Taking advantage of the multiple inheritance of protocols