28.06.2013 Views

Papers in PDF format

Papers in PDF format

Papers in PDF format

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

These objects together form one object called the Alter Ego. Statically the structure of an object is quite simple.<br />

It is their dynamic behaviour which makes them very powerful and fit for their service as Alter Ego.<br />

To each type a so-called script can be added <strong>in</strong> which the behaviour can be def<strong>in</strong>ed. In pr<strong>in</strong>ciple each object is a<br />

f<strong>in</strong>ite state automaton, which reacts on signals com<strong>in</strong>g from elsewhere (usually messages sent by other objects to<br />

this object) <strong>in</strong> a predef<strong>in</strong>ed way. It is the way these scripts are def<strong>in</strong>ed that is studied <strong>in</strong> this paper.<br />

Consider now an Alter Ego which is an object of type personT and of type studentT. We shall say that <strong>in</strong> this<br />

case there are two sub-objects: a person object and a student object; the Alter Ego object is the s<strong>in</strong>gle object<br />

consist<strong>in</strong>g of both sub-objects.<br />

Logically these objects belong to each other, through the is_a relationship. Physically they are located <strong>in</strong> quite<br />

different worlds, with their own protection rules.<br />

In Fig. 1 these worlds are shown. There are fire-proof walls between these worlds to protect private <strong>in</strong><strong>format</strong>ion.<br />

We will assume that private <strong>in</strong><strong>format</strong>ion is kept <strong>in</strong> attributes declared 'private' <strong>in</strong> Mokum term<strong>in</strong>ology.<br />

We will say a few words here about problems connected to the protection problems. In a more general sett<strong>in</strong>g<br />

these are dealt with <strong>in</strong> [Varadharajan 95], [Olivier 95], and <strong>in</strong> the more specific Mokum environment <strong>in</strong> [vdRiet<br />

94], [vdRiet 95], [vdRiet 96]. We simply assume that the follow<strong>in</strong>g rules from Mokum are implemented:<br />

• the epistemic rule which says that private attributes of some type can be read and changed with<strong>in</strong> the script<br />

of a subtype; the same holds for so-called keepers of a collection of objects of some type;<br />

• the ontological rule which says that only the object itself or the keeper of a collection <strong>in</strong> which that object<br />

lies can read and change the attributes of that object.<br />

Introduc<strong>in</strong>g the notion of collection and a so-called keeper of a collection, it is possible to def<strong>in</strong>e rules for<br />

ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g <strong>in</strong>tegrity and security <strong>in</strong> a very natural way, almost as is done <strong>in</strong> actual practice, where a person is<br />

held responsible for keep<strong>in</strong>g some rules. In our case an object can take the role of a keeper of some rules for a<br />

collection of (other) objects. Such objects can be the hobbies of some cybernaut (as we saw <strong>in</strong> the example type<br />

def<strong>in</strong>ition above of 'personal_assistantT'), but they can also be a collection of customer objects be<strong>in</strong>g kept by a<br />

bank manager.<br />

We have thus def<strong>in</strong>ed with<strong>in</strong> a bank organization how a bank manager can have an assistant who is responsible<br />

for a collection of customers but whose responsibility does not go beyond a certa<strong>in</strong> limit (evidently, the Bar<strong>in</strong>gs<br />

Bank did not restrict Nick Leeson to such a limit, which they pa<strong>in</strong>fully regret).<br />

Above we used a few times the word responsible <strong>in</strong> a very natural way. The word means simply what it says: a<br />

certa<strong>in</strong> task which has to be carried out, such as deal<strong>in</strong>g with f<strong>in</strong>ancial accounts of cybernauts.<br />

Modell<strong>in</strong>g Cyberspace us<strong>in</strong>g Color-X<br />

Consider the situation of the University library borrow<strong>in</strong>g a book to a student. We are work<strong>in</strong>g on a tool, called<br />

Color-X [Burg 95a, 95b, 95c], by means of which this situation can be described:<br />

• very concisely, by means of a diagram,<br />

• very succ<strong>in</strong>ctly us<strong>in</strong>g l<strong>in</strong>guistic tools, such as WordNet, and<br />

• very helpfully, because Mokum scripts for the objects <strong>in</strong>volved can be generated almost automatically.<br />

The diagram specify<strong>in</strong>g the library situation is shown <strong>in</strong> Fig.2. It describes the behaviour of the library system<br />

and a human be<strong>in</strong>g: the user. After obta<strong>in</strong><strong>in</strong>g a pass the user is permitted to borrow a book, which she then has<br />

to return with<strong>in</strong> three weeks. Later on we will change the example and put a personal assistant <strong>in</strong> between. The<br />

boxes <strong>in</strong> the diagram denote actions with some modality:<br />

• PERMIT to <strong>in</strong>dicate that the actions are allowed;

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!