{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:22:52Z","timestamp":1725549772730},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291381"},{"type":"electronic","value":"9783540319771"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11561347_26","type":"book-chapter","created":{"date-parts":[[2005,10,3]],"date-time":"2005-10-03T08:41:30Z","timestamp":1128328890000},"page":"389-404","source":"Crossref","is-referenced-by-count":5,"title":["Component-Oriented Programming with Sharing: Containment is Not Ownership"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Hirschkoff","sequence":"first","affiliation":[]},{"given":"Tom","family":"Hirschowitz","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Pous","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Schmitt","sequence":"additional","affiliation":[]},{"given":"Jean-Bernard","family":"Stefani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-40042-4_4","volume-title":"Global Computing. Programming Environments, Languages, Security, and Analysis of Systems","author":"L. Bettini","year":"2003","unstructured":"Bettini, L., Bono, V., De Nicola, R., Ferrari, G., Gorla, D., Loreti, M., Moggi, E., Pugliese, R., Tuosto, E., Venneri, B.: The KLAIM project: Theory and practice. In: Priami, C. (ed.) GC 2003. LNCS, vol.\u00a02874, pp. 88\u2013150. Springer, Heidelberg (2003)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-540-24774-6_3","volume-title":"Component-Based Software Engineering","author":"E. Bruneton","year":"2004","unstructured":"Bruneton, E., Coupaye, T., Leclercq, M., Qu\u00e9ma, V., Stefani, J.-B.: An open component model and its support in Java. In: Crnkovi\u0107, I., Stafford, J.A., Schmidt, H.W., Wallnau, K. (eds.) CBSE 2004. LNCS, vol.\u00a03054, pp. 7\u201322. Springer, Heidelberg (2004)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/3-540-45500-0_2","volume-title":"Theoretical Aspects of Computer Software TACS","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Boxed ambients. In: Theoretical Aspects of Computer Software TACS. LNCS, vol.\u00a02215, pp. 38\u201363. Springer, Heidelberg (2001)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/BFb0053547","volume-title":"Foundations of Software Science and Computation Structures","author":"L. Cardelli","year":"1998","unstructured":"Cardelli, L., Gordon, A.D.: Mobile ambients. In: Nivat, M. (ed.) FOSSACS 1998. LNCS, vol.\u00a01378, pp. 140\u2013155. Springer, Heidelberg (1998)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-36206-1_9","volume-title":"FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science","author":"G. Castagna","year":"2002","unstructured":"Castagna, G., Zappa Nardelli, F.: The Seal calculus revisited: Contextual equivalence and bisimilarity. In: Agrawal, M., Seth, A.K. (eds.) FSTTCS 2002. LNCS, vol.\u00a02556, pp. 85\u201396. Springer, Heidelberg (2002)"},{"key":"26_CR6","unstructured":"Clarke, D.: Object Ownership and Containment. PhD thesis, University of New South Wales, Australia (2001)"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45070-2_9","volume-title":"European Conference on Object-Oriented Programming ECOOP 2003","author":"D. Clarke","year":"2003","unstructured":"Clarke, D., Wrigstad, T.: External uniqueness is unique enough. In: Cardelli, L. (ed.) ECOOP 2003. LNCS, vol.\u00a02743, pp. 176\u2013201. Springer, Heidelberg (2003)"},{"key":"26_CR8","series-title":"Electronic Notes in Theoretical Computer Science","volume-title":"Computing: the Australasian Theory Symposium","author":"M. Coppo","year":"2003","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Giovannetti, E., Salvo, I.: M3: Mobility types for mobile processes in mobile ambients. In: Computing: the Australasian Theory Symposium. Electronic Notes in Theoretical Computer Science, vol.\u00a078. Elsevier, Amsterdam (2003)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/11417019_11","volume-title":"Coordination Models and Languages","author":"R. Nicola De","year":"2005","unstructured":"De Nicola, R., Gorla, D., Pugliese, R.: Global computing in a dynamic network of tuple spaces. In: Jacquet, J.-M., Picco, G.P. (eds.) COORDINATION 2005. LNCS, vol.\u00a03454, pp. 157\u2013172. Springer, Heidelberg (2005)"},{"key":"26_CR10","volume-title":"POPL","author":"C. Fournet","year":"1996","unstructured":"Fournet, C., Gonthier, G.: The reflexive chemical abstract machine and the Join-calculus. In: POPL. ACM Press, New York (1996)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-540-24727-2_18","volume-title":"Foundations of Software Science and Computation Structures","author":"M. Hennessy","year":"2004","unstructured":"Hennessy, M., Rathke, J., Yoshida, N.: SafeDpi: a language for controlling mobile code. In: Walukiewicz, I. (ed.) FOSSACS 2004. LNCS, vol.\u00a02987, pp. 241\u2013256. Springer, Heidelberg (2004)"},{"key":"26_CR12","series-title":"ENTCS","volume-title":"International Workshop on High-Level Concurrent Languages","author":"M. Hennessy","year":"1998","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. In: International Workshop on High-Level Concurrent Languages. ENTCS, vol.\u00a016(3). Elsevier, Amsterdam (1998)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Hogg, J., Lea, D., Wills, A., de Champeaux, D., Holt, R.: The Geneva convention on the treatment of object aliasing (1991)","DOI":"10.1145\/130943.130947"},{"key":"26_CR14","volume-title":"POPL","author":"F. Levi","year":"2000","unstructured":"Levi, F., Sangiorgi, D.: Controlling interference in ambients. In: POPL. ACM Press, New York (2000)"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-540-24851-4_19","volume-title":"ECOOP 2004 \u2013 Object-Oriented Programming","author":"Y.D. Liu","year":"2004","unstructured":"Liu, Y.D., Smith, S.F.: Modules with interfaces for dynamic linking and communication. In: Odersky, M. (ed.) ECOOP 2004. LNCS, vol.\u00a03086, pp. 415\u2013439. Springer, Heidelberg (2004)"},{"key":"26_CR16","series-title":"ENTCS","volume-title":"FGC","author":"A. Ravara","year":"2003","unstructured":"Ravara, A., Matos, A., Vasconcelos, V., Lopes, L.: Lexically scoped distribution: what you see is what you get. In: FGC. ENTCS, vol.\u00a085(1). Elsevier, Amsterdam (2003)"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-31794-4_9","volume-title":"Global Computing","author":"A. Schmitt","year":"2005","unstructured":"Schmitt, A., Stefani, J.-B.: The Kell calculus: A family of higher-order distributed process calculi. In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS, vol.\u00a03267, pp. 146\u2013178. Springer, Heidelberg (2005)"},{"key":"26_CR18","series-title":"ENTCS","volume-title":"FGC","author":"J.-B. Stefani","year":"2003","unstructured":"Stefani, J.-B.: A calculus of Kells. In: FGC. ENTCS, vol.\u00a085(1). Elsevier, Amsterdam (2003)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Wojciechowski, P.T., Sewell, P.: Nomadic Pict: Language and infrastructure design for mobile agents. Concurrency, 8(2) (2000)","DOI":"10.1109\/4434.846193"},{"key":"26_CR20","volume-title":"LICS","author":"N. Yoshida","year":"2000","unstructured":"Yoshida, N., Hennessy, M.: Assigning types to processes. In: LICS. IEEE, Los Alamitos (2000)"}],"container-title":["Lecture Notes in Computer Science","Generative Programming and Component Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11561347_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T01:48:25Z","timestamp":1626572905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11561347_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291381","9783540319771"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11561347_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}