<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ways of Interaction of Autonomous Economic Agents in Decentralized Autonomous Organizations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Denis Virovets</string-name>
          <email>d.virovets.asp@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergiy Obushnyi</string-name>
          <email>s.obushnyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Shtepa</string-name>
          <email>o.shtepa@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hennadii Hulak</string-name>
          <email>h.hulak@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadym Vlasenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>7 Solomenskaya str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>182</fpage>
      <lpage>190</lpage>
      <abstract>
        <p>Decentralized Autonomous Organizations (DAO), which have already become independent participants in the relationship in the Web 3.0 economy, are currently neither decentralized nor autonomous because most of the functions and tools used are still centralized, the management of DAOs still largely depends on collective decision-making by all participants. Greater autonomy can be provided by the use of Autonomous Economic Agents (AEA) in DAOs to organize governance, improve communication between participants, create an autonomous reward system, and speed up the search for information and solutions. AEA can be used as a tool to conclude transactions or implement a part of their functions. The article provides an overview of the main technological developments in the field of AEA and DAO and also describes the main ways they could interact in economic peer-to-peer digital systems, taking into account their role, characteristics, and functions. Attention is also drawn to the economic benefits that a DAO acquires from the use of autonomous agents.</p>
      </abstract>
      <kwd-group>
        <kwd>1 DAO</kwd>
        <kwd>Decentralized Autonomous Organizations</kwd>
        <kwd>Autonomous Economic Agent</kwd>
        <kwd>AEA</kwd>
        <kwd>Multiagent systems</kwd>
        <kwd>Web 3</kwd>
        <kwd>0</kwd>
        <kwd>P2P system</kwd>
        <kwd>smart contracts</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Modern forms of DAO can offer various
services for community members, including
services that help collect information and make
decisions. DAO smart contracts allow you to
create and execute potentially complex business
logic. There is an external trigger outside of the
contract logic. This factor significantly limits the
functionality of reactive systems. Thus, DAO and
smart contract systems cannot be used to create
applications with proactive behavior. The use of
AEAs in DAO could significantly increase the
efficiency of treasury management and decisions
making [1, 2].</p>
      <p>AEAs are intelligent agents acting on behalf of
the owner, with little or no intervention from the
owner, and whose goal is to create economic
value. In a DAO, such agents can perform actions
either on behalf of a participant in the system of
such a DAO, or on behalf of the entire DAO, or
its separate part. This opens up new opportunities
for delegating authority to collect information and
make decisions on behalf of the community.</p>
      <p>
        AEA is a new type of non-personalized
independent subject of economic relations
described in the works of M. Porter. In the new
decentralized (peer-to-peer) systems it will be
difficult to determine the final personalized
participant (stakeholder or beneficiary) due to its
digital anonymity, taking into account the
possibility of its complete replacement by a digital
algorithm (Digital Twin). Thus, EAE can be
represented as a participant in DAO that
autonomously manages assets and makes
decisions contributing to faster, safer, and cheaper
operations. The first autonomous digital agent
was a device called the Turing machine,
developed in 1948 by Alan Turing, an English
mathematician, logician, and cryptographer. Early
autonomous agents were also presented in the
“Mathematical Theory of Communication”
published in 1948 by the American electrical
engineer and mathematician Claude Elwood
Shannon [3], where the author develops the topic
of electronic communication with the
participation of independent (autonomous)
algorithms. Currently, several works devoted to
the use of AEAs in combination with distributed
ledger technologies are being carried out by a
group of scientists led by David Minarsch and
Marco Favorito. They described not only the
concept of using smart contracts in cooperation
with AEAs, but also created a framework for their
subsequent use in decentralized applications [
        <xref ref-type="bibr" rid="ref46">4</xref>
        ].
      </p>
      <p>This paper is structured as follows: In
Section 2 we provide the P2P AEA technology
overview. In Section 3 we follow with a
description of AEAs and DAO Interactions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. P2P AEA Technology Overview</title>
      <p>The application of blockchain technology,
machine learning, artificial intelligence, digital
identity, smart contracts, and robotics opens up
new opportunities for peer-to-peer cooperation
and partnership. A decentralized agent will be
able to make direct peer-to-peer transactions
together with a person, or another similar digital
agent, which in turn makes it possible to develop
the idea of their ability to conclude agreements
cooperating with other persons and robots and
could act as a part without the necessary economic
legal personality in the traditional sense. The
coexistence of robots and humans suggests the
need to study interaction with DAO including
within the framework of behavioral economics,
game theory, and crypto economics.</p>
      <p>It is believed that autonomous agents are
endowed with the following properties: rationality
is an individual property of intelligent agents, as
well as cooperative multi-agent systems or
teamwork, which is important for collective effort
in the DAO community. Following the economic
approach, the agent should maximize the utility
function. To study the properties of autonomous
agents in 1944, von Neumann and Morgenster
created Decision Theory, combining utility theory
with probability theory. In decision theory, a
rational agent is an agent that chooses an action to
maximize expected utility, where expected utility
is defined as the actions available to the agent, the
probabilities of certain outcomes, and the agent’s
preferences for those outcomes. In multi-agent
scenarios where an agent must interact with other
agents, game theory is also a powerful predictive
and analysis tool. To solve problems with a
sequence of multi-agent scenarios, in the late
1950s, Bellman developed Dynamic
Programming based on the use of decision theory
methods. Particular attention was paid to the
interoperability of agents as the ability to interact,
communicate and share knowledge using
communication tools.</p>
      <p>It is known that to receive information and
communications, autonomous economic agents
must have the appropriate tools. In 1990, Yoav
Shoham, a computer scientist and professor at
Stanford University, introduced an agent-oriented
language known as Agent0, which was the first
programming language specifically designed for
mentally structured agents. The language consists
of 4 following components: a set of abilities (what
an agent can do); a set of initial beliefs; a set of
initial commitments (what the agent will do); a set
of rules of conduct (software part) with a precise
indication of the scope of possible actions. To
combine the Multi-agent system on smart
contracts and a peer-to-peer environment a related
protocol for communication between them is
necessary. Such a system is usually called a
Distributed Hash Table (DHT), which consists of
the following components: Agent registration,
Agent search, Agent deregistration, and
Connection protocols. The use of DHT is
associated with the need for certain costs,
including payment for the use of the network,
memory, database, etc., supporting the operation
of peer nodes side [5]. The P2P technology
selected for such activity could be the Solidity
programing language to design and deploy
contracts on the Ethereum network while the
standard to be enhanced to operate on blockchain
will be the Agent Communication Language
released by Foundation for Intelligent Physical
Agents [6]. Interaction with smart contracts
allows to design of the modules for DAO,
necessary for cooperation.</p>
      <p>The use of autonomous agents is currently
already available in the multi-agent peer-to-peer
system for trading baskets of tokens [7].</p>
      <p>
        For DAO we understand an AEA as an
Intelligent agent acting on the owner's behalf with
limited to no interference whose goal is to
generate economic value and allow more
complexity in smart contract logic and execution
layer of decentralized communications [8]. AEA
independently acquires new skills, either through
the direct use of software modules or through
independent or collective learning. Examples of
the use of AEA can be the acquisition of digital
assets at a bargain price, and having the
appropriate negotiation skills [9], while allowing
the possibility of interacting with another agent
autonomously representing the other party to the
transaction. Skills of the AEA consist of three
core abstractions as a Handler, a Behavior, and a
Model, with a Decision Maker with access to the
wallet [
        <xref ref-type="bibr" rid="ref46">4</xref>
        ].
      </p>
      <p>
        The ability to use AEA at the second layer
provides the ability to use tools modeled using
artificial intelligence and machine learning. The
high cost of developing autonomous agents makes
their development difficult for one participant. A
group of developers united in an organization
could pool their efforts and funds to develop such
agents. Currently, two-level models for AEAs are
being developed that can reduce the cost of
interacting with smart contracts [
        <xref ref-type="bibr" rid="ref14 ref17 ref20 ref22 ref24 ref37 ref41 ref48">10</xref>
        ]. Thus, as a
result of the partnership and financial
organization for product development interaction,
the AEA becomes part of the DAO and operates
for the entire community through the digital
organization. In other situations, the DAO may
acquire AEA or gain access to it for its purposes.
In this case, access can be through smart contract
standards specifically modeled for managing
autonomous agents. At the same time, it is
possible to develop various strategies for agents.
The Richer and Competing strategies are
considered as potential, that use a variety of
techniques, including more advanced
Reinforcement Learning (RL) algorithms and
multiple skills implementation [
        <xref ref-type="bibr" rid="ref46">4</xref>
        ].
      </p>
      <p>The problem of interaction between AEAs and
smart contracts is considered in many scientific
papers, where their interaction is confirmed by the
example of experiments and, thus, the possibility
of using them within a single product. Based on
observations and scientific work, the following
hypotheses can be made about the economic
benefits of using AEA in working with DAO.</p>
      <p>The development of peer-to-peer technologies
and the increase in the number of transactions in
networks will lead shortly to the construction of
business networks where agents will negotiate,
trade, cooperate and build partnerships with
people, take part in DAO, and compete in a virtual
social environment. Security and regulatory
issues that apply to agents will become more and
more relevant to create a secure environment that
is comfortable for business. Autonomous agents
will be able to not only share information in DAO
but also perform joint tasks, such as partnering
with financial institutions to detect fraud or
studying customer information profiles without
compromising their privacy. Peer-to-peer data
mining agents can generate certain knowledge
based on data flow, but without collecting the data
in a single repository [11]. Whether AEAs are part
of the DAO architecture or act on behalf of an
individual DAO participant, they interact on their
own in a Peer-to-Peer (P2P) or multi-peer
environment designed for agent interaction. Each
AEA can represent a participant in DAO, a group
of participants, or act on behalf of DAO and
perform certain actions in their interests,
maximizing economic utility [12]. The goal of
each agent may be to maximize the outcome by
engaging in profitable trades based on their
preferences [13].</p>
      <p>
        To interact with elements of a peer-to-peer
environment, an AEA must possess the
appropriate characteristics that can interact with
one or a set of functions of a P2P environment.
For effective interaction of AEAs in a P2P
environment, the following components are
required: means of interaction with AEAs,
messages delivery mechanism, access to a
financial settlement system, and access to a search
and discovery system [
        <xref ref-type="bibr" rid="ref46">4</xref>
        ]. Such functions are
performed by system modules that enable
operations between nodes. Fig. 1 shows some of
the specific functions of a peer.
      </p>
      <sec id="sec-2-1">
        <title>AEAs, as well as DAOs, use the public internet</title>
        <p>for message transport. The agent communication
network allows AEAs to communicate knowing
their cryptographic addresses alone. The Agent
Communication Network (ACN) allows AEAs to
communicate with other peers and agents through
a multi-tier messaging system with a P2P overlay
network at its core. The peers maintain a
distributed hash table that maps addresses to
network addresses. The AEA framework that
provides the tools for creating AEAs allows
developers to use existing protocols, create new
protocols and share them with other developers
via the AEA registry. There is no limit to the type
of interactions AEAs can engage in. A common
example is two AEAs engaging in negotiation
which results in a transaction on a ledger [14].</p>
        <p>The concepts of agent and P2P are closely
related to each other. Agents can improve the
functionality of a P2P system, and a P2P
architecture can become an environment in which
the capabilities of agents are fully exploited. It can
be argued that agent technology is the intersection
point of AI and distributed systems. A possible
solution to the current shortcomings of the P2P
approach is the use of agent technology.
Autonomous agents can perform extended
(dynamic) functions in a P2P network where
nodes (agents) behave intelligently (negotiate,
learn, predict, cooperate, etc.) in one way or
another, and where P2P functions can be
optimized.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. AEAs and DAO Interactions</title>
      <sec id="sec-3-1">
        <title>The use of autonomous agent technology in</title>
        <p>P2P systems along with artificial intelligence
technology is considered fairly new. It is assumed
that agents can be both autonomous and
intelligent objects in the network, having a digital
form in the form of a code, and reside at the nodes,
or move between them. They are endowed with
the ability to independently identify problems or
receive tasks from users or other agents, as well as
discover the necessary resources, communicate
with other agents (negotiate), and offer suitable
solutions. They are also good at learning from the
past, updating their knowledge, and predicting
future events. The main difference between agents
and conventional software is the ability to
independently coordinate, interact and self-learn.
By working together, agents optimally allocate
resources, which can be like teamwork to solve a
problem. With the ability to quickly adapt to new
conditions, the use of agent technology is suitable
for P2P dynamic systems. Such characteristics
make them attractive for use in digital
organizations that need to optimize the use of
digital resources and perform some operations
with such resources.</p>
        <p>A necessary ecosystem for AEAs-DAO
interactions can be built using principles from a
branch of AI known as Multi-Agent Systems.
Implementing agents as smart contracts of a
blockchain may give birth to a completely new
environment where agents’ behavioral and
communication rules will benefit from distributed
ledger properties. Allowing secure
communication among agents, along with
certification of transactions and immutability of
data, will therefore open widespread adoption to a
wide range of problems that are not fulfilled by
classic architectures. This may include a variety
of applications in the Internet-of-Things and Big
Data fields, such as security monitoring of
sensitive sites or management of critical
environmental parameters for early warning [15].</p>
        <p>Multi-Agent Systems, built from their
constituents, and agents, are suited for
multistakeholder environments. Unlike traditional
systems whose constituents are all typically built
by the same developer and designed to work in
harmony, each agent may be built and owned by
a different stakeholder whose interests may not
necessarily be aligned with the others. Despite
their heterogeneity and self-interest, agents find
ways to cooperate and work with other agents,
much like humans. The application of a
MultiParty Computation (MPC) protocol with
incentives for good behavior and penalties should
ensure that the participants behave in good faith
[16].</p>
        <p>Some descriptions of AEAs talk about their
social behavior as the ability of an agent to
interact with external sources and the ability to
share knowledge with other agents to jointly solve
a specific problem [17]. Although agents have
some level of dependency, they are endowed with
communicative properties to jointly search for
resources necessary to solve problems. Thus, it
seems appropriate to use AEAs in the DAO
structure to identify risks and abuse attempts. In
addition to control functions, agents could
perform part of the management functions
delegated to them by participants of DAO, for
example, managing the treasury, negotiating the
terms of transactions, or analyzing and finding a
solution to a problem. Thus, the existence of an
environment where agents could interact creates
the prerequisites for the design of any form of
digital interaction with AEAs, including in the
interests of the community represented by the
digital DAO. Participants in interaction with
EAEs can be not only the agents that jointly create
multi-agent systems, but also participants of
crypto-economy and their digital organizations.</p>
        <p>AEAs in DAO can perform the following roles
and functions: automation of processes involving
smart contracts; automation of management
(decision making and situation analysis);
automation of collecting information for the work
of the DAO, including about the activity of
participants. AEA’s ability to collect information
and improve its skills, as well as the ability to
customize the agent at the discretion of its owner,
will greatly simplify the joint work of the agent
with other participants of the DAO.</p>
        <p>For example, an autonomous agent, being a
participant of the DAO, could coordinate its work
with other participants, including other agents, to
interact more effectively to achieve joint results.
Fig. 2 summarizes the process of finding a
solution to a specific problem using the
interaction of autonomous agents. Agent A,
having received the problem, and understanding
its possible solutions forms 4 subtasks. Subtask 1
is processed by agent A on its own, and each other
subtask is sent to the responsible agent for further
processing. The results are sent back to the
original agent A, which forms a complex
(integral) solution.</p>
        <p>With a range of tools, agents can efficiently
search P2P systems to find the information they
need. It is believed that the huge potential of
agents can be applied in the discovery of medical
records and data mining. A P2P technology for
classifying and indexing medical data and a
complete ontology in the field of healthcare using
artificial intelligence is one example of the
implementation of an autonomous economic
agent. Data mining often requires the
implementation of a series of searches, therefore,
agents, have the tools to search for the necessary
data, save resources and time, constantly improve
their skills by refining the search for the necessary
data, and also improve methods in the process.
Agents make decisions based on experience, and
can also provide information about the data they
collect and their actions to database
administrators, who in turn can, through
interaction, configure and improve the work of
agents (improve and customize their search
engines) [18]. Having a constant flow of
information at their disposal, agents can
determine the deviations from the norm of those
objects of observation that are in their “field of
view”, analyze such data, or send them to
analytical applications according to the
appropriate subscription, acting as a data
provider.</p>
        <p>
          In such a partnership, it is possible to create
alliances of agents or agent communities that will
not necessarily interact for the benefit of the entire
DAO. Agents will likely learn to create their own
DAO to combine skills and make common
decisions, as well as carry out verifiable
computations [
          <xref ref-type="bibr" rid="ref29">19</xref>
          ]. In this case, it makes sense to
talk about fully autonomous DAOs, in which
agents will be crucial for the DAO. Accordingly,
DAOs with human control will be considered
limitedly autonomous. Characteristics of the
autonomy of DAO depend on the absence of a
single control center and the use of autonomous
agents in its activity. As an extreme version of an
autonomous organization, we can imagine a
completely autonomous DAO created only by
autonomous agents, fully controlling its activities
and not depending on the provision of resources
by other participants, including disconnecting
them from individual nodes. It seems possible to
call them ultra-autonomous DAO. There are
practical difficulties in creating such completely
independent agents, but with the development of
technology, it is quite possible.
        </p>
        <p>
          Thus, we can judge the appearance of
datadriven and fully automated organizations, known
as Artificial Intelligence DAOs, and becoming a
major threat to most traditional organizations in
the years to come. As the goal of a DAO is the
absence of human hierarchical management, any
interaction between humans and organizations
can be automated with a delegation of all
management and administrative functions to
AEAs that autonomously take decisions. Such a
type of DAO could create its products and
services using AEAs and sell them. The concept
of DAO headed by Artificial Intelligence, as a
completely human-less without any external
support and no hierarchy organization, can be
implemented in Generative Adversarial Network
to generate art [
          <xref ref-type="bibr" rid="ref8">20</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Depending on the goals in DAO, we</title>
        <p>distinguish the following types of interactions of
AEAs (see Table 3).</p>
        <p>When it comes to concrete use cases with
AEAs in DAO, we can identify the following ones
(see Table 4).</p>
        <p>Characteristics
Selects the best companies or users to place advertising. AEA evaluates the ROI
after each marketing cycle and adjusts its marketing actions according
Trades the creations made using generative models and distribute profits as
cryptocurrency tokens to their shareholders. They can identify new trends (NLP
on social media), create their object, and sell it online
Takes money, delivers the goods or services, automatically re-orders the goods,
and manages accompanying services.</p>
        <p>The autonomous entity acts, directing its activity towards achieving goals, upon
an environment using observation through sensors and consequent actuators.
Intelligent agents may also learn or use knowledge to achieve their goals. They
may be very simple or very complex. Is capable of understanding the world as
well as any human, and with the same capacity to learn how to carry out a huge
range of tasks.</p>
        <p>Selects the best companies or users to place advertising. AEA evaluates the ROI
after each marketing cycle and adjusts its marketing actions according.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Thus, to understand the role and place of an</title>
        <p>autonomous agent in the economic system, we can
give it the following definition: An Autonomous
Economic Agent (AEA) is an intelligent agent
acting on its behalf or on behalf of the owner with
limited intervention from the owner or other
agents, or without such interference, and whose
purpose is to create economic value for its owner
or search for its resource. As a rule, AEAs have a
narrow goal with a purposeful focus, assuming
some economic benefit. It is believed that the
autonomous operation of an agent is achieved
through the use of peer-to-peer systems and
certain algorithms (smart contracts) that underlie
the architecture of agents and allow secure
transactions without the participation of third
parties. At the same time, they will be autonomous
if such a model does not require input from an
individual user.</p>
        <p>AEAs are also special in that they are created
to generate some economic value through
specialized software modules or digital skills.
Using a method that translates smart contracts into
probabilistic logic can be used AEA could analyze
the expected values of several smart contracts’
utility parameters [21]. AEA independently
acquires new skills, either through the direct use
of software modules or through independent or
collective learning. Examples of the use of AEA
can be the acquisition of digital assets at a bargain
price, and having the appropriate negotiation
skills, while allowing the possibility of interacting
with another agent autonomously representing the
other party to the transaction.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>Agents and DAOs that can interact in P2P
systems use specially designed frameworks when
interacting. At the same time, mutually beneficial
interaction between the community and
autonomous agents is ensured. Communities can
use agents to optimize decision-making and
resource use, and agents are interested in
acquiring new skills and participating in
collective knowledge. Probable further studies
will be directed to the design of agents for use in
DAO as tools or as a decision-making center.
Agents used in DAO will be able to hire experts,
conduct negotiations with them and conclude
deals, create teams based on the skills of
participants, fairly distribute rewards based on the
assessment of the effectiveness and contribution
of each participant, manage the community,
create requests and tasks, monitor the execution of
work, and perform other functions in a digital
organization.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
      <sec id="sec-5-1">
        <title>Z. Brzhevska, et al., Analysis of the Process</title>
        <p>of Information Transfer from the
Sourceto-User in Terms of Information Impact, in:
Cybersecurity Providing in Information
and Telecommunication Systems II, vol.
3188 (2021) 257–264.</p>
        <p>B. Bebeshko, et al., Application of Game
Theory, Fuzzy Logic and Neural Networks
for Assessing Risks and Forecasting Rates
of Digital Currency, Journal of Theoretical</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>7390</fpage>
          -
          <lpage>7404</lpage>
          . [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Shannon</surname>
          </string-name>
          , A Mathematical Theory of
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>Technical Journal</source>
          ,
          <volume>27</volume>
          (
          <year>1948</year>
          )
          <fpage>379</fpage>
          -
          <lpage>423</lpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          623-
          <fpage>656</fpage>
          . [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Minarsch</surname>
          </string-name>
          , et al., Autonomous Economic
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Agent</given-names>
            <surname>Systems</surname>
          </string-name>
          : 9th International
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Workshop</surname>
          </string-name>
          , EMAS 2021,
          <string-name>
            <surname>Virtual</surname>
            <given-names>Event</given-names>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>May</source>
          <year>2021</year>
          ,
          <fpage>237</fpage>
          -
          <lpage>253</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          030-
          <fpage>97457</fpage>
          -2_
          <issue>14</issue>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Rahmani</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Peer-</surname>
          </string-name>
          to-Peer
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Network</surname>
          </string-name>
          , 20th International Conference on
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , AAMAS '21, International
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>Multiagent</given-names>
            <surname>Systems</surname>
          </string-name>
          , Richland, SC,
          <fpage>1037</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          1045. [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.,
          <source>Assessing Approaches of</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>IT Infrastructure Audit, in: IEEE 8th</mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2021</year>
          ). doi:
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          10.1109/picst54195.
          <year>2021</year>
          .
          <volume>9772181</volume>
          [7]
          <string-name>
            <given-names>D.</given-names>
            <surname>Minarsch</surname>
          </string-name>
          , et al., Autonomous Economic
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Use-Case</surname>
            <given-names>Demonstration</given-names>
          </string-name>
          ,
          <year>2020</year>
          Crypto
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Switzerland</surname>
          </string-name>
          ,
          <year>2020</year>
          ,
          <fpage>27</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>doi:10.1109/CVCBT50464</source>
          .
          <year>2020</year>
          .
          <volume>00007</volume>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Obushnyi</surname>
          </string-name>
          , et al.,
          <source>Ensuring Data Security</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
            <given-names>II</given-names>
          </string-name>
          ,
          <volume>3187</volume>
          (
          <year>2021</year>
          )
          <fpage>284</fpage>
          -
          <lpage>292</lpage>
          . [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Scoca</surname>
          </string-name>
          , et al.,
          <source>Smart Contract</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>Negotiation in Cloud Computing</source>
          ,
          <year>2017</year>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>IEEE 10th International Conference on</mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>HI</surname>
          </string-name>
          , USA,
          <year>2017</year>
          ,
          <fpage>592</fpage>
          -
          <lpage>599</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <source>doi:10</source>
          .1109/CLOUD.
          <year>2017</year>
          .
          <volume>81</volume>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Uriarte</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Distributed</surname>
          </string-name>
          Service-Level
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>Computat</given-names>
            <surname>Pract Exper</surname>
          </string-name>
          .
          <volume>33</volume>
          (
          <issue>14</issue>
          ) (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <source>doi:10</source>
          .1002/cpe.5800 [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Obushnyi</surname>
          </string-name>
          , et al.,
          <source>Autonomy of Economic</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>and Telecommunication Systems</source>
          <year>2022</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>125</fpage>
          -
          <lpage>133</lpage>
          . [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          Bench-Capon, States,
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Reasoning</surname>
          </string-name>
          , Argument Comput.
          <volume>7</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          135-
          <fpage>154</fpage>
          . doi:
          <volume>10</volume>
          .3233/AAC-
          <volume>160011</volume>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Minarsch</surname>
          </string-name>
          , et al.,
          <source>Trading Agent</source>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>Agents</surname>
          </string-name>
          , 19th International Conference on
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          (AAMAS '20). International
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <given-names>Multiagent</given-names>
            <surname>Systems</surname>
          </string-name>
          , Richland, SC,
          <fpage>2107</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          2110. [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , P. Skladannyi,
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <given-names>Wireless</given-names>
            <surname>Systems</surname>
          </string-name>
          , in: Workshop of the 8th
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <source>and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          233. [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Facchini</surname>
          </string-name>
          . Decentralized Autonomous
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <given-names>Doctoral</given-names>
            <surname>Consortium</surname>
          </string-name>
          ,
          <fpage>5851</fpage>
          -
          <lpage>5852</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <source>doi:10</source>
          .24963/ijcai.
          <year>2022</year>
          /
          <volume>828</volume>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Botta</surname>
          </string-name>
          , et al., Shielded Computations in
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <source>Lecture Notes in Computer Science</source>
          ,
          <volume>12674</volume>
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -64322-8 [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Balaji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Srinivasan</surname>
          </string-name>
          , An Introduction to
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <string-name>
            <given-names>Computational</given-names>
            <surname>Intelligence</surname>
          </string-name>
          ,
          <volume>310</volume>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <source>doi: 10</source>
          .1007/978-3-
          <fpage>642</fpage>
          -14435-
          <issue>6</issue>
          _
          <fpage>1</fpage>
          [18]
          <string-name>
            <given-names>G.</given-names>
            <surname>Moro</surname>
          </string-name>
          , et al.,
          <article-title>Agents and Peer-to-Peer</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <surname>Science</surname>
          </string-name>
          ,
          <volume>2530</volume>
          (
          <year>2003</year>
          ). doi:
          <volume>10</volume>
          .1007/3-540-
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          45074-
          <fpage>2</fpage>
          _
          <fpage>1</fpage>
          [19]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kerber</surname>
          </string-name>
          , Verifiable Computation in
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          <string-name>
            <given-names>Smart</given-names>
            <surname>Contracts</surname>
          </string-name>
          .
          <source>4th Year Project Report</source>
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          University of Edinburgh,
          <year>2017</year>
          . [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yadlapalli</surname>
          </string-name>
          , et al.,
          <source>Artificially Intelligent</source>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>4th International Conference on Information</mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          <source>(ISCON)</source>
          ,
          <year>2019</year>
          ,
          <fpage>667</fpage>
          -
          <lpage>671</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <source>doi:10.1109/ISCON47742</source>
          .
          <year>2019</year>
          .
          <volume>9036152</volume>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Azzolini</surname>
          </string-name>
          , et al.,
          <source>Modeling Smart</source>
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <string-name>
            <surname>Systems Workshops. BIS</surname>
          </string-name>
          <year>2020</year>
          . Lecture
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          394. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -61146-
          <issue>0</issue>
          _
          <fpage>7</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>