Incorporating Business Policies into Business Protocols
dc.contributor.advisor | Dr. Munindar Singh, Committee Chair | en_US |
dc.contributor.author | Wagle, Leena V | en_US |
dc.date.accessioned | 2010-04-02T18:01:07Z | |
dc.date.available | 2010-04-02T18:01:07Z | |
dc.date.issued | 2005-08-16 | en_US |
dc.degree.discipline | Computer Science | en_US |
dc.degree.level | thesis | en_US |
dc.degree.name | MS | en_US |
dc.description.abstract | A business process streamlines how different business parties interact with one another, in order to achieve a business goal. The modeling and enactment of business process is notoriously complex, especially in open systems where the participants are autonomous and heterogeneous. Conceptually, a business process consists of two important elements; the business protocols that specify the interactions between the partners and the business policies that drive the partners? behavior during the enactment of protocols. Business policies are an integral and important component of business processes. Business policies are often expressed and implemented as business rules. It is common to embed these business rules within the business process implementation. When the business practices or policies change, as they often do, it is difficult to dynamically manage these changes without affecting the business process implementation. It is a challenge to correctly reflect the policy changes with minimal or no change to the implementation of the business process. The conventional workflow approaches of representing business policies, reduce the flexibility and reusability of business processes. It is possible to control the behavior of protocol participants dynamically, without changing the protocol specification by representing the private internal business policies separate from the generic, public business protocols. However, given a separate policy and protocol specification, it is important that when the participants enact the protocol, the behavior dictated by their local policies be congruent with the protocol specifications. The focus of this thesis is to develop a methodology to configure the private policies of the participant such that, its behavior during protocol enactment is always compliant with the protocol. We propose a methodology that describes how the agent policies should be added to the protocol specification such that the protocol is not violated during enactment. | en_US |
dc.identifier.other | etd-08162005-125546 | en_US |
dc.identifier.uri | http://www.lib.ncsu.edu/resolver/1840.16/1132 | |
dc.rights | I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report. | en_US |
dc.subject | Agents | en_US |
dc.subject | Protocols | en_US |
dc.subject | Policies | en_US |
dc.subject | Business Process | en_US |
dc.title | Incorporating Business Policies into Business Protocols | en_US |
Files
Original bundle
1 - 1 of 1