Skip to main content
Springer Nature Link
Account
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Autonomous Agents and Multi-Agent Systems
  3. Article

Engineering and verifying agent-oriented requirements augmented by business constraints with \({\mathcal{B}}\)-Tropos

  • Open access
  • Published: 14 May 2010
  • Volume 23, pages 193–223, (2011)
  • Cite this article

You have full access to this open access article

Download PDF
Autonomous Agents and Multi-Agent Systems Aims and scope Submit manuscript
Engineering and verifying agent-oriented requirements augmented by business constraints with \({\mathcal{B}}\)-Tropos
Download PDF
  • Marco Montali1,
  • Paolo Torroni1,
  • Nicola Zannone2,
  • Paola Mello1 &
  • …
  • Volha Bryl3 
  • 1147 Accesses

  • 8 Citations

  • Explore all metrics

Abstract

We propose \({\mathcal{B}}\)-Tropos as a modeling framework to support agent-oriented systems engineering, from high-level requirements elicitation down to execution-level tasks. In particular, we show how \({\mathcal{B}}\)-Tropos extends the Tropos methodology by means of declarative business constraints, inspired by the ConDec graphical language. We demonstrate the functioning of \({\mathcal{B}}\)-Tropos using a running example inspired by a real-world industrial scenario, and we describe how \({\mathcal{B}}\)-Tropos models can be automatically formalized in computational logic, discussing formal properties of the resulting framework and its verification capabilities.

Article PDF

Download to read the full article text

Similar content being viewed by others

Formal verification of group and propagated trust in multi-agent systems

Article 03 March 2022

Formal Verification of BDI Agents

Chapter © 2025

Indicators for Open Issues in Business Process Models

Chapter © 2016

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Algebraic Logic
  • Formal Logic
  • Multiagent Systems
  • Standards
  • Theory and Algorithms for Application Domains
  • Agent-based Economics
Use our pre-submission checklist

Avoid common mistakes on your manuscript.

References

  1. Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., & Mello, P. (2006). A verifiable logic-based agent architecture. In Proceedings of the 16th international syposium on methodologies for intelligent systems. Lecture Notes in Computer Science (Vol. 4203, pp.188–197). Springer.

  2. Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Montali, M., et al. (2006). Computational logic for run-time verification of Web services choreographies: Exploiting the SOCS-SI tool. In: M. Bravetti, M. Núñez, & G. Zavattaro, (Eds.), Proceedings of the 3rd international workshop on Web services and formal methods, Lecture Notes in Computer Science (Vol. 4184, pp. 58–72). Springer.

  3. Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., & Torroni, P. (2005). On the automatic verification of interaction protocols using g-SCIFF. Technical Report DEIS-LIA-04-004, University of Bologna.

  4. Alberti M., Chesani F., Gavanelli M., Lamma E., Mello P., Torroni P. (2006) Compliance verification of agent interaction: A logic-based software tool. Applied Artificial Intelligence 20(2–4): 133–157

    Article  Google Scholar 

  5. Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., & Torroni, P. (2006). Security protocols verification in Abductive Logic Programming: A case study. In: O. Dikenelli, M.-P. Gleizes, & A. Ricci (Eds.), Proceedings of the 6th international workshop on engineering societies in the agents world, Lecture Notes in Artificial Intelligence (Vol. 3963, pp. 106–124). Springer.

  6. Alberti M., Chesani F., Gavanelli M., Lamma E., Mello P., Torroni P. (2008) Verifiable agent interaction in abductive logic programming: The SCIFF framework. ACM Transactions on Computational Logic (TOCL) 9(4): 29

    MathSciNet  Google Scholar 

  7. Antón, A. I., & Potts, C. (1998) The use of goals to surface requirements for evolving systems. In Proceedings of 20th the international conference on software engineering (pp 157–166). IEEE Press.

  8. Bleistein J., Cox K., Verner J., Phalp T. (2005) Requirements engineering for e-business advantage. Requirements Engineering 11(1): 4–16

    Article  Google Scholar 

  9. Bresciani P., Giorgini P., Giunchiglia F., Mylopoulos J., Perini A. (2004) TROPOS: An agent-oriented software development methodology. Journal of Autonomous Agents and Multi-Agent Systems 8(3): 203–236

    Article  Google Scholar 

  10. Bryl, V., Massacci, F., Mylopoulos, J., & Zannone, N. (2006). Designing security requirements models through planning. In Proceedings of the 18th international conference on advanced information systems engineering, Lecture Notes in Computer Science (Vol. 4001, pp. 33–47). Springer.

  11. Bryl, V., Mello, P., Montali, M., Torroni, P., & Zannone, N. (2008) \({\mathcal{B}}\)-Tropos: Agent-oriented requirements engineering meets computational logic for declarative business process modeling and verification. In: F. Sadri & K. Satoh (Eds.), Proceedings of the 8th international workshop on computational logic in multi-agent systems, Lecture Notes in Artificial Intelligence (Vol. 5056, pp. 157–176). Springer.

  12. Buhr R. J. A. (1998) Use case maps as architectural entities for complex systems. TSE 24(12): 1131–1155

    Google Scholar 

  13. Caire G., Coulier W., Garijo F., Gomez-Sanz J., Pavon J., Kearney P. et al (2004) The message methodology. Methodologies and Software Engineering for Agent Systems 11: 177–194

    Article  Google Scholar 

  14. Chesani, F., Mello, P., Montali, M., & Torroni, P. (2009). Commitment tracking via the reactive event calculus. In: C. Boutilier (Ed.), IJCAI 2009, Proceedings of the 21st International joint conference on artificial intelligence, Pasadena, CA, USA, July 11–17, 2009, pp. 91–96.

  15. Chesani, F., Mello, P., Montali, M., & Torroni, P. (2009). Verification of choreographies during execution using the reactive event calculus. In: R. Bruni & K. Wolf (Eds.), Web services and formal methods, 5th international workshop, WS-FM 2008, Milan, Italy, September 4–5, 2008, Revised Selected Papers, Lecture Notes in Computer Science (Vol. 5387, pp 55–72). Springer.

  16. Chung, L. K., Nixon, B. A., Yu, E., & Mylopoulos, J. (2000). Non-functional requirements in software engineering. Kluwer Publishing.

  17. Dardenne A., van Lamsweerde A., Fickas S. (1993) Goal-directed requirements acquisition. Science of Computer Programming 20: 3–50

    Article  MATH  Google Scholar 

  18. De la Vara González, J. L., & Díaz, J. S. (2007) Business process-driven requirements engineering: A goal-based approach. In Proceedings of the 8th workshop on business process modeling, development, and support.

  19. Fisher, M. (2005). Implementing temporal logics: Tools for execution and proof (tutorial paper). In: F. Toni & P. Torroni (Eds.), CLIMA VI, Lecture Notes in Computer Science (Vol. 3900, pp. 129–142). Springer.

  20. Frankova, G., Massacci, F., & Seguran, M. (2007). From early requirements analysis towards secure workflows. In Proceedings of the joint iTrust and PST conferences on privacy, trust management and security.

  21. Fung T. H., Kowalski R. A. (1997) The IFF proof procedure for abductive logic programming. Journal of Logic Programming 33(2): 151–165

    Article  MATH  MathSciNet  Google Scholar 

  22. Fuxman A., Liu L., Mylopoulos J., Pistore M., Roveri M., Traverso P. (2004) Specifying and analyzing early requirements in tropos. Requirements Engineering 9(2): 132–150

    Article  Google Scholar 

  23. Haglind, M., Johansson, L., & Rantzer, M. (1998) Experiences integrating requirements engineering and business analysis an empirical study of operations & management system procurement projects. In Proceedings of the 3rd international conference on requirements engineering (pages 108–117). IEEE Computer Society.

  24. Henderson-Sellers, B., & Giorgini, P. (Eds.). (2005). Agent-oriented methodologies. Idea Group Publishing

  25. Iglesias, C. A., Garijo, M., & Centeno-González, J. (1999). A Survey of agent-oriented methodologies. In Proceedings of the 5th international workshop on intelligent agents V, agent theories, architectures, and languages (pp. 317–330). London, UK. Springer.

  26. Jackson, M. (2001). Problem frames: Analysing and structuring software development problems. Addison Wesley.

  27. Jacobson, I., Ericsson, M., & Jacobson, A. (1994) The object advantage: Business process reengineering with object technology. ACM Press/Addison-Wesley Publishing Co.

  28. Jaffar J., Maher M. (1994) Constraint logic programming: A survey. Journal of Logic Programming 19(20): 503–582

    Article  MathSciNet  Google Scholar 

  29. Johansson, H. J., McHugh, P., Pendlebury, A. J., & Wheeler, W. A. (1993). Business process reengineering—Breakpoint strategies for market dominance. Wiley.

  30. Kakas A. C., Kowalski R. A., Toni F. (1993) Abductive logic programming. Journal of Logic and Computation 2(6): 719–770

    Article  MathSciNet  Google Scholar 

  31. Kazhamiakin, R., Pistore, M., & Roveri, M. (2004). A framework for integrating business processes and business requirements. In Proceedings of the 8th international enterprise distributed object computing conference (pp. 9–20). IEEE Press.

  32. Kiyavitskaya, N., Moretti, R., Sebastianis, M., & Zannone, N. (2007). Project Report on the Initial Analysis of (Early) Requirements of Domain 1. TOCAI Deliverable D2.1, University of Rome “La Sapienza,”. Online resource, http://www.dis.uniroma1.it/~tocai/

  33. Lamport L. (1994) How to write a long formula. Formal Aspects of Computing 6(5): 580–584

    Article  Google Scholar 

  34. Liu, L., & Yu, E. (2001). From requirements to architectural design: Using goals and scenarios. In Proceedings of the 1st international workshop on software requirements and architectures.

  35. Loucopoulos, P. (2003). The S3 (Strategy-Service-Support) framework for business process modelling. In Proceedings of the workshop on requirements engineering for business process support, CEUR Workshop Proceedings (Vol. 75). CEUR-WS.org

  36. Massacci, F., Mylopoulos, J., & Zannone, N. (2007). An ontology for secure socio-technical systems. In Handbook of ontologies for business interaction. The IDEAGroup

  37. Mayr, H. C., Kop, C., & Esberger, D. (2007). Business process modeling and requirements modeling. In Proceedings of the 1st international conference on the digital society (p. 8). IEEE Computer Society.

  38. Montali, M. (2009). Specification and verification of declarative open interaction models: A Logic-based framework. PhD thesis, University of Bologna.

  39. Montali, M., Pesic, M., van der Aalst, W. M. P., Chesani, F., Mello, P., & Storari S. (2009). Declarative specification and verification of service choreographies. ACM Transactions on the Web, (accepted with minor revision.)

  40. Montali, M., Torroni, P., Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., et al. (2008). Verification from declarative specifications using logic programming. In: M. G. de la Banda & E. Pontelli (Eds.), Proceedings of the 24th international conference on logic programming, Lecture Notes in Computer Science (Vol. 5366, pp. 440–454). Springer.

  41. Montali, M., Torroni, P., Alberti, M., Chesani, F., Lamma, E., & Mello, P. (2010). Abductive logic programming as an effective technology for the static verification of declarative business processes. Special Issue of Journal of Algorithms in Cognition, Informatics and Logic (expected).

  42. Ould, M. (1995). Business process: Modelling and analysis for re-engineering and improving. Wiley.

  43. Rubens J. (2007) Business analysis and requirements engineering: the same, only different?. Requirements Engineering 12(2): 121–123

    Article  Google Scholar 

  44. Schonenberg, H., Mans, R., Russell, N., Mulyar, N., & van der Aalst, W. M. (2008). Towards a taxonomy of process flexibility. In: Z. Bellahsene, C. Woo, E. Hunt, X. Franch, & R. Coletta (Eds.), Proceedings of the forum at the CAiSE’08 conference. CEUR workshop proceedings (Vol. 344, pp. 81–84).

  45. van der Aalst, W. M. P., & Pesic, M. (2006) A declarative approach for flexible business processes management. In Proceedings of the 4th international conference on business process management, Lecture Notes in Computer Science (Vol. 4103, pp. 169–180). Springer.

  46. van der Aalst, W. M. P., & Pesic, M. (2006) DecSerFlow: Towards a truly declarative service flow language. In Proceedings of the 3rd international workshop on web services and formal models, Lecture Notes in Computer Science (Vol. 4184).

  47. van der Aalst W. M. P., ter Hofstede A. H. M., Kiepuszewski B., Barros A. P. (2003) Workflow patterns. Distributed and Parallel Databases 14(1): 5–51

    Article  Google Scholar 

  48. Vilain, M., Kautz, H., & van Beek, P. (1990). Constraint propagation algorithms for temporal reasoning: A revised report. In: Readings in qualitative reasoning about physical systems (pp. 373–381). San Francisco, CA: Morgan Kaufmann Publishers Inc.

  49. Wood, M. F., & DeLoach, S. A. (2001). An overview of the multiagent systems engineering methodology. In Proceedings of first international workshop on agent-oriented software engineering (pp. 207–221). Springer-Verlag New York, Inc.

  50. Xanthakos, I. (2003). Semantic integration of information by abduction. PhD thesis, Imperial College London. Available online, http://www.doc.ic.ac.uk/~ix98/PhD.zip

  51. Yi, C.-H., & Johannesson, P. (1999). Beyond goal representation: Checking goal-satisfaction by temporal reasoning with business processes. In Proceedings of CAiSE’99 LNCS (Vol. 1626, pp.462–466). Springer.

  52. Zambonelli F., Jennings N. R., Wooldridge M. (2003) Developing multiagent systems: The Gaia methodology. ACM Transactions on Software Engineering and Methodology (TOSEM) 12(3): 317–370

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. University of Bologna, Bologna, Italy

    Marco Montali, Paolo Torroni & Paola Mello

  2. Eindhoven University of Technology, Eindhoven, The Netherlands

    Nicola Zannone

  3. FBK-IRST, Povo, TN, Italy

    Volha Bryl

Authors
  1. Marco Montali
    View author publications

    Search author on:PubMed Google Scholar

  2. Paolo Torroni
    View author publications

    Search author on:PubMed Google Scholar

  3. Nicola Zannone
    View author publications

    Search author on:PubMed Google Scholar

  4. Paola Mello
    View author publications

    Search author on:PubMed Google Scholar

  5. Volha Bryl
    View author publications

    Search author on:PubMed Google Scholar

Corresponding author

Correspondence to Paolo Torroni.

Rights and permissions

Open Access This is an open access article distributed under the terms of the Creative Commons Attribution Noncommercial License (https://creativecommons.org/licenses/by-nc/2.0), which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.

Reprints and permissions

About this article

Cite this article

Montali, M., Torroni, P., Zannone, N. et al. Engineering and verifying agent-oriented requirements augmented by business constraints with \({\mathcal{B}}\)-Tropos. Auton Agent Multi-Agent Syst 23, 193–223 (2011). https://doi.org/10.1007/s10458-010-9135-4

Download citation

  • Published: 14 May 2010

  • Issue date: September 2011

  • DOI: https://doi.org/10.1007/s10458-010-9135-4

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Business Process
  • Requirement Engineering
  • Integrity Constraint
  • Linear Temporal Logic
  • Requirement Engineer

Profiles

  1. Marco Montali View author profile
Use our pre-submission checklist

Avoid common mistakes on your manuscript.

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

Not affiliated

Springer Nature

© 2025 Springer Nature