Comparing TCD / SNet with two other formal analysis approaches based on i * : Formal Tropos and Secure Tropos

In previous work, we proposed the prototype environment SNet based on the Trust-Confidence-Distrust (TCD) approach for the representation and dynamic evaluation of agent-based designs for interorganizational networks. There are two major ingredients: i* for modeling the domain statically and ConGolog for analysing it dynamically via simulations. In the context of i*, several other approaches that try to enrich i* models to allow for more formal analyses exist. In this paper, we compare our approach with two of them, Formal Tropos and Secure Tropos. While the intended use of these is quite different from SNet, there are a number of commonalities, which will be highlighted in this paper as well as the differences, including complementary forms of analysis such as model checking versus simulation.

[1]  Marco Pistore,et al.  NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.

[2]  Gerhard Lakemeyer,et al.  SNet Reloaded: Roles, Monitoring and Agent Evolution , 2004, AOIS.

[3]  J. McCarthy Situations, Actions, and Causal Laws , 1963 .

[4]  John Mylopoulos,et al.  Modeling Social and Individual Trust in Requirements Engineering Methodologies , 2005, iTrust.

[5]  M. Jarke,et al.  Requirements modeling for organization networks: a (dis)trust-based approach , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.

[6]  Matthias Jarke,et al.  ConceptBase — A deductive object base for meta data management , 1995, Journal of Intelligent Information Systems.

[7]  Andrew J. I. Jones,et al.  Trust and Deception in Virtual Societies , 2001 .

[8]  John Mylopoulos,et al.  Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning , 2004, iTrust.

[9]  Gerhard Lakemeyer,et al.  Deliberation in a metadata-based modeling and simulation environment for inter-organizational networks , 2005, Inf. Syst..

[10]  Yves Lespérance,et al.  Agent-Oriented Requirements Engineering Using ConGolog and i* , 2001 .

[11]  Fred Kröger,et al.  Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.

[12]  John Mylopoulos,et al.  Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).

[13]  John Mylopoulos,et al.  Specifying and analyzing early requirements in Tropos , 2004, Requirements Engineering.

[14]  Hector J. Levesque,et al.  A concurrent programming language based on the situation calculus: Language and implementation , 1999 .