A Multi-party Contract Model
|
|
|
- Patrick Matthews
- 9 years ago
- Views:
Transcription
1 A Multi-party Contract Model Lai Xu Department of Computer Science, Free University Contracts between multiple business parties play an increasingly important role in the global economy where activities along the value chain are executed by independent, yet co-operating, companies. Information technology to enact a value chain is now being deployed in the form of ERP systems, workflow systems, web services and e-marketplaces. However, there is little known on how to formally model a multi-party contract. In this paper, we investigate how to model a multi-party contract in a manner convenient for detecting the parties responsible for contract violations. Categories and Subject Descriptors: H.4.0 [Information Systems Applications]: General Additional Key Words and Phrases: E-contract, Contract violation, Detecting contract violation 1. INTRODUCTION Contracts between multiple business parties play an increasingly important role in the global economy where activities along the value chain are executed by independent, yet co-operating, companies. Information technology to enact a value chain is now being deployed in the form of ERP systems, workflow systems, web services and e-marketplaces. A bilateral contract is not able to describe multilateral contractual relations. Most research [Haugen 2002], [Dubray 2002] on multi-party contracts tries to break down a multi-party contract into a number of bilateral contracts. A main reason behind is that existing e-commerce environments only support bilateral executions. In some simple cases, the solution to supporting multi-party contract execution in current ecommerce environments, is to assume the whole business process goes correctly according a number of bilateral contracts. However, in complicated multiparty relationships, this conversion results in the loss or hiding of information about the complex multi-party relationships. Consequently this solution won t work for these complex multi-party contracts. In a bilateral contract execution process it is easy to find the responsible party for a contract violation. In a multi-party business process, a contract violation can be caused by a set of actions that should have occurred before. It can caused by direct and indirect contractual parties. This raises the problem of finding all Author s address: Lai Xu, Department of Computer Science, Free University, De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands. Permission to make digital/hard copy of all or part of this material without fee for personal or classroom use provided that the copies are not made or distributed for profit or commercial advantage, the ACM copyright/server notice, the title of the publication, and its date appear, and notice is given that copying is by permission of the ACM, Inc. To copy otherwise, to republish, to post on servers, or to redistribute to lists requires prior specific permission and/or a fee. c 2004 ACM /2004/ $5.00 ACM SIGecom Exchanges, Vol. 5, No. 1, , Pages
2 14 Lai Xu responsible partners for the contract violation. Our research thus focuses on how to model multi-party contracts for convenient detection of the parties responsible for a contract violation. Various authors have proposed electronic contract models or languages based on different views. Kimbrough and Moore formalize and extend speech act theory as Formal Language for Business Communication (FLBC)[Kimbrough and Moore 1997] [Moore 2000]. Deontic logic based contract models [Weigand et al. 1997] [Norman et al. 1998] [Lee 1998] [Tan and Thoen 1999] [Weigand and Xu 2001] describes obligations, permissions, and forbiddances for finishing a business process. Cross- Flow [Koetsier et al. 1999] and E-ADOME[Kafeza et al. 2001] use contracts for inter-organizational workflow process integration. Contracts in CrossFlow and E- ADOME describe the agreed workflow interfaces as activities and transitions, based on WfMC s WPDL (Workflow Process Definition Language). Contracts also specify what data objects in the remote workflow are readable or updateable. Grosof discussed a rule-based approach [Grosof and Poon 2003] to representation business contracts, which also deal with exceptions. They are a side effect of business automations, and as for now do not address the multi-party situation and particularly do not looking into detecting contract violations. In this paper, we present a multi-party contract model and provide how to detect responsible parties for a multi-party contract violation by using our model. In Section 2 a standard multi-party car insurance case [Project 1999] is used to explain our model and to show that in a multi-partner contract it is more important and more difficult to find the responsible parties for a contract violation than in a bilateral contract. Section 3 introduces our multi-party contract model. Contract violations are discussed in Section 4. A detection method of a contract violation is presented in Section 5. The paper ends with conclusions and a short discussion of further work in Section MULTI-PARTY CONTRACT CASE This case outlines the manner in which a car damage claim is handled by an insurance company (AGFIL). The contract parties work together to provide a service level which facilitates efficient claim settlement. The parties involved are called Euro Assist, Lee Consulting Services, Garages and Assessors. Euro Assist offers a 24-hour emergency call answering service to policyholders. Lee C.S. co-ordinates and manages the operation of the emergency service on a day-to-day level on behalf of AGFIL. Garages are responsible for car repair. Assessors conduct the physical inspections of damaged vehicles and agree upon repair figures with the garages. The general process of a car insurance case is described as follows: the policyholder phones Euro Assist using a toll-free phone number to notify a new claim. Euro Assist will register the information, suggest an appropriate garage, and notify AGFIL, which will check whether the policy is valid and covers this claim. After AGFIL receives this claim, AGFIL sends the claim details to Lee C.S. AGFIL will send a letter to the policyholder for a completed claim form. Lee C.S. will agree upon repair costs if an assessor is not required for small damages; otherwise, an assessor will be assigned. The assessor will check the damaged vehicle and agree upon repair costs with the garage. After receiving an agreement for repairing the
3 A Multi-party Contract Model 15 car from Lee C.S., the garage will then commence repairs. After finishing repairs, the garage will issue an invoice to Lee C.S., which will check the invoice against the original estimate. Lee C.S. returns all invoices to AGFIL. After AGFIL also receives the completed claim form from the policyholder, the payment is processed. In the whole process, if the claim is found invalid, all contractual parties will be contacted and the process will be stopped. There are many potential contract violations in this case, for example, after sending invoices to Lee C.S., the garage does not get money back from AGFIL. It could be caused by Lee C.S., because Lee C.S. does not forward the invoices to AGFIL; policyholder, because the policyholder did not return the completed claim form to AGFIL; AGFIL, because AGFIL forgot to send the claim form to the policyholder or simply because AGFIL did not pay the garage in time. or any combination from above. The case study shows a rather complex business process between multiple parties. In particular, we provide an example that the contract violation could be caused by multiple parties. 3. MULTI-PARTY CONTRACT MODEL A contract is an agreement between two or more parties that is binding to those parties and that is based on mutual commitments [Weigand and Xu 2001]. Our multi-party contract model consists of three core components: actions, commitments and a commitment graph [Xu and Jeusfeld 2003], [Xu 2003], [Xu 2004b]. An action describes what each partner should do. A commitment in this paper is defined as a guarantee by one party towards another party that some action sequence shall be executed completely, and all involved parties fulfill their side of the transaction. A commitment graph is an overview of the commitments between parties, which shows commitment relationships in a contract. These components will be explained in turn in the next sections. 3.1 Actions Actions will form the edges in commitment graphs. An action is an atom in our contract model. Because a contract party can be involved in different commitments and play the different roles, we specify the roles of a party as R. A set of total roles of a contract is denoted as R. Definition 3.1 A party can act under different roles in different commitments. Let ID be a domain of identifier; roles of a party R x is defined as R x ID. Let P be a set of parties, the set of all roles is R = R x. x P
4 16 Lai Xu Roles will form the nodes in commitment graphs Definition 3.2 Let R be a set of all roles of all parties, ID be the domain ID, and T be the time. An action is specified as action = (name, sender, receiver, deadline), where name ID, sender, receiver R and deadline T. We require all names of actions to be unique so they can be used as identifiers. A set of actions A for a contract can be specified as A = {action}. x P For example, Action (A agreerepaircar,l,g,3) describes that Lee C.S. agrees the garage to repair the car during the car damage claim received three days. For the car insurance case, all actions are specified in [Xu 2004a]. Although only a single receiver of the action are specified in the case, a list of action receivers can be extend in this model. The next section specifies commitments that are the key part of contracts. 3.2 Commitments In this paper, a commitment is a guarantee by one party towards another party that some action sequence shall be executed completely provided that some trigger, involve, and finish action happens, and all involved parties fulfill their side of the transaction. To finish a commitment, more than one party must finish relevant actions. From this point of view, the concept of our commitment is differ from the definition of a commitment in papers [Verdicchio and Colombetti 2002], [R.Ervin 2002], which a commitment only refers to two parties, a debtor and a creditor [Verdicchio and Colombetti 2002], or a vendor and customer [R.Ervin 2002]. The notion of commitment in this paper is not related to beliefs, desires, or intentions [Cohen and Levesque 1995]. In Cohen and Levesque s research, commitments are related to establishing common beliefs about a certain state of the world. In our multi-party contract model, we do not reason about beliefs of the contractual parties involved, which Daskalopulu did in evidence-based contract performance monitoring research [Daskalopulu et al. 2002]. We also do not assess the of legal status and directives in business process automation [Abrahams 2002]. A multi-party contract includes one or more commitments, a commitment includes some actions which could be performed by multi-parties. Those actions can trigger, involve, and finish the commitment. For example, in the car repair service commitment, the garage first needs to receive the policyholder s car as a trigger of this commitment. The actions included in a commitment thus have different attributes, which we specify as trigger, involve and finish. In a contract preparation stage, the actions with trigger attribute need to be paid attentions whether some enforceable or compensable clauses are required for smoothly fulfilling the contract. The actions with finish attribute eventually finish the commitment. A commitment is described by a commitment name, sender of the commitment, receiver of the commitment.
5 A Multi-party Contract Model 17 Definition 3.3 Actions attributes U can be specified as U = {tr, in, fi}. Let ID be the domain ID, P be a set of parties, N = {1, 2, 3,...}, A be a set of actions. A commitment is specified as commitment = (name, sender, receiver, n, {(a 1, u 1 ), (a 2, u 2 ),..., (a n, u n ) : a i A, u i U}). where name is an identifier, name ID; sender and receiver are the contract parties, sender, receiver P; n denotes the total number of all actions involved, n N; a 1, a 2,..., a n denotes all actions involved in the commitment and their attributes u 1, u 2,..., u n. We require all names of commitments to be unique so that they can be used as identifiers. A set of commitments M can be specified as M = {commitment}. x P Let a i A and m M, a sequence function f position : A M N, i iff i is the sequence number f position (a i, m) = of action a i in commitment m. undef otherwise. f position (a i, m) denotes the position of action a i in the commitment m. For example, in commitment C repairservice, the garage will offer the repair service to the policyholder. After the policyholder sends his/her car to the garage (action A sendcar has a trigger attribute), the garage estimates the repair cost (action A estimaterepaircost has a finish attribute). After the garage receives an agreement from Lee C.S. about the repair cost (action A agreerepaircar has a trigger attribute), the garage repairs the car (action A repaircar has a finish attribute). Commitment C repairservice is specified as (C repairservice, G, P,{(A sendcar, tr), (A estimaterepaircost, f i), (A agreerepaircar, tr), (A repaircar, f i)}) For the car insurance case, all commitments are specified in [Xu 2004a]. The actions and commitments can be regarded as a direct mapping from a paper contract to an e-contract. Information about the actions and commitments can compare with contents between < action > and < /action > in TPA (Trading Partner Agreement) [Dan et al. 2001] from ebxml. The difference is that we specify a multiparty contractual process using the commitment concept, and TPA only specifies bilateral business process. 3.3 Commitment Graph Commitments are an even more important concept, though, to specify multi-party contracts. A commitment graph shows complex relationships among commitments.
6 18 Lai Xu A P" A P" G" DS.6, RS.3 DS.2 DS.3 DS.8 IC.1 IC.3 IC.2 DS.4 DS.5 G' L DS.1 RS.2 RS.1 CF.3 PR.2 DS.9 PR.1 RS.4,DS.7 CF2 AG P' G"' PR.3 CF.1, PS.4 PS.2 E PS.1 PS.3 G" DS.6, RS.3 DS.2 DS.3 DS.8 IC.2 IC.1 IC.3 DS.4DS.5 G' L DS.1 RS.2 RS.1 CF.3 PR.2 DS.9 PR.1 RS.4, DS.7 CF.2 AG P' CF.1 PS.4 PS.2 PR.3 PS.1 PS.3 G"' E (a) Highlight repair service commitment C repairservice (b) Highlight daily service commitment C dailyservice Fig. 1. Commitment graphs Commitment relationships are not only about a condition commitment [Venkatraman and Singh 1999] or a chain [Verdicchio and Colombetti 2002] [R.Ervin 2002] relationship. For example, if a contractee first ships goods to a contractor, the contractor will pay the cost of goods later; the commitment of shipping goods is a condition to activate a commitment of payment. Figure 1 shows the commitment graph for the car insurance case. Table I provides all abbreviations and labels used in this commitment graph. For all notes of this commitment graph, we use the following abbreviations: P and P for a policyholder, AG for AGFIL, E for Euro Assist, L for Lee C.S., G, G and G for garage, and A for assessor. Each note represents a role that can be played by a contractual partner. The abbreviations for the commitments can be found from Table I. Each edge represents an action. Each action has one or more labels, where the first letter represents which commitments this action actually involves, the second number represents the order of a sequence actions within a commitment. Being able to show how the commitment graph presents the complex commitment relationship, we give an example which shows a relationship between commitments C dailyservice (daily service commitment) and C repairservice (repair service commitment). According to Section 3.2,C dailyservice and C repairservice are specified as follows: (C dailyservice, L, AG, {(A forwardclaim, tr), (A contactgarage, in), (A sendrepaircost, in), (A assignassessor, in), (A sendnewrepaircost, tr), ( A agreerepaircar, f i), ( A repaircar, tr), (A sendinvoices, in), (A forwardinvoices, fi)}).
7 A Multi-party Contract Model 19 Commitment C phoneservice (PS) C repairservice (RS) C claimform (CF) C dailyservice (DS) C inspectcar (IC) C payrepaircost (PR) Classification of Actions and Commitments Trigger Involve Finish A phoneclaim A receiveinfo A assigngarage A notifyclaim A sendcar A estimaterepaircost A agreerepaircar A repaircar A notifyclaim A sendclaimform A returnclaimform A forwardclaim A contactgarage A sendrepaircost A assignassessor A sendnewrepaircost A agreerepaircar A repaircar A sendinvoices A forwardinvoices A assignassessor A inspectcar A sendnewrepaircost A forwardinvoices A returnclaimform A payrepaircost Labels PS.1 PS.2 PS.3 PS.4, CF.1 RS.1 RS.2 RS.3, DS.6 RS.4, DS.7 CF.1, PS.4 CF.2 CF.3, PR.2 DS.1 DS.2 DS.3 DS.4, IC.1 DS.5, IC.3 DS.6, RS.3 DS.7, RS.4 DS.8 DS.9, PR.1 IC.1,DS.4 IC.2 IC.3,DS.5 PR.1, DS.9 PR.2, CF.3 PR.3 Table I. Commitments, actions and action abbreviations (C repairservice, G, P, {(A sendcar, tr), (A estimaterepaircost, f i), ( A agreerepaircar, tr), ( A repaircar, fi)}) In Figure 1 (a) and (b), edge RS3 and DS6 both denote A agreerepaircar according Table I. It means that A agreerepaircar is included in C repairservice as the third action (R3) and in C dailyservice as the sixth action (DS6). Another edge RS4 and DS7 both indicates A repaircar. It means that A agreerepaircar is also included in C repairservice as the fourth action (RS4) and in C dailyservice as the seventh action (DS7). The relationship between C dailyservice and C repairservice is a mixed relationship: after role L agrees with the repair costs in C dailyservice, the role G can repair the car in C repairservice; after the role G repairs the car and role G sends the invoice, C dailyservice will go on to execute its following actions. Commitments C repairservice and C dailyservice are mutually dependent on each other. A commitment graph is a directed graph consisting of a set of nodes corresponding to all roles R, a set of edges corresponding to actions and their labels, and commitment orders. Definition 3.4 Let A be a set of actions, a A, M be a set of commitments, m M, and X = {1, 2,...}, a sequence function f position (a, m), an edge is specified as a relation from A M X edge = {(a, m, f position (a, m)) : a A, m M, f position (a, m) X}, m,a m a set of all edges is E = {edge}. a A
8 20 Lai Xu Definition 3.5 Let M be a set of commitments. A commitment occurrence order is specified as a relation from M M: order commitment = {(m 1 m 2 ) : m 1, m 2 M, m 1 m 2 }. If m 1 m 2 is a commitment order, we interpret it as follows: commitment m 2 is only active when commitment m 1 has been finished. Let P be a set of parties. A set of commitment order lists all relationships in which a commitment occurs prior to another commitment, and is specified as follows: O = {(m 1 m 2 )}. x P For the car insurance case, examples of the commitment orders are presented in [Xu 2004a]. After specification of commitment graph notes, edges, and commitment occurrence orders, the commitment graph can be specified as follows: Definition 3.6 Let R be a set of nodes, E be a set of edges, and O be a set of commitment order list. The commitment graph is defined as follows 3.4 Multi-party Contract G = (R, E, O). Now that all elements of our multi-party contract model have been presented, a formal model is provided as follows: Definition 3.7 Let A be a set of actions, M be a set of commitments and G be a commitment graph of a contract. The multi-party contract is specified as Contract = {A, M, G}. The next section will illustrate how to detect responsible parties after a contract violation. 4. CONTRACT VIOLATIONS Contract violations refer to break or fail to comply with a term of the contract by contractual parties. The contract violation is an essential problem for contract executions. Especially, the contract violation can caused by more than one contractual parties in a contract performance. For example, in the car insurance case, the policyholder sent the car to the assigned garage. After the prescribed days, the policyholder find that his/her car did not fixed by the garage at all. Obviously the policyholder will directly complain to the garage. Actually, after sending an estimated repairing cost of the car to the Lee C.S., the garage maybe did not receive an agree-repair message from Lee C.S. Well, because the estimated repairing cost was too high, Lee C.S. has to send an assessor to check the car again. However, the assessor did not do his/her job properly. From the contract execution point of view, this contract violation is caused by the assessor, but Lee C.S. and the garage should also take care of the deadline of repairing the car. In this example, the garage did not repair the car in time, which is directly caused by the assessor. Normally the contract violations can be found by any contractual parties or a contract monitor.
9 A Multi-party Contract Model DETECTING RESPONSIBLE PARTIES OF THE CONTRACT VIOLATION The most common detection process is to retrieve all actions that should have already occurred. Although it is a solution, this process is rather inefficient. Our approach is that use of commitment graphs optimizes the detection process. After finding a missing action, edge labels and commitment orders of a commitment graph will be used in a detecting process. The process of detecting responsible partners of a contract violation has the following steps. First we find all commitments that can be reached from the missing action by using the edge labels. These commitments are direct commitments. Next we find all commitments that should have been completed before the reachable commitments. These commitments are indirect commitments. For the indirect commitments, the actions which have fi attribute, are checked, if they occurred, that indirect commitment is completed. For direct commitments, the occurrence of all actions up to the highest reachable actions need to be checked. If an indirect commitment was not completed, the actions of that commitment are recursively checked. For all actions found missing, the parties responsible for performing those actions are jointly responsible for the contract violation. The detection algorithm is shown in Algorithm 1. This section explained the detection process that makes it possible to detect the parties responsible for a contract violation. This approach uses the multi-party contract model, particularly the commitment graph, to improve the efficiency of the detection process. 6. CONCLUSIONS This paper proposes an approach to formalizing multi-party electronic contracts. The execution of a contract is seen as a stream of actions that happen over time. A paper contract is mapped into two parts. The first part is formed by the so-called contract actions. The second part of the contract is the commitments which are essentially guarantees by one partner to another partner that some action sequence will occur. The commitment graph is used to specify the relationships between commitments. One of our main focuses is how to find the party (or parties) responsible for a contract violation. We provide a method using the commitment graph to trace back the commitments after a contract violation and to locate the partners who violated the commitments. This research also provides a foundation for representing and automating contractual deals on web services, so as to help search, select and compose them. Further research has to be undertaken in the area of pre-calculating the costs of multi-party contract violations from the point of view of one contractual party. Because of the autonomous, reactive and proactive features of agents, they can act on behalf of their owners and use individual strategies to handle conflicts between multiple contract executions. Some agents may use a remedial mechanism which might return the business processes to a normal course of action after a contract violation. How to pre-calculate the cost of the contract violation and trying to reduce the potential costs are very important for a particular contractual party.
10 22 Lai Xu Algorithm 1 Detecting Responsible Parties of the Contract Violation Input: a missing, Contract = {A, M, G}, /*Finding direct commitments and positions of the involved actions*/ M direct = {edge.m : edge, (edge.a, edge.m), edge.a = a missing}, m M (f position, m) = {(edge.f position(a, m), edge.m) : edge.a = a missing}, /*Finding all indirect commitments*/ F position = {(f position, m)}, m M direct M mid = M direct, M indirect =, repeat M mid = {m : m m O} m M mid M indirect = M indirect M mid until M mid /*Checking all indirect commitments*/ for m M indirect do for { a A : m.(a, u) u = fi } do if a(m, m.n) already occurs then return(none) else for x = m.n to 1 do if a(m, x) not yet occurs and x > 1 then x 1 if a(m, x) not yet occurs and x = 1 then return(none) if a(m, x) already occurs then return(sender.a(m, x + 1)) end for end for end for /*Checking all direct commitments*/ for m M direct do for y = m.f position 1 to 1 do if a(m, y) not yet occurs and y > 1 then y 1 if a(m, y) not yet occurs and y = 1 then return(none) if a(m, y) already occurs then return(sender.a(m, y + 1)) end for end for if return(sender) = then return(sender.a missing) REFERENCES Abrahams, A An asynchronous rule-based approach for business process automation using obligations. In the 3rd ACM SIGPLAN Workshop on Rule-Based Programming. Pittsburgh, USA. Cohen, P. R. and Levesque, H. J Communicative actions for artificial agents. In Proceedings of the First International Conference on Multi-Agent Systems, V. Lesser and L. Gasser, Eds. The MIT Press: Cambridge, MA, USA, San Francisco, CA, USA,
11 A Multi-party Contract Model 23 Dan, A., Nguyen, T. N.., Dias, D. M., Parr, F. N., Kearney, R., Sachs, M. W., Lau, T. C., and Shaikh, H. H Business-to-business intergration with tpaml and a businessto-business protocol framework. IBM Systems Journal 40, 1. Daskalopulu, A., T, T. D., and Maibaum, T Evidence-based electronic contract performance monitoring. INFORMS Journal of Group Decision and Negotiation Special Issue: formal Modeling of Electronic Commerce. Dubray, J.-J A new model for ebxml bpss multi-party collaborations and web services choreography. Grosof, B. and Poon, T Sweetdeal: representing agent contracts with exceptions using xml rules, ontologies, and process descriptions. Haugen, B Multi-party electronic business transactions. com/multipartybusinesstransactions.pdf. Kafeza, E., Chiu, D., and Kafeza, I View-based contracts in an e-service crossorganizational workflow environment. In the second International Workshop on Technologies for E-Service. Kimbrough, S. and Moore, S On automated message processing in electronic commerce and work support systems: Speech act theory and expressive felicity. ACM Transactions on Information Systems 15, 4, ACM Press. New York, NY. Koetsier, M., Grefen, P., and Vonk Contract model. Tech. Rep. Deliverable D4b, Cross-Organisational/Workflow, Crossflow ESPRITE/ Lee, R Towards open electronic contracting. Electronic Markets 8, 3 (Mar.). Moore, S Kqml and flbc: Contrasting agent communication languages. International Journal of Electronic Commerce 5, 1. Norman, T. J., Sierra, C., and Jennings, N. R Rights and commitments in multiagent agreements. In Proceedings of the 3rd International Conference on Multi-Agent Systems (ICMAS-98). Paris, France. Project, C Insurance requirements. Tech. Rep. CrossFlow deliverable: D1.b, CrossFlow consortium. R.Ervin Chains of commitment software architecture. ACM SIGecom Exchanges 3, 1. Tan, Y.-H. and Thoen, W A logical model of directed obligations and permissions to support electronic contracting in electronic commerce. International Journal of Electronic Commerce 3, 2, Venkatraman, M. and Singh, M. P Verifying compliance with commitment protocols: Enabling open web-based multiagent systems. Autonomous Agents and Multi-Agent Systems 2, 3. Verdicchio, M. and Colombetti, M Commitments for agent-based supply chain management. ACM SIGecom Exchanges 3, 1. Weigand, H., Dignum, F., and Verharen, E Dynamic business models as a basis for interoperable transaction design. Information Systems. Weigand, H. and Xu, L Contracts in e-commerce. In 9th IFIP 2.6 Working Conference on Database Semantic Issues in E-Commerce Systems (DS-9). Xu, L Monitorable electronic contract. In The 2003 IEEE Conference on E-Commerce (CEC 03). IEEE Computer Society Press. Xu, L. 2004a. Appendix: all actions and commitments of a car insurance case. vu.nl/~xu/appendix.pdf. Xu, L. 2004b. Monitoring multi-party contracts for e-business. Ph.D. thesis, Tilburg University. Xu, L. and Jeusfeld, M. A Pro-active monitoring of electronic contracts. In The 15th Conference On Advanced Information Systems Engineering in Lecture Notes of Computer Science. Vol Springer-Verlag,
Automated econtract Negotiation in Web Service Environment: Electronic Contract Management Aspects
241 Automated econtract Negotiation in Web Service Environment: Electronic Contract Management Aspects Marius ŠAUČIŪNAS Institute of Mathematics and Informatics, Vilnius University Akademijos Str. 4, Vilnius,
Business Commitments for Dynamic E-business Solution Management: Concept and Specification
Business Commitments for Dynamic E-business Solution Management: Concept and Specification Haifei Li, Jun-jang Jeng, and Henry Chang IBM Thomas J. Watson Research Center 1101 Kitchawan Road, Route 134
Information Broker Agents in Intelligent Websites
Information Broker Agents in Intelligent Websites Catholijn M. Jonker, Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands
Requirements on a B2B E-contract Language
Requirements on a B2B E-contract Language Samuil Angelov, Paul Grefen Information Systems Group Faculty of Technology Management Eindhoven University of Technology P.O. Box 513, 5600 MB, Eindhoven The
Agent-based University Library System
_ Course Number: SENG 609.22 Session: Fall, 2004 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Project Report Agent-based University Library
Usage of Business Process Choreography
Usage of Business Process Choreography Akira Tanaka, Hitachi, Ltd. [email protected] Infrastructures and Standard 1 Agenda Introduction Lifecycle! Design phase! Usage phase! Managing phase Remarks
GOAL-BASED INTELLIGENT AGENTS
International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798
Dynamic and Secure B2B E-contract Update Management
Dynamic and Secure B2B E-contract Update Management Samuil Angelov Information Systems Group Faculty of Technology Management Eindhoven University of Technology P.O. Box 513, 5600 MB, Eindhoven The Netherlands
Ontological Identification of Patterns for Choreographing Business Workflow
University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
DATA QUALITY ASPECTS OF REVENUE ASSURANCE (Practice Oriented)
DATA QUALITY ASPECTS OF REVENUE ASSURANCE (Practice Oriented) Katharina Baamann MioSoft [email protected] Abstract: Revenue Assurance describes a methodology to increase a company s income
Dynamic Inter-Enterprise Workflow Management in a Constraint-Based E-Service Infrastructure
Electronic Commerce Research, 3: 9 24 (2003) 2003 Kluwer Academic Publishers. Manufactured in the Netherlands. Dynamic Inter-Enterprise Workflow Management in a Constraint-Based E-Service Infrastructure
Business-to-Business EIPP: Presentment Models, Part 1 By: The Council for Electronic Billing and Payment
Business-to-Business EIPP: Presentment Models, Part 1 By: The Council for Electronic Billing and Payment Abstract In the short time since the release of the first web browser in 1993, the Internet has
Specifying Conflict of Interest in Web Services Endpoint Language (WSEL)
Specifying Conflict of Interest in s Endpoint Language (WSEL) PATRICK C.K.HUNG CSIRO Mathematical and Information Sciences GPO Box 664, Canberra, ACT 2601, Australia [email protected] A Web service
The BCA Contract Management System
The BCA Contract Management System James Cole Research Scientist, Elemental Project, DSTC Copyright DSTC, 2002 1 Contents Motivation for e-contracting BCA Background Scope of BCA Scope Services Requirements
Analysis and Implementation of Workflowbased Supply Chain Management System
Analysis and Implementation of Workflowbased Supply Chain Management System Yan Tu 1 and Baowen Sun 2 1 Information School, Central University of Finance and Economics, Beijing, 100081, P.R.China,[email protected]
A Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
Using Workflow Technology to Manage Flexible e-learning Services
Educational Technology & Society 5(4) 2002 ISSN 1436-4522 Using Workflow Technology to Manage Flexible e-learning Services Joe Lin, Charley Ho, Wasim Sadiq, Maria E. Orlowska Distributed Systems Technology
An Automated Workflow System Geared Towards Consumer Goods and Services Companies
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services
A Framework of Personalized Intelligent Document and Information Management System
A Framework of Personalized Intelligent and Information Management System Xien Fan Department of Computer Science, College of Staten Island, City University of New York, Staten Island, NY 10314, USA Fang
Optimization of Software Quality using Management and Technical Review Techniques
Optimization of Software Quality using Management and Technical Review Techniques Inibehe Emmanuel Akpannah Post Graduate Student (MSc. Information Technology), SRM University, Chennai, India Abstract
Modeling and Design of Intelligent Agent System
International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,
A mixed e-invoice format (PDF + a set of few datas): the best compromise between suppliers and buyers for a fast adoption of e-invoicing
the best compromise between suppliers and buyers for a fast adoption of e-invoicing Build some intermediate floors and stairs in the e-invoicing House in order to create a path to the roof and enjoy the
Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment
Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu [email protected] Department of Computer & Information Systems Robert Morris University
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
A Methodology and Toolkit for Deploying Contract Documents as E-contracts
A Methodology and Toolkit for Deploying Contract Documents as E-contracts Anushree Khandekar +, P. Radha Krishna * and Kamalakar Karlapalem + + International Institute of Information Technology, Hyderabad,
MULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
DRAFT ONLY FOR DISCUSSION PURPOSES
DRAFT ONLY FOR DISCUSSION PURPOSES AGENCY AGREEMENT between [ ] and [ ] 2 AGENCY AGREEMENT The Undersigned: 1. [_Mr./Ms. ], residing at, hereinafter referred to as Agent ; Or [ ], a private company with
Ontologies for Enterprise Integration
Ontologies for Enterprise Integration Mark S. Fox and Michael Gruninger Department of Industrial Engineering,University of Toronto, 4 Taddle Creek Road, Toronto, Ontario M5S 1A4 tel:1-416-978-6823 fax:1-416-971-1373
A Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK [email protected] Abstract. Contracts have proved a powerful concept
How To Model An Outsourcing Relation Between A Telecom And Logistics Company (Telco) And A Logistics Company
Business-to-business E-commerce in a Logistics Domain 1 Zef Damen, Wijnand Derks, Matthijs Duitshof, Henk Ensing KPN Research {j.t.w.damen; w.l.a.derks; m.j.duitshof; henk.ensing}@kpn.com Abstract Today
Autonomic computing system for selfmanagement of Machine-to-Machine networks
Self-IoT 2012, September 17th 2012, San Jose, California, USA in conjunction with ICAC 2012 Autonomic computing system for selfmanagement of Machine-to-Machine networks Mahdi BEN ALAYA, Salma MATOUSSI,Thierry
Observability and Controllability Issues in Conformance Testing of Web Service Compositions
Observability and Controllability Issues in Conformance Testing of Web Service Compositions Jose Pablo Escobedo 1, Christophe Gaston 2, Pascale Le Gall 3 and Ana Cavalli 1 1 TELECOM & Management SudParis
Enterprise Federation through Web Services based Contracts Architecture
Enterprise Federation through Web Services based Contracts Architecture S. Kulkarni, Z. Milosevic, {sachink, zoran}@dstc.edu.au 2002 DSTC Pty Ltd Overview Contracts in e-commerce Support for automated
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Lecture - 41 Value of Information In this lecture, we look at the Value
PREFACE. The Contract for the Supply and Delivery of Goods has been prepared for use in supplies contracts which have the following characteristics:
Supply Chain Management Document Number: SCM006 Document Title: Supply Contract Version: 01 Purpose: Standard contract for all supplies of goods PREFACE The Contract for the Supply and Delivery of Goods
Security Risk Assessment of Software Architecture
Security Risk Assessment of Software Architecture Fadi HajSaid 1, Yousef Hassouneh 2, Hany Ammar 1, 1 West Virginia University, USA; 2 Birzeit University, Palestine [email protected], [email protected],
Agent-Based Software and Practical Case of Agent-Based Software Development
Agent-Based Software and Practical Case of Agent-Based Software Development Course 2008/2009 SUBJECTS: AGENT-BASED SOFTWARE and PRACTICAL CASE OF AGENT-BASED SOFTWARE DEVELOPMENT EUROPEAN MASTER on SOFTWARE
Model Discovery from Motor Claim Process Using Process Mining Technique
International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan
Integrating enterprise application using message-oriented middleware and J2EE technologies
Integrating enterprise application using message-oriented middleware and J2EE technologies S. L. Ooi, M. T. Su Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur,
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: [email protected] Jun-Jang Jeng IBM T.J. Watson
A View Integration Approach to Dynamic Composition of Web Services
A View Integration Approach to Dynamic Composition of Web Services Snehal Thakkar, Craig A. Knoblock, and José Luis Ambite University of Southern California/ Information Sciences Institute 4676 Admiralty
Optimised Realistic Test Input Generation
Optimised Realistic Test Input Generation Mustafa Bozkurt and Mark Harman {m.bozkurt,m.harman}@cs.ucl.ac.uk CREST Centre, Department of Computer Science, University College London. Malet Place, London
Logistics Agreement. between. SMA Solar Technology AG Sonnenallee 1 34266 Niestetal Germany. hereinafter referred to as SMA. and.
between SMA Solar Technology AG Sonnenallee 1 34266 Niestetal Germany hereinafter referred to as SMA and Supplier hereinafter referred to as Supplier jointly referred to as Parties Version 2 2014-09-18
SEPA DATA MODEL. Reason for Issue Approved by the EPC Plenary on 13 December 2006
Doc: EPC029-06 (Version 2.2) 13 December2006 OITS SG SEPA DATA MODEL Abstract Document Reference Issue This document sets out the SEPA Data Model which is referred to in the SEPA Credit Transfer and Direct
BT Assure DoS Mitigation UK
BT Assure DoS Mitigation UK Annex to the Internet Connect UK Schedule Contents A note on we and you... 2 1. Service Summary... 2 2. Service Standard Components... 2 3. Service Options... 2 4. Service Management
Quality-Oriented Handling of Exceptions in Web-Service- Based Cooperative Processes
Quality-Oriented Handling of Exceptions in Web-Service- Based Cooperative Processes Ulrike Greiner, Erhard Rahm Department of Computer Science, University of Leipzig {greiner, rahm}@informatik.uni-leipzig.de
A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems
A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems Areti Manataki and Yun-Heh Chen-Burger Centre for Intelligent Systems and their Applications, School of Informatics, The
ebusiness Web Hosting Alternatives Considerations Self hosting Internet Service Provider (ISP) hosting
ebusiness Web Hosting and E-Business Software Web Hosting Alternatives Self hosting Internet Service Provider (ISP) hosting Commerce Service Provider (CSP) hosting Shared hosting Dedicated hosting Considerations
Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -
Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging
Overview of major concepts in the service oriented extended OeBTO
Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business
U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management
U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management Disclaimer These materials are subject to change without notice. SAP AG s compliance analysis with respect to SAP software
4. Concepts and Technologies for B2C, B2E, and B2B Transaction
4. Concepts and Technologies for B2C, B2E, and B2B Transaction 4.4 Exchanging Information within Open Business Communities 4.4.1 Pre-Internet B2B standards: EDI, Interactive EDI, Universal EDI, OpenEDI
Agile Manufacturing for ALUMINIUM SMELTERS
Agile Manufacturing for ALUMINIUM SMELTERS White Paper This White Paper describes how Advanced Information Management and Planning & Scheduling solutions for Aluminium Smelters can transform production
An Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
Online Trading and Negotiation
Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -
SALES REPRESENTATIVE AGREEMENT
SALES REPRESENTATIVE AGREEMENT THIS AGREEMENT is made on this day of, 200, by and between Blinc Inc., a Delaware corporation, with its primary mailing address at 1141 South Rogers Circle, Suite 9, Boca
AGREEMENT WITH FOR PROFESSIONAL CONSULTANT SERVICES FOR
AGREEMENT WITH FOR PROFESSIONAL CONSULTANT SERVICES FOR This Agreement, made and entered into this day of,, by and between the CITY OF SAN MATEO, a municipal corporation existing under the laws of the
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
Personalized e-learning a Goal Oriented Approach
Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
