{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T02:01:09Z","timestamp":1699063269092},"reference-count":19,"publisher":"World Scientific Pub Co Pte Lt","issue":"02n03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2005,6]]},"abstract":" In this work, we have been principally concerned with the representation of contracts so that their normative state may be tracked in an automated fashion over their deployment lifetime. The normative state of a contract, at a particular time, is the aggregation of instances of normative relations that hold between contract parties at that time, plus the current values of contract variables. The effects of contract events on the normative state of a contract are specified using an XML formalization of the Event Calculus, called ecXML. We use an example mail service agreement from the domain of web services to ground the discussion of our work. We give a characterization of the agreement according to the normative concepts of obligation, power and permission, and show how the ecXML representation may be used to track the state of the agreement, according to a narrative of contract events. We also give a description of a state tracking architecture, and a contract deployment tool, both of which have been implemented in the course of our work. <\/jats:p>","DOI":"10.1142\/s0218843005001110","type":"journal-article","created":{"date-parts":[[2005,6,6]],"date-time":"2005-06-06T11:01:02Z","timestamp":1118055662000},"page":"99-129","source":"Crossref","is-referenced-by-count":51,"title":["USING THE EVENT CALCULUS FOR TRACKING THE NORMATIVE STATE OF CONTRACTS"],"prefix":"10.1142","volume":"14","author":[{"given":"ANDREW D. H.","family":"FARRELL","sequence":"first","affiliation":[{"name":"Department of Computing, Imperial College, 180 Queen's Gate, London. SW7 2AB, UK"}]},{"given":"MAREK J.","family":"SERGOT","sequence":"additional","affiliation":[{"name":"Department of Computing, Imperial College, 180 Queen's Gate, London. SW7 2AB, UK"}]},{"given":"MATHIAS","family":"SALL\u00c9","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, California, USA"}]},{"given":"CLAUDIO","family":"BARTOLINI","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, California, USA"}]}],"member":"219","published-online":{"date-parts":[[2012,4,6]]},"reference":[{"key":"rf3","unstructured":"A.\u00a0Daskalopulu, 11th International Conference and Workshop on Database and Expert Systems Applications (IEEE C.S. Press, 2000)\u00a0pp. 1074\u20131079."},{"key":"rf4","first-page":"429","volume":"4","author":"Jones A. J. I.","journal-title":"Journal of the IGPL"},{"key":"rf7","volume-title":"1st ACM Conference on Electronic Commerce (EC-99), Denver, Colorado, USA","author":"Grosof B. N.","year":"1999"},{"key":"rf9","volume-title":"Web Services. Concepts, Architectures and Applications","author":"Alonso G.","year":"2004"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/11.2.257"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2002.12.001"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253364"},{"key":"rf14","series-title":"Handbook of Philosophical Logic","volume-title":"Handbook of Philosophical Logic, Vol. 8","volume":"8","author":"Jones A.","year":"2002"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-1202-7"},{"key":"rf16","volume-title":"Communication and Concurrency","author":"Milner R.","year":"1989"},{"key":"rf17","volume-title":"Communicating and Mobile Systems: The Pi-Calculus","author":"Milner R.","year":"1999"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1145\/383779.383786"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1109\/6.570823"},{"key":"rf23","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037383"},{"key":"rf25","unstructured":"F. B.\u00a0Sadighi and M. J.\u00a0Sergot, Security Protocols 7th International Workshop, Cambridge (April 1999), Lecture Notes in Computer Science\u00a01796, eds. B.\u00a0Christianson (Springer, 2000)\u00a0pp. 48\u201353."},{"key":"rf26","unstructured":"F. B.\u00a0Sadighi, M. J.\u00a0Sergot and O.\u00a0Bandemann, Security Protocols 9th International Workshop, Cambridge (April 2001), Lecture Notes in Computer Science\u00a02467, eds. B.\u00a0Christianson (Springer, 2002)\u00a0pp. 134\u2013145."},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173438"},{"key":"rf28","volume-title":"The Open Agent Society","author":"Sergot M.","year":"2005"},{"key":"rf29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48317-9_17"}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218843005001110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T04:44:13Z","timestamp":1565153053000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218843005001110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":19,"journal-issue":{"issue":"02n03","published-online":{"date-parts":[[2012,4,6]]},"published-print":{"date-parts":[[2005,6]]}},"alternative-id":["10.1142\/S0218843005001110"],"URL":"https:\/\/doi.org\/10.1142\/s0218843005001110","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"value":"0218-8430","type":"print"},{"value":"1793-6365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}