Papers by Benjamin Gateau

International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)
The purpose of a contract, in a B2B context, is to establish an agreement in order to decrease ri... more The purpose of a contract, in a B2B context, is to establish an agreement in order to decrease risks associated with the interactions between trading partners. Humans currently carry manually out the business contract processes. This mainly includes the mechanisms of negotiation, signing, validation and monitoring. In order to improve the execution of the contracts with complex scenarios the use of Multi Agent System technologies is more appropriate. This paper describes a prototype implementing the concepts of Electronic Contract dedicated for Tele-services based on MOISE Inst , an organizational model for agents. This model aims to specify the rights and duties of agents in a society according to four points of view: structural, functional, contextual and normative. We use a real-world contract scenario as a test-bed for examining our e-contract architecture and for implementing our prototype.
Proceedings of the 4th International Workshop on Pattern Recognition in Information Systems, 2004
This paper covers development and analysis tools, software and system architecture engineering an... more This paper covers development and analysis tools, software and system architecture engineering and development methodologies. It introduces the MOISE + (Model of Organization for multI-agent System) model seen under three points of view : structural, functional and deontic. In practical, this model is available as a JAVA component. The original contribution of the paper is the extension of the model to take into account the notion of sanctions. These ones are necessary in order to control the respect of normative specifications (obligation, permission, prohibition) of behaviors. The results of the generalized model are implemented on an eCommerce application dealing with eContracting.
Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems, 2015
In this paper a new approach to complex comfort management is presented, aiming in automatic trea... more In this paper a new approach to complex comfort management is presented, aiming in automatic treatment of different comfort parameters by means of Internet-of-Things devices and multi-agent system. The paper presents a new model of e-comfort, based on common treatment of all the parameters as identified across the Maslow's hierarchy of needs. Next, a new architecture of e-comfort management is discussed, based on two layers: low-level layer of IoT devices, representing at-the-place possibilities of the system, and upper layer of software agents, formulating and negotiating the needs and expectations of human users.
Proceedings of the 1st International Conference on Cloud Computing and Services Science, 2011
The More than a technological solution, the Cloud Computing is also an economical advantage and w... more The More than a technological solution, the Cloud Computing is also an economical advantage and will play an important roles in next years. However, in order to ensure a QoS commitment between a provider and a customer, Service Level Agreements (SLA) describe a set of non-functional requirements of the service the customer is buying. SLA is the best way to ensure QoS. In this paper, we use a MAS to manage SLA by monitoring the respect of service in the context of Cloud Computing.
If only I can trust my police! SIM: an agent-based audit solution of access right deployment thro... more If only I can trust my police! SIM: an agent-based audit solution of access right deployment through open network
2013 46th Hawaii International Conference on System Sciences, 2013
The first part of the paper describes the design of a service module that assists customers with ... more The first part of the paper describes the design of a service module that assists customers with the leasing of cloud computing services by taking into account their requirements on service provisioning. The service module introduces basic service level management functionality within a larger framework. The framework is illustrated as a web platform and uses a trusted third party (TTP) as a secure middle layer on service transactions. The second part of the paper focuses on the TTP role. Preliminary security requirements are identified and analyzed for the implementation and successful operation of such a TTP entity.
The Knowledge Engineering Review, 2015
Multi-agent systems have been widely used in the literature, including for the monitoring of dist... more Multi-agent systems have been widely used in the literature, including for the monitoring of distributed systems. However, one of the unresolved issues in this technology remains in the reassignment of the responsibilities of monitoring agents when some of them become unable to meet their obligations. This paper proposes a new approach for solving this problem based on (a) the gathering of evidence on whether the agent can or cannot fulfil the tasks it has been assigned and (b) the reassignment of the task to alternative agents using their trust level as a selection parameter. A weather station case study is proposed as an instantiation of the proposed model.
Modélisation et Supervision d'Institutions Multi-Agents

Le domaine du eBusiness requiert pour ses clients de plus en plus d'automatisation, de rapidité e... more Le domaine du eBusiness requiert pour ses clients de plus en plus d'automatisation, de rapidité et de sécurité. C'est dans cette optique qu'est apparu le contratélectronique, entité virtuelle remplaçant le contrat papier avec,à la base, des applications mettant en oeuvre les signatures digitales ayant pris le pas sur les signatures manuscrites. Elles sont basées sur des certificats et utilisent des protocoles de communications sécurisées. Néanmoins, les négociations sur les clauses des contrats et les arbitrages en cas de conflits sont très rarement traités par les applications actuelles. Dans le monde des Systèmes Multi-Agents (SMA) le concept de contrat social permet le contrôle et la gestion des coopérations entre agents. Dans ce contexte, nos travaux consistentà faire se rejoindre les contratsélectroniques et les contrats sociaux afin de proposer une architecture Multi-Agents et un modèle de contrat permettant de contrôler et de gérer l'autonomie des composants assistant les utilisateurs. Dans cet article, nous proposons un nouveau modèle de contrat que nous validons au sein d'une plate-forme sécurisée pour le commerce de biens intangibles, ou eServices.

Lecture Notes in Business Information Processing, 2011
In Multi-Agent Systems, Organizations are means to structure cooperation and collaboration betwee... more In Multi-Agent Systems, Organizations are means to structure cooperation and collaboration between agents. MoiseInst is a normative Organization model giving the possibility to constraint agents behaviour according to four dimensions (structural, functional, contextual and normative). Mabeli as Electronic Institution model allows the supervision of MoiseInst Organizations compliance through an arbitration system. The difficulty is to easily instantiate such Organizations to obtain a dynamic entity in which agents can evolve. In this paper we introduce Utopia, our Institution-oriented and Institution-based programming framework. Utopia permits to easily and automatically set up a MAS thanks to a XML MoiseInst Specification file. The framework convert this file into an innovative mathematical structure namely a recursive graph, and solve several optimization problems in order to compute the most efficient role distribution. We show a concrete application of the prototype through RED, an EUREKA/CELTIC European project use-case.
Lecture Notes in Computer Science
Interactive multimedia applications are whelming to increase realism in their content and scenes ... more Interactive multimedia applications are whelming to increase realism in their content and scenes with which users interact. To this aim, autonomous agents are increasingly used to implement the objects composing the scene. Although autonomy brings flexibility and realism in the animation, it has to be controlled in order to conform to the global behaviour targeted by the designer of the application. Multiagent based organizational models are good candidates to specify "rights" and "duties" of agents with respect to the intended behaviour. In this paper we present MOISE Inst , a meta-model aiming at representing normative organisations of agents according to four points of view: structural, functional, contextual and normative. We show how this model is suited to control an application of interactive TV game show where avatars are based on agents.
ECMS 2014 Proceedings edited by: Flaminio Squazzoni, Fabio Baronio, Claudia Archetti, Marco Castellani, 2014
This paper describes a daily mobility model which allows realizing urban simulation to help under... more This paper describes a daily mobility model which allows realizing urban simulation to help understanding future land use management policies. The main challenge in such urban simulation consists of how to evaluate future situations since where comparison with real data cannot be possible. The work presented in this paper is about solving this problem and encouraging results have been obtained. Experiments have been made within different scenarios in Luxembourg.
Information Control Problems in Manufacturing 2006, 2006
In this paper we present multi-agent based management of electronic contract (e-contract) in a B2... more In this paper we present multi-agent based management of electronic contract (e-contract) in a B2B context, for Tele-services. Several solutions have been proposed in the multi-agent domain for negotiation of contracts. However few concern the monitoring of contracts and the management of their violation and enforcement. We describe a prototype implementing the concepts of econtract using Moise Inst , a normative multi-agent organizational model. Thanks to it, contractual clauses are expressed as rights and duties of agents along four points of view: structural, functional, contextual and normative. We use a realworld contracting scenario as a test-bed for examining the proposed e-contract architecture and for implementing our prototype.

2011 Conference on Network and Information Systems Security, 2011
Banking and financial system constitute a critical service for our economy. Being able to foresee... more Banking and financial system constitute a critical service for our economy. Being able to foreseen real time attacks and failures on financial institutions network is a crucial challenge. In order to face those problems, research tends to elaborate alert mechanisms in order to support risk assessment, analysis and mitigation solution for real time decisionmaking processes. Our previous works had proposed a multi-agent based architecture to support that alert mechanism. This architecture exploited the Multi-agent system technology and proposes a static assignment of functions to agents. This static assignment was a weakness because isolating an agent or breaking the communication channel between two of them created serious damage on the crisis management. In this paper, we complete our previous works and make mobile the assignment of functions to agents. Our approach exploits the concept of agent responsibility that we assigned dynamically to agent taking into consideration the agent trust. This mobile assignement is illustrated by a case study that aims at adopting agent's secret key according to the sensibility of the financial context.

2008 Third International Conference on Risks and Security of Internet and Systems, 2008
Dynamic and evolved environment make the Information Systems (IS), and consequently access rights... more Dynamic and evolved environment make the Information Systems (IS), and consequently access rights to its components, always more complex to define and to manage. This statement is mainly explained by the continuous grow of the diversity of business requirements and by the criticality of the resources to protect. Even if a proliferation of sophisticated "Identity and Access Management" (IAM) solutions has appeared on the market since end of last decade, some points remain poorly addressed like the definition of the access control policy against business constraints and their dissemination through distributed system. To bring up a contribution for improving that matter, our paper's first objective is to realize the development of an automate deployment of policies from an administrative platform that encompasses business requirements down to infrastructure's components and devices. This objective is achieved by adapting the XACML OASIS framework [22] and by formalizing a protocol for information exchange through different components of a multi-agent system. The second paper's objective aims at providing guaranties that defined and deployed access rights are continuously aligned with business requirements. This objective is completed by complementary developments that aim to perform a systematic and/or on-demand audit of the effective rights against the desired ones. This second objective is achieved by adding new functionality to the proposed agents architecture and by adapting the protocol accordingly. Practically, this research has been performed in the framework of the SIM [1] project and has privileged free and open source components for the prototyping phase.

2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
The generalization of open and distributed system and the dynamicity of the environment make the ... more The generalization of open and distributed system and the dynamicity of the environment make the Information Systems (IS) and consequently its access right management always more complex. Even if the support of this activity appears to be well handed by current sophisticated solutions, the definition and the exploitation of an access right management framework appropriately adapted for a company remains challenging. This statement is explained mainly by the continuous grow of the diversity of stakeholders' statuses and by the criticality of the resources to protect. To face that problem, the objectives of this paper are twofold. Firstly to make right management closer with business objectives by providing an innovative approach that focus on business goals for defining access policy. The ISO/IEC 15504 process-based model organization has been preferred for that research. Indeed, the structured framework that it offers for the description of activities allows to established meaningful links with responsibilities concepts. Secondly, to automate the deployment of policies through the infrastructure's components and devices by defining a multi-agent system architecture that provides autonomy and adaptability. Free and open source components have been privileged for the prototyping phase.
2009 International Conference on Availability, Reliability and Security, 2009
Governance of IT is becoming more and more necessary in the current financial economic situation.... more Governance of IT is becoming more and more necessary in the current financial economic situation. One declination of that statement is the definition of corporate and IT policies. To improve that matter, the paper has for objective to propose a methodology for defining policies that are closer to the business processes, and based on the strict definition of a responsibility model that clarify all actor's responsibility. This responsibility model is mainly defined based on the three concepts of capability, the accountability and the commitment. The methodology is illustrated and validated based on a case study conducted in an IT company.
2008 Second International Conference on Research Challenges in Information Science, 2008
Challenge to develop a Federated Identity Management. Difficult to integrate heterogeneous appl... more Challenge to develop a Federated Identity Management. Difficult to integrate heterogeneous applications to heterogeneous organizations Existing IAM solutions are (most of time) monolithic, proprietary and non-flexible.

2009 Global Information Infrastructure Symposium, 2009
The main focus of this paper is to provide a global architectural solution built on the requireme... more The main focus of this paper is to provide a global architectural solution built on the requirements for a reaction after alert detection mechanisms in the frame of Information Systems Security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the targeted architecture is developed in a distributed perspective and is composed of three basic layers: low level, intermediate level and high level. The low level is dedicated to be the interface between the main architecture and the targeted infrastructure. The intermediate level is responsible of correlating the alerts coming from different domains of the infrastructure and to deploy smartly the reaction actions. This intermediate level is elaborated using multi-agents system that provide the advantages of autonomous and interaction facilities. The high level permits to have a supervision view of the whole infrastructure, and to manage business policy definition. The proposed approach has been successfully experimented for data access control mechanism.
links
This paper covers development and analysis tools, software and system architecture engineering an... more This paper covers development and analysis tools, software and system architecture engineering and development methodologies. It introduces the MOISE + (Model of Organization for multI-agent System) model seen under three points of view : structural, functional and deontic. In practical, this model is available as a JAVA component. The original contribution of the paper is the extension of the model to take into account the notion of sanctions. These ones are necessary in order to control the respect of normative specifications (obligation, permission, prohibition) of behaviors. The results of the generalized model are implemented on an eCommerce application dealing with eContracting.
Uploads
Papers by Benjamin Gateau