{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:43:30Z","timestamp":1760708610643},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,8,15]],"date-time":"2013-08-15T00:00:00Z","timestamp":1376524800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s10458-013-9233-1","type":"journal-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T10:58:24Z","timestamp":1376477904000},"page":"519-557","source":"Crossref","is-referenced-by-count":13,"title":["Engineering commitment-based business protocols with the 2CL methodology"],"prefix":"10.1007","volume":"28","author":[{"given":"Matteo","family":"Baldoni","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Baroglio","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Marengo","sequence":"additional","affiliation":[]},{"given":"Viviana","family":"Patti","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Capuzzimati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,15]]},"reference":[{"key":"9233_CR1","unstructured":"Baldoni, M., Baroglio, C., & Marengo, E. (2010). Behavior-oriented commitment-based protocols. In Proceedings of ECAI, Vol. 215 of Frontiers in artificial intelligence and applications (pp. 137\u2013142). Amsterdam: IOS Press."},{"issue":"1","key":"9233_CR2","first-page":"83","volume":"19","author":"M Baldoni","year":"2011","unstructured":"Baldoni, M., Baroglio, C., Brunkhorst, I., Henze, N., Marengo, E., & Patti, V. (2011). Constraint modeling for curriculum planning and validation. International Journal of Interactive Learning Environments, 19(1), 83\u2013123.","journal-title":"International Journal of Interactive Learning Environments"},{"key":"9233_CR3","unstructured":"Baldoni, M., Baroglio, C., Marengo, E., & Patti, V. (2011). Grafting regulations into business protocols: Supporting the analysis of risks of violation. In Forth international workshop on requirements engineering and law (RELAW 2011), held in conjunction with the 19th IEEE International Requirements Engineering Conference (pp. 50\u201359). Trento: IEEE Xplore."},{"key":"9233_CR4","unstructured":"Baldoni, M., Baroglio, C., Patti, V., & Marengo. E. (2012). Supporting the analysis of risks of violation in business protocols: The MiFID case study. In Information systems: Crossroads for organization, management, accounting and engineering (pp. 545\u2013553). Berlin: Springer."},{"key":"9233_CR5","doi-asserted-by":"crossref","unstructured":"Baldoni, M., Baroglio, C., & Capuzzimati, F. (2013). 2COMM: A commitment-based MAS architecture. In M. Cossentino, A. El Fallah Seghrouchni, & M. Winikoff (Eds.), Proceedings of the 1st international workshop on engineering multi-agent systems, EMAS 2013, held in conjuction with AAMAS 2013, pp. 17\u201332, St. Paul, Minnesota.","DOI":"10.1007\/978-3-642-45343-4_3"},{"key":"9233_CR6","unstructured":"Baldoni, M., Baroglio, C., Capuzzimati, F., Marengo, E., & Patti, V. (2013). A generalized commitment machine for 2CL protocols and its implementation. In Post-proceedings of the 10th international workshop on declarative agent languages and technologies X, DALT 2012. Revised selected and invited papers, No. 7784 in LNAI (pp. 96\u2013115). Heidelberg: Springer."},{"key":"9233_CR7","unstructured":"Baldoni, M., Baroglio, C., Marengo, E., & Patti, V. (2013). Constitutive and regulative specifications of commitment protocols: A decoupled approach. ACM Transactions on Intelligent Systems and Technology, 4(2), 22:1\u201322:25."},{"key":"9233_CR8","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.knosys.2012.04.010","volume":"35","author":"J Bentahar","year":"2012","unstructured":"Bentahar, J., El-Menshawy, M., Qu, H., & Dssouli, R. (2012). Communicative commitments: Model checking and complexity analysis. Knowledge-Based Systems, 35, 21\u201334.","journal-title":"Knowledge-Based Systems"},{"issue":"1","key":"9233_CR9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s10458-012-9202-0","volume":"27","author":"F Chesani","year":"2013","unstructured":"Chesani, F., Mello, P., Montali, M., & Torroni, P. (2013). Representing and monitoring social commitments using the event calculus. Autonomous Agents and Multi-Agent Systems, 27(1), 85\u2013130.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9233_CR10","unstructured":"Chopra, A. (2009). Commitment alignment: Semantics, patterns, and decision procedures for distributed computing. PhD thesis, North Carolina State University, Raleigh, NC."},{"key":"9233_CR11","unstructured":"Chopra A. K., & Singh M. P. (2008). Constitutive interoperability. In L. Padgham, D. C. Parkes, J. P. M\u00fcller, & S. Parsons (Eds.), AAMAS (2) (pp. 797\u2013804). IFAAMAS."},{"key":"9233_CR12","unstructured":"Chopra, A. K., & Singh, M. P. (2011). Specifying and applying commitment-based business patterns. In Proceedings of AAMAS. IFAAMAS."},{"key":"9233_CR13","unstructured":"Chopra, A. K., Artikis, A., Bentahar, J., Colombetti, M., Dignum, F., Fornara, N., Jones, A. J. I., Singh, M. P., & Yolum, P. (2013). Research directions in agent communication. ACM Transactions on Intelligent Systems and Technology, 4(2), 20:1\u201320:23."},{"key":"9233_CR14","unstructured":"Dam, K. H. (2003). Evaluating and comparing agent-oriented software engineering methodologies. PhD thesis, Applied Science in Information Technology, School of Computer Science and Information Technology, RMIT University, Australia."},{"key":"9233_CR15","unstructured":"Dam, K. H., & Winikoff, M. (2003). Comparing agent-oriented methodologies. In AOIS. Lecture notes in computer science (Vol. 3030, pp. 78\u201393). Berlin: Springer."},{"key":"9233_CR16","unstructured":"D\u2019Aprile, D., Giordano, L., Martelli, A., Pozzato, G., Rognone, D., & Theseider Dupr\u00e8, D. (2012). Business process compliance verification: An annotation based approach with commitments. In Information systems: Crossroads for organization, management, accounting and engineering (pp 563\u2013570)."},{"issue":"12","key":"9233_CR17","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TSE.2005.140","volume":"31","author":"N Desai","year":"2005","unstructured":"Desai, N., Mallya, A. U., Chopra, A. K., & Singh, M. P. (2005). Interaction protocols as design abstractions for business processes. IEEE Transactiions on Software Engineering, 31(12), 1015\u20131027.","journal-title":"IEEE Transactiions on Software Engineering"},{"key":"9233_CR18","doi-asserted-by":"crossref","unstructured":"Desai, N. V., Chopra, A. K., Arrott, M., Specht, B., & Singh, M. P. (2007). Engineering foreign exchange processes via commitment protocols. In IEEE international conference on SCC (pp. 514\u2013521).","DOI":"10.1109\/SCC.2007.58"},{"key":"9233_CR19","doi-asserted-by":"crossref","unstructured":"Desai, N., Chopra, A. K., & Singh, M. P. (2009). Amoeba: A methodology for modelling and evolving cross-organizational business processes. ACM Transactions on Software Engineering and Methodology, 19(2), Article 6.","DOI":"10.1145\/1571629.1571632"},{"key":"9233_CR20","unstructured":"Directive 2004\/39\/EC of the European Parliament and of the Council of 21 April 2004 on markets in financial instruments."},{"issue":"4","key":"9233_CR21","first-page":"329","volume":"56","author":"B Dunin-Keplicz","year":"2003","unstructured":"Dunin-Keplicz, B., & Verbrugge, R. (2003). Evolution of collective commitment during teamwork. Fundamenta Informaticae, 56(4), 329\u2013371.","journal-title":"Fundamenta Informaticae"},{"key":"9233_CR22","unstructured":"El-Menshawy, M., Bentahar, J., Qu, H., & Dssouli, R. (2011). On the verification of social commitments and time. In 10th international conference on autonomous agents and multiagent systems (AAMAS 2011), Taipei, Taiwan, May 2\u20136, 2011, pp. 483\u2013490. IFAAMAS."},{"key":"9233_CR23","doi-asserted-by":"crossref","unstructured":"El Menshawy, M., Bentahar, J., El Kholy, W., & Dssouli, R. (2012). Reducing model checking commitments for agent communication to model checking ARCTL and GCTL*. Autonomous Agents and Multi-Agent Systems, 27(3), 375\u2013418.","DOI":"10.1007\/s10458-012-9208-7"},{"issue":"1","key":"9233_CR24","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.eswa.2012.07.030","volume":"40","author":"M El-Menshawy","year":"2013","unstructured":"El-Menshawy, M., Bentahar, J., El Kholy, W., & Dssouli, R. (2013). Verifying conformance of multi-agent commitment-based protocols. Expert Systems with Applications, 40(1), 122\u2013138.","journal-title":"Expert Systems with Applications"},{"issue":"9\u201310","key":"9233_CR25","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1080\/08839510490509054","volume":"18","author":"N Fornara","year":"2004","unstructured":"Fornara, N., & Colombetti, M. (2004). A commitment-based approach to agent communication. Applied Artificial Intelligence, 18(9\u201310), 853\u2013866.","journal-title":"Applied Artificial Intelligence"},{"issue":"4","key":"9233_CR26","doi-asserted-by":"crossref","first-page":"341","DOI":"10.3233\/AIC-2010-0478","volume":"23","author":"N Fornara","year":"2010","unstructured":"Fornara, N., & Colombetti, M. (2010). Representation and monitoring of commitments and norms using OWL. AI Communications, 23(4), 341\u2013356.","journal-title":"AI Communications"},{"key":"9233_CR27","unstructured":"Fornara, N., & Colombetti, M. (2012). Specifying and enforcing norms in artificial institutions: A retrospective review. In Declarative agent languages and technologies IX\u20149th international workshop, DALT 2011. Revised selected and invited papers, Vol. 7169 of Lecture notes in computer science (pp. 117\u2013119). Heidelberg: Springer."},{"key":"9233_CR28","doi-asserted-by":"crossref","unstructured":"Gerard, S. N., & Singh, M. P. (2013). Formalizing and verifying protocol refinements. ACM Transactions on Intelligent Systems and Technology (TIST), 4(2).","DOI":"10.1145\/2438653.2438656"},{"key":"9233_CR29","unstructured":"Gibilaro, G. (2007). Cassazione Civile Sentenza, Sez. SS.UU., 19\/12\/2007, n. 26724 e 26725. Intermediazione finanziaria, nullit\u00e0 del contratto e risarcimento del danno."},{"key":"9233_CR30","volume-title":"On the characterization of law and computer systems: The normative systems perspective","author":"AJI Jones","year":"1994","unstructured":"Jones, A. J. I., & Sergot, M. (1994). On the characterization of law and computer systems: The normative systems perspective. Chichester: Wiley."},{"issue":"3\/4","key":"9233_CR31","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1023\/A:1008747109146","volume":"9","author":"PJ Kammer","year":"2000","unstructured":"Kammer, P. J., Bolcer, G. A., Taylor, R. N., Hitomi, A. S., & Bergman, M. (2000). Techniques for Supporting Dynamic and Adaptive Workflow. Computer Supported Cooperative Work, 9(3\/4), 269\u2013292.","journal-title":"Computer Supported Cooperative Work"},{"issue":"2","key":"9233_CR32","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10458-006-7232-1","volume":"14","author":"A Mallya","year":"2007","unstructured":"Mallya, A., & Singh, M. P. (2007). An algebra for commitment protocols. Autonomous Agents and Multi-Agent Systems, 14(2), 143\u2013163.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9233_CR33","unstructured":"Marengo, E. (2012). 2CL protocols: Interaction patterns specification in commitment protocols. PhD thesis, Universit\u00e0 degli Studi di Torino, Research Doctorate in Science and High Technology, Specialization in Computer Science."},{"key":"9233_CR34","unstructured":"Miller, T., & McGinnis, J. (2008). Amongst first-class protocols. In Proceedings of enginerring societies in the agents world VIII. LNCS (Vol. 4995, pp. 208\u2013223). Heidelberg: Springer."},{"key":"9233_CR35","doi-asserted-by":"crossref","unstructured":"Montali, M. (2010). Specification and verification of declarative open interaction models: A logic-based approach. (Vol. 56). LNBIP. Heidelberg: Springer.","DOI":"10.1007\/978-3-642-14538-4"},{"key":"9233_CR36","doi-asserted-by":"crossref","unstructured":"Montali, M., Pesic, M., van der Aalst, W. M. P., Chesani, F., Mello, P., & Storari, S. (2010). Declarative specification and verification of service choreographies. ACM Transactions on the Web (TWEB), 4(1), 1\u201362.","DOI":"10.1145\/1658373.1658376"},{"key":"9233_CR37","unstructured":"Organisation for Economic Co-operation and Development. (1980). OECD guidelines on the protection of privacy and transborder flows of personal data. Available online. http:\/\/www.oecd.org\/ ."},{"key":"9233_CR38","unstructured":"Pesic, M. (2008). Constraint-based workflow management systems: Shifting control to users. PhD thesis, Eindhoven University of Technology."},{"key":"9233_CR39","unstructured":"Pesic, M., & van der Aalst, W. M. P. (2006). A declarative approach for flexible business processes management. In Business process management workshops (BPM 2006). LNCS (Vol. 4103, pp. 169\u2013180). Berlin: Springer."},{"key":"9233_CR40","unstructured":"Pesic, M., Schonenberg, H., & van der Aalst, W. (2007). DECLARE: Full support for loosely-structured processes. In Proceedings of the 11th IEEE international enterprise distributed object computing conference. Washington, DC: IEEE Computer Society."},{"issue":"1","key":"9233_CR41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1002\/spip.301","volume":"12","author":"G Regev","year":"2007","unstructured":"Regev, G., Bider, I., & Wegmann, A. (2007). Defining business process flexibility with the help of invariants. Software Process: Improvement and Practice, 12(1), 65\u201379.","journal-title":"Software Process: Improvement and Practice"},{"issue":"2","key":"9233_CR42","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1023\/A:1008604709862","volume":"10","author":"M Reichert","year":"1998","unstructured":"Reichert, M., & Dadam, P. (1998). $$\\text{ ADEPT }_{{\\rm flex}}$$ ADEPT flex -Supporting dynamic changes of workflows without losing control. Journal of Intelligent Information Systems, 10(2), 93\u2013129.","journal-title":"Journal of Intelligent Information Systems"},{"key":"9233_CR43","volume-title":"The construction of social reality","author":"J Searle","year":"1995","unstructured":"Searle, J. (1995). The construction of social reality. New York: Free Press."},{"issue":"1","key":"9233_CR44","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1023\/A:1008319631231","volume":"7","author":"MP Singh","year":"1999","unstructured":"Singh, M. P. (1999). An ontology for commitments in multiagent systems. Artificial Intelligence and Law, 7(1), 97\u2013113.","journal-title":"Artificial Intelligence and Law"},{"key":"9233_CR45","unstructured":"Singh, M. P. (2007). Formalizing communication protocols for multiagent systems. In Proceedings of the 20th international joint conference on artificial intelligence (IJCAI 2007) (pp. 1519\u20131524). Hyderabad: AAAI Press."},{"issue":"11","key":"9233_CR46","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MC.2009.347","volume":"42","author":"MP Singh","year":"2008","unstructured":"Singh, M. P., Chopra, A. K., & Desai, N. V. (2008). Commitment-based service-oriented architecture. IEEE Computer, 42(11), 72\u201379.","journal-title":"IEEE Computer"},{"key":"9233_CR47","unstructured":"Telang, P. R., & Singh, M. P. (2010). Abstracting business modeling patterns from RosettaNet. In Service-oriented computing: Agents, semantics, and engineering. Berlin: Springer."},{"key":"9233_CR48","unstructured":"Telang, P. R., & Singh, M. P. (2012). Comma: A commitment-based business modeling methodology and its empirical evaluation. In Proceedings of international conference on autonomous agents and multiagent systems, AAMAS 2012 (pp. 1073\u20131080). IFAAMAS."},{"issue":"3","key":"9233_CR49","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/TSC.2011.4","volume":"5","author":"PR Telang","year":"2012","unstructured":"Telang, P. R., & Singh, M. P. (2012). Specifying and verifying cross-organizational business models: An agent-oriented approach. IEEE Transactions on Services Computing, 5(3), 305\u2013318.","journal-title":"IEEE Transactions on Services Computing"},{"key":"9233_CR50","volume-title":"Workflow management: Models, methods, and systems","author":"WMP Aalst van der","year":"2012","unstructured":"van der Aalst, W. M. P., & van Hee, K. M. (2012). Workflow management: Models, methods, and systems. Cambridge, MA: MIT Press."},{"issue":"2","key":"9233_CR51","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.datak.2004.07.003","volume":"53","author":"WMP Aalst van der","year":"2005","unstructured":"van der Aalst, W. M. P., Weske, M., & Gr\u00fcnbauer, D. (2005). Case handling: A new paradigm for business process support. Data and Knowledge Engineering, 53(2), 129\u2013162.","journal-title":"Data and Knowledge Engineering"},{"key":"9233_CR52","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s00450-009-0057-9","volume":"23","author":"W Aalst van der","year":"2009","unstructured":"van der Aalst, W., Pesic, M., & Schonenberg, H. (2009). Declarative workflows: Balancing between flexibility and support. Computer Science\u2014Research and Development, 23, 99\u2013113.","journal-title":"Computer Science\u2014Research and Development"},{"key":"9233_CR53","unstructured":"Winikoff, M., Liu, W., & Harland, J. (2004). Enhancing commitment machines. In Proceedings of DALT 2004. LNCS (Vol. 3476, pp. 198\u2013220). Heidelberg: Springer."},{"key":"9233_CR54","volume-title":"An introduction to multiagent systems","author":"MJ Wooldridge","year":"2002","unstructured":"Wooldridge, M. J. (2002). An introduction to multiagent systems. Chichester: Wiley."},{"issue":"1","key":"9233_CR55","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.datak.2006.12.001","volume":"63","author":"P Yolum","year":"2007","unstructured":"Yolum, P. (2007). Design time analysis of multiagent protocols. Data and Knowledge Engineering, 63(1), 137\u2013154.","journal-title":"Data and Knowledge Engineering"},{"key":"9233_CR56","unstructured":"Yolum, P., & Singh, M. P. (2001). Commitment machines. In Intelligent agents VIII, Proceedings of ATAL. LNCS (Vol. 2333, pp. 235\u2013247). Heidelberg: Springer."},{"key":"9233_CR57","doi-asserted-by":"crossref","unstructured":"Yolum, P., & Singh, M. P. (2001). Designing and executing protocols using the event calculus. In Proceedings of the 5th international conference on autonomous agents (pp. 27\u201328).","DOI":"10.1145\/375735.375822"},{"key":"9233_CR58","doi-asserted-by":"crossref","unstructured":"Yolum, P., & Singh, M. P. (2002). Flexible protocol specification and execution: applying event calculus planning using commitments. In Proceedings of AAMAS.","DOI":"10.1145\/544862.544867"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-013-9233-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-013-9233-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-013-9233-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T23:18:46Z","timestamp":1596323926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-013-9233-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,15]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["9233"],"URL":"https:\/\/doi.org\/10.1007\/s10458-013-9233-1","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,15]]}}}