A Petri Net-Based Model for Verification of Obligations and Accountability in Cooperative Systems

In cooperative systems (CSs), participants cannot usually ensure the correct behavior of their partners. Obligations and proofs of participants have to be performed together to achieve a common goal in a real cooperation. Without adequate accountability assurances of actions, there is no means of reliably enforcing punitive measures against fraudulent participants. However, the existing formal methods for analyzing CSs cannot properly deal with accountability and obligations. As such, this paper proposes a new class of labeled Petri net (LPN) models. The behavior of each partner is represented by an LPN, while a CS is modeled by the combination of all partners' LPN models. The behavioral properties of an overall modeled system can be well verified only by analyzing each individual LPN. LPNs provide the integration of formal notations with graphical notations and formal proofs with commonly used verification techniques. The obligations are verified based on LPN languages and the nonblocking properties of action sequences, while accountability can be proved by the network conditions and local action sequences on each partner's side. The proposed approaches are illustrated with the modeling and analysis of a purchase transaction using the Internet Open Trading Protocol.

[1]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.

[2]  Guido Schimm Process Miner - A Tool for Mining Process Schemes from Event-Based Data , 2002, JELIA.

[3]  Alessandro Giua,et al.  A Survey of Petri Net Methods for Controlled Discrete Event Systems , 1997, Discret. Event Dyn. Syst..

[4]  Walter Murray Wonham,et al.  Supervisory control of communicating processes , 1990, PSTV.

[5]  Ronald M. Lee Distributed Electronic Trade Scenarios: Representation, Design, Prototyping , 1998, Int. J. Electron. Commer..

[6]  MengChu Zhou,et al.  Modeling, analysis, simulation, scheduling, and control of semiconductor manufacturing systems: A Petri net approach , 1998 .

[7]  Pierre Boulet,et al.  Mode-Automata Based Methodology for Scade , 2005, HSCC.

[8]  MengChu Zhou,et al.  Modeling and Analysis of Real-Time Cooperative Systems Using Petri Nets , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[9]  Pingtao Yan,et al.  Modeling and control of workstation level information flow in FMS using modified Petri nets , 1999, J. Intell. Manuf..

[10]  Panos J. Antsaklis,et al.  Decentralized supervision of Petri nets , 2006, IEEE Transactions on Automatic Control.

[11]  Wil M. P. van der Aalst,et al.  Process-oriented architectures for electronic commerce and interorganizational workflow , 1999, Inf. Syst..

[12]  Rüdiger Grimm,et al.  Binding telecooperation - a formal model for electronic commerce , 2001, Comput. Networks.

[13]  W. M. Wonham,et al.  Decentralized control and coordination of discrete-event systems with partial observation , 1990 .

[14]  MengChu Zhou,et al.  Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[15]  Walter Murray Wonham,et al.  Decentralized supervisory control of discrete-event systems , 1987, Inf. Sci..

[16]  W. Murray Wonham,et al.  Think Globally, Act Locally: Decentralized Supervisory Control , 1991, 1991 American Control Conference.

[17]  Panos J. Antsaklis,et al.  Petri net supervisors for DES with uncontrollable and unobservable transitions , 2000, IEEE Trans. Autom. Control..

[18]  MengChu Zhou,et al.  Elementary siphons of Petri nets and their application to deadlock prevention in flexible manufacturing systems , 2004, IEEE Trans. Syst. Man Cybern. Part A.

[19]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[20]  Dimiter R. Avresky,et al.  Formal verification and testing of protocols , 1999, Comput. Commun..

[21]  MengChu Zhou,et al.  Timing constraint workflow nets for workflow analysis , 2003, IEEE Trans. Syst. Man Cybern. Part A.

[22]  Michael Rosemann,et al.  Workflow-based process monitoring and controlling-technical and organizational issues , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[23]  David Burdett Internet Open Trading Protocol - IOTP Version 1.0 , 2000, RFC.

[24]  Wil M. P. van der Aalst,et al.  Analysis of Web Services Composition Languages: The Case of BPEL4WS , 2003, ER.

[25]  ElesPetru,et al.  Dual Flow Nets , 2006 .

[26]  Petru Eles,et al.  Dual Flow Nets: Modeling the control/data-flow relation in embedded systems , 2006, TECS.

[27]  Dingwei Wang,et al.  Optimal design of link structure for e-supermarket website , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[28]  Glynn Winskel,et al.  Language, Semantics, and Methods for Cryptographic Protocols , 2000 .

[29]  Wil M. P. van der Aalst,et al.  Process Mining: Discovering Direct Successors in Process Logs , 2002, Discovery Science.

[30]  Frank Dignum,et al.  A formal specification of automated auditing of trustworthy trade procedures for open electronic commerce , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.