards. Furthermore, we believe that the experience gathered will be useful for other MAS. In order to achieve our purpose we describe the design, architecture and implementation of security elements on MAS for the Carrel System.Postprint (published version

    A methodology for maintaining trust in virtual environments

    Get PDF
    The increasing interest in carrying out business in virtual environments has resulted in much research and discussion of trust establishment between the entities involved. Researchers over the years have acknowledged that the success of any transaction or interaction via the virtual medium is determined by the trust level between trusting agent and trusted agent. Numerous publications have attempted to address the various challenges of assigning a trust level and building trust in an interacting party. However, the building and allocating a value of trust is neither easy nor quick. It involves high cost and effort. Hence, the ensuing research challenge is how to maintain the trust that has been established and assigned. Due to the dynamic nature of trust, the trust evolution, and the fragility of trust in virtual environments, one of the most pressing challenges facing the research community is how trust can be maintained over time. This thesis is an effort in that direction. Specifically, the objective of this thesis is to propose a methodology for trust maintenance in virtual environments which we term “Trust Maintenance Methodology” (TMM). The methodology comprises five frameworks that can be used to achieve the objective of trust maintenance.In order to achieve the aforesaid objective, this thesis proposes a: (a) Framework for third party agent selection, (b) Framework for Formalization and Negotiation of service requirements, (c) Framework for Proactive Continuous Performance Monitoring, (d) Framework for Incentive Mechanism, and (e) Framework for Trust Re-calibration.The framework for third party agent selection is used for choosing and selecting a neutral agent who will supervise the interaction between two parties. This is the first step of our methodology. The neutral agent is involved throughout the course of the interaction between two parties and takes a proactive-corrective role in continuous performance monitoring. Once both parties have chosen a neutral agent, they carry out a formalization and negotiation process of their service requirements using our proposed framework. This is in order to create an SLA which will guide the interaction between two parties. The framework for proactive continuous performance monitoring then can be used to evaluate the performance of both parties in delivering their service based on the SLA. If a performance gap occurs during the course of transaction, the third party agent will take action to help both parties close the performance gap in a timely manner. A key salient feature of our continuous performance monitoring is that it is proactive-corrective. Additionally, we design a framework for providing an incentive during the course of interaction to motivate both parties to perform as closely as possible to the terms of the mutual agreement or SLA. By the end of the interaction time space, both parties will be able to re-assess or re-calibrate their trust level using our proposed framework for trust re-calibration.Finally, in order to validate our proposed methodology, we engineered a multi-agent system to simulate the validity of the TMM. Numerous case studies are presented to elucidate the workings of our proposed methodology. Moreover, we run several experiments under various testing conditions including boundary conditions. The results of experiments show that our methodology is effective in assisting the parties to maintain their trust level in virtual environments
    • 

    corecore