Design of a Cloud-Oriented Web Application for Legal Conflict Resolution Through Equitative Algorithms

With the terms “Cloud Computing” we mean a model in which computation, software and storage resources do not require knowledge of the physical location and configuration of the system that provides the service in question by the end user. Thanks to the widespread use of the Internet, applications can now be used as services on the network. Many interesting areas of application are enjoying of these benefits, such as legal domain: the use of systems for conflict resolution can help lawyers, mediators and judges with the objective to reach an agreement between the parties. In this paper we introduce the architecture of a cloud-oriented web application, developed within the European project CREA (Conflict Resolution with Equitative Algorithms, Figure). Its objective is the application of algorithms to solve civil matters, into the allocation of goods, leading the parties to a friendly solution before or during the trial comparison.

[1]  Vipin Kumar,et al.  Algorithms for Constraint-Satisfaction Problems: A Survey , 1992, AI Mag..

[2]  Luigi Coppolino,et al.  A comparative analysis of emerging approaches for securing java software with Intel SGX , 2019, Future Gener. Comput. Syst..

[3]  Alessandro Cilardo,et al.  Secure distribution infrastructure for hardware digital contents , 2014, IET Comput. Digit. Tech..

[4]  Alessandro Cilardo,et al.  An FPGA-based key-store for improving the dependability of security services , 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.

[5]  Flora Amato,et al.  Improving security in cloud by formal modeling of IaaS resources , 2017, Future Gener. Comput. Syst..

[6]  Luigi Coppolino,et al.  Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level , 2018, 2018 14th European Dependable Computing Conference (EDCC).

[7]  Rajiv Ranjan,et al.  Cloud Computing: Methodology, Systems, and Applications , 2011 .

[8]  Luigi Coppolino,et al.  SIL2 assessment of an Active/Standby COTS-based Safety-Related system , 2018, Reliab. Eng. Syst. Saf..

[9]  Alessandro Cilardo,et al.  An IP Core Remote Anonymous Activation Protocol , 2018, IEEE Transactions on Emerging Topics in Computing.

[10]  Rocco Aversa,et al.  Critical Systems Verification in MetaMORP(h)OSY , 2014, SAFECOMP Workshops.

[11]  Valeria Vittorini,et al.  Towards Semantics Driven Generation of Executable Web Services Compositions , 2007, J. Softw..

[12]  Awais Ahmad,et al.  Implications of deep learning for the automation of design patterns organization , 2017, J. Parallel Distributed Comput..

[13]  Salvatore Venticinque,et al.  An Ontology for the Cloud in mOSAIC , 2011 .

[14]  Bruce G. Buchanan,et al.  Some Speculation about Artificial Intelligence and Legal Reasoning , 1970 .

[15]  Flora Amato,et al.  Centrality in heterogeneous social networks for lurkers detection: An approach based on hypergraphs , 2018, Concurr. Comput. Pract. Exp..

[16]  Hervé Moulin,et al.  Competitive Division of a Mixed Manna , 2017, ArXiv.

[17]  J. Nash THE BARGAINING PROBLEM , 1950, Classics in Game Theory.

[18]  Elisha A. Pazner,et al.  Egalitarian Equivalent Allocations: A New Concept of Economic Equity , 1978 .

[19]  Angelo Chianese,et al.  Cultural Heritage and Social Pulse: A Semantic Approach for CH Sensitivity Discovery in Social Media Data , 2016, 2016 IEEE Tenth International Conference on Semantic Computing (ICSC).