{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:41:35Z","timestamp":1762623695421,"version":"3.41.0"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319255262"},{"type":"electronic","value":"9783319255279"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25527-9_9","type":"book-chapter","created":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T11:08:43Z","timestamp":1444216123000},"page":"103-121","source":"Crossref","is-referenced-by-count":21,"title":["Compliance in Behavioural Contracts: A Brief Survey"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Tiziana","family":"Cimoli","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,20]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1007\/978-3-540-68679-8_40","volume-title":"Concurrency, Graphs and Models","author":"L Acciai","year":"2008","unstructured":"Acciai, L., Boreale, M.: A type system for client progress in a service-oriented Calculus. In: Degano, P., De Nicola, R., Meseguer, J. (eds.) Concurrency, Graphs and Models. LNCS, vol. 5065, pp. 642\u2013658. Springer, Heidelberg (2008)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13414-2_2","volume-title":"Coordination Models and Languages","author":"L Acciai","year":"2010","unstructured":"Acciai, L., Boreale, M., Zavattaro, G.: Behavioural contracts with request-response operations. In: Clarke, D., Agha, G. (eds.) COORDINATION 2010. LNCS, vol. 6116, pp. 16\u201330. Springer, Heidelberg (2010)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Barbanera, F., de\u2019Liguoro, U.: Two notions of sub-behaviour for session-based client\/server systems. In: Proceedings of PPDP, pp. 155\u2013164 (2010)","DOI":"10.1145\/1836089.1836109"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Barbanera, F., de\u2019Liguoro, U.: Loosening the notions of compliance and sub-behaviour in client\/server systems. In: Proceedings of ICE. EPTCS, vol. 166, pp. 94\u2013110 (2014)","DOI":"10.4204\/EPTCS.166.10"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Barbanera, F., Dezani-Ciancaglini, M., Lanese, I., de\u2019Liguoro, U.: Retractable contracts. In: Proceedings of PLACES. EPTCS (2015) (to appear)","DOI":"10.4204\/EPTCS.203.5"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Barbanera, F., van Bakel, S., de\u2019Liguoro, U.: Orchestrated compliance for session-based client\/server interactions. In: Proceedings of ICE. EPTCS (2015) (to appear)","DOI":"10.4204\/EPTCS.189.4"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Podda, A.S., Pompianu, L.: Compliance and subtyping in timed session types. In: Proceedings of FORTE, pp. 161\u2013177 (2015)","DOI":"10.1007\/978-3-319-19195-9_11"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-40213-5_5","volume-title":"Fundamentals of Software Engineering","author":"M Bartoletti","year":"2013","unstructured":"Bartoletti, M., Cimoli, T., Pinna, G.M.: Lending Petri Nets and contracts. In: Arbab, F., Sirjani, M. (eds.) FSEN 2013. LNCS, vol. 8161, pp. 66\u201382. Springer, Heidelberg (2013)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Cimoli, T., Pinna, G.M.: Lending Petri nets. Science of Computer Programming (2015) (to appear)","DOI":"10.1016\/j.scico.2015.05.006"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Cimoli, T., Pinna, G.M., Zunino, R.: Contracts as games on event structures. JLAMP (2015) (to appear)","DOI":"10.1016\/j.jlamp.2015.05.001"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-642-36830-1_10","volume-title":"Principles of Security and Trust","author":"M Bartoletti","year":"2013","unstructured":"Bartoletti, M., Cimoli, T., Zunino, R.: A theory of agreements and protection. In: Basin, D., Mitchell, J.C. (eds.) POST 2013 (ETAPS 2013). LNCS, vol. 7796, pp. 186\u2013205. Springer, Heidelberg (2013)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Types and effects for secure service orchestration, pp. 57\u201369. In: Proceedings of IEEE Computer Security Foundations Workshop (2006)","DOI":"10.1109\/CSFW.2006.31"},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"799","DOI":"10.3233\/JCS-2009-0357","volume":"17","author":"M Bartoletti","year":"2009","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Planning and verifying service composition. J. Comput. Secur. 17(5), 799\u2013837 (2009)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"9_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TSE.2007.70740","volume":"34","author":"M Bartoletti","year":"2008","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Semantics-based design for secure Web services. IEEE Trans. Software Eng. 34(1), 33\u201349 (2008)","journal-title":"IEEE Trans. Software Eng."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Lange, J., Scalas, A., Zunino, R.: Choreographies in the wild. Science of Computer Programming (2015)","DOI":"10.1016\/j.scico.2014.11.015"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-38592-6_21","volume-title":"Formal Techniques for Distributed Systems","author":"M Bartoletti","year":"2013","unstructured":"Bartoletti, M., Scalas, A., Tuosto, E., Zunino, R.: Honesty by typing. In: Boreale, M., Beyer, D. (eds.) FORTE 2013 and FMOODS 2013. LNCS, vol. 7892, pp. 305\u2013320. Springer, Heidelberg (2013)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/978-3-662-44584-6_28","volume-title":"CONCUR 2014 \u2013 Concurrency Theory","author":"M Bartoletti","year":"2014","unstructured":"Bartoletti, M., Scalas, A., Zunino, R.: A semantic deconstruction of session types. In: Baldan, P., Gorla, D. (eds.) CONCUR 2014. LNCS, vol. 8704, pp. 402\u2013418. Springer, Heidelberg (2014)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-30829-1_17","volume-title":"Coordination Models and Languages","author":"M Bartoletti","year":"2012","unstructured":"Bartoletti, M., Tuosto, E., Zunino, R.: On the realizability of contracts in dishonest systems. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 245\u2013260. Springer, Heidelberg (2012)"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-662-45917-1_3","volume-title":"Trustworthy Global Computing","author":"D Basile","year":"2014","unstructured":"Basile, D., Degano, P., Ferrari, G.-L.: Automata for analysing service contracts. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 34\u201350. Springer, Heidelberg (2014)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Basile, D., Degano, P., Ferrari, G.L., Tuosto, E.: From orchestration to choreography through contract automata. In: Proceedings of ICE, pp. 67\u201385 (2014)","DOI":"10.4204\/EPTCS.166.8"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Basu, S., Bultan, T., Ouederni, M.: Deciding choreography realizability. In: Proceedings of POPL, pp. 191\u2013202 (2012)","DOI":"10.1145\/2103621.2103680"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-662-45917-1_4","volume-title":"Trustworthy Global Computing","author":"G Bernardi","year":"2014","unstructured":"Bernardi, G., Dardha, O., Gay, S.J., Kouzapas, D.: On duality relations for session types. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 51\u201366. Springer, Heidelberg (2014)"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-05032-4_6","volume-title":"Software Engineering and Formal Methods","author":"G Bernardi","year":"2014","unstructured":"Bernardi, G., Hennessy, M.: Compliance and testing preorders differ. In: Counsell, S., N\u00fa\u00f1ez, M. (eds.) SEFM 2013. LNCS, vol. 8368, pp. 69\u201381. Springer, Heidelberg (2014)"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-31811-8_2","volume-title":"Technologies for E-Services","author":"L Bordeaux","year":"2005","unstructured":"Bordeaux, L., Sala\u00fcn, G., Berardi, D., Mecella, M.: When are two web services compatible? In: Shan, M.-C., Dayal, U., Hsu, M. (eds.) TES 2004. LNCS, vol. 3324, pp. 15\u201328. Springer, Heidelberg (2005)"},{"issue":"2","key":"9_CR25","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D Brand","year":"1983","unstructured":"Brand, D., Zafiropulo, P.: On communicating finite-state machines. J. ACM 30(2), 323\u2013342 (1983)","journal-title":"J. ACM"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-75698-9_14","volume-title":"International Symposium on Fundamentals of Software Engineering","author":"M Bravetti","year":"2007","unstructured":"Bravetti, M., Zavattaro, G.: Contract based multi-party service composition. In: Arbab, F., Sirjani, M. (eds.) FSEN 2007. LNCS, vol. 4767, pp. 207\u2013222. Springer, Heidelberg (2007)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Bravetti, M., Zavattaro, G.: Contract compliance and choreography conformance in the presence of message queues. In: Proceedings of WS-FM, pp. 37\u201354 (2008)","DOI":"10.1007\/978-3-642-01364-5_3"},{"issue":"3","key":"9_CR28","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1017\/S0960129509007658","volume":"19","author":"M Bravetti","year":"2009","unstructured":"Bravetti, M., Zavattaro, G.: A theory of contracts for strong service compliance. Math. Struct. Comput. Sci. 19(3), 601\u2013638 (2009)","journal-title":"Math. Struct. Comput. Sci."},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"E. Brinksma, A. Rensink, and W. Vogler. Fair testing. In Proc. CONCUR, pages 313\u2013327, 1995","DOI":"10.1007\/3-540-60218-6_23"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Macedonio, D., Pino, L., Rossi, S.: Compliance preorders for Web services. In: Proceedings of WS-FM, pp. 76\u201391 (2009)","DOI":"10.1007\/978-3-642-14458-5_5"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Buscemi, M.G., Melgratti, H.C.: Contracts for abstract processes in service composition. In: Proceedings of FIT, pp. 9\u201327 (2010)","DOI":"10.4204\/EPTCS.46.2"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Carpineti, S., Castagna, G., Laneve, C., Padovani, L.: A formal account of contracts for Web services. In: Proceedings of WS-FM, pp. 148\u2013162 (2006)","DOI":"10.1007\/11841197_10"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Castagna, G., Dezani-Ciancaglini, M., Giachino, E., Padovani, L.: Foundations of session types. In: Proceedings of PPDP (2009)","DOI":"10.1145\/1599410.1599437"},{"issue":"5","key":"9_CR34","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/1538917.1538920","volume":"31","author":"G Castagna","year":"2009","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A theory of contracts for Web services. ACM TOPLAS 31(5), 19:1\u201319:61 (2009)","journal-title":"ACM TOPLAS"},{"issue":"2","key":"9_CR35","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ic.2005.05.006","volume":"202","author":"G C\u00e9c\u00e9","year":"2005","unstructured":"C\u00e9c\u00e9, G., Finkel, A.: Verification of programs with half-duplex communication. Inf. Comput. 202(2), 166\u2013190 (2005)","journal-title":"Inf. Comput."},{"key":"9_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-72952-5_1","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"M Coppo","year":"2007","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Yoshida, N.: Asynchronous session types and progress for object oriented languages. In: Bonsangue, M.M., Johnsen, E.B. (eds.) FMOODS 2007. LNCS, vol. 4468, pp. 1\u201331. Springer, Heidelberg (2007)"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"de Alfaro, L., Henzinger, T.A.: Interface automata. In: Proceedings of ACM SIGSOFT, pp. 109\u2013120 (2001)","DOI":"10.1145\/503271.503226"},{"key":"9_CR38","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0304-3975(84)90113-0","volume":"34","author":"R Nicola De","year":"1984","unstructured":"De Nicola, R., Hennessy, M.: Testing equivalences for processes. Theor. Comput. Sci. 34, 83\u2013133 (1984)","journal-title":"Theor. Comput. Sci."},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"De Nicola, R., Hennessy, M.: CCS without tau\u2019s. In: Proceedings of TAPSOFT, pp. 138\u2013152 (1987)","DOI":"10.1007\/3-540-17660-8_53"},{"key":"9_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-28869-2_10","volume-title":"Programming Languages and Systems","author":"P-M Deni\u00e9lou","year":"2012","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Multiparty session types meet communicating automata. In: Seidl, H. (ed.) Programming Languages and Systems. LNCS, vol. 7211, pp. 194\u2013213. Springer, Heidelberg (2012)"},{"key":"9_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-642-39212-2_18","volume-title":"Automata, Languages, and Programming","author":"P-M Deni\u00e9lou","year":"2013","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Multiparty compatibility in communicating automata: characterisation and synthesis of global session types. In: Fomin, F.V., Freivalds, R., Kwiatkowska, M., Peleg, D. (eds.) ICALP 2013, Part II. LNCS, vol. 7966, pp. 174\u2013186. Springer, Heidelberg (2013)"},{"issue":"2","key":"9_CR42","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00236-005-0177-z","volume":"42","author":"S Gay","year":"2005","unstructured":"Gay, S., Hole, M.: Subtyping for session types in the Pi calculus. Acta Inf. 42(2), 191\u2013225 (2005)","journal-title":"Acta Inf."},{"key":"9_CR43","series-title":"Lecture Notes in Computer Science","volume-title":"CONCUR 1993","author":"K Honda","year":"1993","unstructured":"Honda, K.: Types for dyadic interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715. Springer, Heidelberg (1993)"},{"key":"9_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: Proceedings of POPL, pp. 273\u2013284 (2008)","DOI":"10.1145\/1328897.1328472"},{"key":"9_CR46","unstructured":"H\u00fcttel, H. et al.: Foundations of behavioural types (2015). (Submitted) www.behavioural-types.eu\/publications\/WG1-State-of-the-Art.pdf"},{"key":"9_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-74407-8_15","volume-title":"CONCUR 2007 \u2013 Concurrency Theory","author":"C Laneve","year":"2007","unstructured":"Laneve, C., Laneve, C., Padovani, L., Padovani, L.: The Must preorder revisited. In: Caires, L., Caires, L., Vasconcelos, V.T., Vasconcelos, V.T. (eds.) CONCUR 2007. LNCS, vol. 4703, pp. 212\u2013225. Springer, Heidelberg (2007)"},{"key":"9_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/978-3-540-68679-8_42","volume-title":"Concurrency, Graphs and Models","author":"C Laneve","year":"2008","unstructured":"Laneve, C., Padovani, L.: The pairing of contracts and session types. In: Degano, P., De Nicola, R., Meseguer, J. (eds.) Concurrency, Graphs and Models. LNCS, vol. 5065, pp. 681\u2013700. Springer, Heidelberg (2008)"},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"Laneve, C., Padovani, L.: An algebraic theory for Web service contracts. Formal Aspects of Computing, pp. 1\u201328 (2015)","DOI":"10.1007\/s00165-015-0334-2"},{"key":"9_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-32940-1_17","volume-title":"CONCUR 2012 \u2013 Concurrency Theory","author":"J Lange","year":"2012","unstructured":"Lange, J., Tuosto, E.: Synthesising Choreographies from local session types. In: Koutny, M., Ulidowski, I. (eds.) CONCUR 2012. LNCS, vol. 7454, pp. 225\u2013239. Springer, Heidelberg (2012)"},{"key":"9_CR51","doi-asserted-by":"crossref","unstructured":"Lange, J., Tuosto, E., Yoshida, N.: From communicating machines to graphical choreographies. In: Proceedings of POPL, pp. 221\u2013232 (2015)","DOI":"10.1145\/2775051.2676964"},{"key":"9_CR52","unstructured":"Milner, R.: Communication and concurrency. Prentice-Hall Inc. (1989)"},{"issue":"2","key":"9_CR53","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ic.2006.06.002","volume":"205","author":"A Rensink","year":"2007","unstructured":"Rensink, A., Vogler, W.: Fair testing. Inf. Comput. 205(2), 125\u2013198 (2007)","journal-title":"Inf. Comput."},{"key":"9_CR54","volume-title":"An introduction to bisimulation and coinduction","author":"D Sangiorgi","year":"2012","unstructured":"nSangiorgi, D.: An introduction to bisimulation and coinduction. Cambridge University Press, Cambridge (2012)"},{"key":"9_CR55","unstructured":"Scalas, A.: A semantic deconstruction of session types. PhD thesis, University of Cagliari (2015)"},{"issue":"1","key":"9_CR56","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1093\/comjnl\/bxn064","volume":"53","author":"WMP Aalst van der","year":"2010","unstructured":"van der Aalst, W.M.P., Lohmann, N., Massuthe, P., Stahl, C., Wolf, K.: Multiparty contracts: Agreeing and implementing interorganizational processes. Comput. J. 53(1), 90\u2013106 (2010)","journal-title":"Comput. J."}],"container-title":["Lecture Notes in Computer Science","Programming Languages with Applications to Biology and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25527-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:58:58Z","timestamp":1748645938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25527-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255262","9783319255279"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25527-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}