{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:28:31Z","timestamp":1761611311291,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":27,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475710182"},{"type":"electronic","value":"9780387355207"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/978-0-387-35520-7_4","type":"book-chapter","created":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T12:32:14Z","timestamp":1344601934000},"page":"65-86","source":"Crossref","is-referenced-by-count":2,"title":["Atomic Failure in Wide-Area Computation"],"prefix":"10.1007","author":[{"given":"Dominic","family":"Duggan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M Abadi","year":"1999","unstructured":"Martin Abadi and Andrew Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148 (1): 1\u201370, January 1999.","journal-title":"Information and Computation"},{"issue":"3","key":"4_CR2","first-page":"29","volume":"12","author":"DS Alexander","year":"1998","unstructured":"D. Scott Alexander, William A. Arbaugh, Michael W. Hicks, Pankaj Kakkar, Angelos D. Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott M. Nettles, and Jonathan M. Smith. The Switchware active network architecture. IEEE Network Special Issue on Active and Controllable Networks, 12 (3): 29\u201336, 1998.","journal-title":"IEEE Network Special Issue on Active and Controllable Networks"},{"key":"4_CR3","volume-title":"P. S. Thiagarajan, editor, Proceedings of 14th Conference on Foundations of Software Technology and Theoretical Computer Science, number 880 in Lecture Notes in Computer Science, pages 205-216. Springer-Verlag","author":"RM Amadio","year":"1995","unstructured":"R.M. Amadio and S. Prasad. Localities and failures. In P. S. Thiagarajan, editor, Proceedings of 14th Conference on Foundations of Software Technology and Theoretical Computer Science, number 880 in Lecture Notes in Computer Science, pages 205\u2013216. Springer-Verlag, 1995."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Roberto Amadio. An asynchronous model of locality, failure, and process mobility. In Coordination \u201887, 1997.","DOI":"10.1007\/3-540-63383-9_92"},{"key":"4_CR5","volume-title":"Addison-Wesley","author":"PA Bernstein","year":"1987","unstructured":"P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison-Wesley, 1987."},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/0304-3975(92)90185-I","volume":"96","author":"G Berry","year":"1992","unstructured":"G. Berry and G. Boudol. The chemical abstract machine. Theoretical Computer Science, 96 (1): 217\u2013248, 1992.","journal-title":"Theoretical Computer Science"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Luca Cardelli. Abstractions for mobile computation. In Jan Vitek and Christian Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, volume 1603 of Lecture Notes in Computer Science. Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48749-2_4"},{"key":"4_CR8","volume-title":"Maurice Ni-vat, editor, Foundations of Software Science and Computational Structures, volume 1378 of Lecture Notes in Computer Science, pages 140-155. Springer-Verlag","author":"L Cardelli","year":"1998","unstructured":"Luca Cardelli and Andrew Gordon. Mobile ambients. In Maurice Ni-vat, editor, Foundations of Software Science and Computational Structures, volume 1378 of Lecture Notes in Computer Science, pages 140\u2013155. Springer-Verlag, 1998."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Luca Cardelli and Andrew Gordon. Types for mobile ambients. In Proceedings of ACM Symposium on Principles of Programming Languages,San Antonio, January 1999. ACM Press.","DOI":"10.1145\/292540.292550"},{"key":"4_CR10","unstructured":"Guiseppe Castagna and Jan Vitek. A calculus of secure mobile computations. In Internet Programming Languages, Lecture Notes in Computer Science. Springer-Verlag, 1999."},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"MJ Fischer","year":"1985","unstructured":"M. J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM, 32 (2): 374\u2013382, 1985.","journal-title":"Journal of the ACM"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"C\u00e9dric Fournet and Georges Gonthier. The reflexive chemical abstract machine and the join-calculus. In Proceedings of the 23rd ACM Symposium on Principles of Programming Languages,pages 372\u2013385, St. Petersburg Beach, Florida, January 1996. ACM.","DOI":"10.1145\/237721.237805"},{"key":"4_CR13","first-page":"1996","volume-title":"International Conference on Concurrency Theory (CONCUR96), pages 406-421, Pisa, Italy, August","author":"C Fournet","year":"1119","unstructured":"C\u00e9dric Fournet, Georges Gonthier, Jean-Jacques L\u00e9vy, Luc Maranget, and Didier R\u00e9my. A calculus of mobile agents. In 7th International Conference on Concurrency Theory (CONCUR\u201996), pages 406\u2013421, Pisa, Italy, August 1996. Springer-Verlag. LNCS 1119."},{"key":"4_CR14","volume-title":"B. Simons and A. Z. Spector, editors, Fault-Tolerant Distributed Computing, volume 448 of Lecture Notes in Computer Science, pages 201-208. Springer-Verlag","author":"V Hadzilacos","year":"1990","unstructured":"V. Hadzilacos. On the relationship between the atomic commitment and consensus problems. In B. Simons and A. Z. Spector, editors, Fault-Tolerant Distributed Computing, volume 448 of Lecture Notes in Computer Science, pages 201\u2013208. Springer-Verlag, 1990."},{"issue":"6","key":"4_CR15","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1145\/197320.197346","volume":"16","author":"N Haines","year":"1994","unstructured":"N. Haines, D. Kindred, J. G. Morrisett, and S. M. Nettles. Composing first-class transactions. ACM Transactions on Programming Languages and Systems, 16 (6): 1719\u20131736, November 1994.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1145\/79147.79161","volume":"37","author":"JY Halpern","year":"1990","unstructured":"J. Y. Halpern and Y. Moses. Knowledge and common knowledge in a distributed environment. Journal of the ACM, 37 (3): 549\u2013587, 1990.","journal-title":"Journal of the ACM"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Matthew Hennessy and James Riely. Type-safe execution of mobile agents in anonymous networks. In Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Lecture Notes in Computer Science. Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48749-2_5"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Michael Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, and Scott Nettles. PLAN: A packet language for active networks. In Proceedings of ACM International Conference on Functional Programming. ACM Press, September 1998.","DOI":"10.1145\/289423.289431"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Butler Lampson. Atomic transactions. In B. Lampson, M. Paul, and H. Siegert, editors, Distributed Systems Architecture and Implementation, volume 205 of Lecture Notes in Computer Science, pages 246\u2013285. Springer-Verlag, 1981.","DOI":"10.1007\/3-540-10571-9_11"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Barbara Liskov. Distributed programming in Argus. Communications of the ACM, 31 (3), March 1988.","DOI":"10.1145\/42392.42399"},{"key":"4_CR21","unstructured":"Nancy Lynch, Michael Merritt, William Weihl, and Alan Fekete. Atomic Transactions. Morgan-Kaufman, 1994."},{"key":"4_CR22","unstructured":"Robin Milner. Communication and Concurrency. Prentice-Hall, 1989."},{"key":"4_CR23","volume-title":"Friedrich L. Bauer, Wilfried Brauer, and Helmut Schwichtenberg, editors, Logic and Algebra of Specification, volume 94 of Computer and Systems Sciences, pages 203-246. Springer-Verlag","author":"R Milner","year":"1993","unstructured":"Robin Milner. The polyadic 7L-calculus: A tutorial. In Friedrich L. Bauer, Wilfried Brauer, and Helmut Schwichtenberg, editors, Logic and Algebra of Specification, volume 94 of Computer and Systems Sciences, pages 203\u2013246. Springer-Verlag, 1993."},{"key":"4_CR24","unstructured":"J. E. B. Moss. Nested Transactions: An Approach to Reliable Distributed Computing. MIT Press, 1985."},{"key":"4_CR25","volume-title":"Proceedings of the International Conference on Automata, Languages and Programming","author":"J Riely","year":"1997","unstructured":"James Riely and Matthew Hennessy. Distributed processes and location failures. In Proceedings of the International Conference on Automata, Languages and Programming, 1997."},{"key":"4_CR26","volume-title":"Proceedings of ACM Symposium on Principles of Programming Languages","author":"J Riely","year":"1999","unstructured":"James Riely and Matthew Hennessy. Trust and partial typing in open systems of mobile agents. In Proceedings of ACM Symposium on Principles of Programming Languages, 1999."},{"key":"4_CR27","unstructured":"Davide Sangiorgi. Asynchronous process calculi: The first-order and higher-order paradigms. Theoretical Computer Science, 1999."}],"container-title":["IFIP Advances in Information and Communication Technology","Formal Methods for Open Object-Based Distributed Systems IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35520-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T19:30:14Z","timestamp":1743967814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35520-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9781475710182","9780387355207"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35520-7_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2000]]}}}