{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:02:09Z","timestamp":1762459329164,"version":"3.41.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319289335"},{"type":"electronic","value":"9783319289342"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-28934-2_5","type":"book-chapter","created":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T15:32:56Z","timestamp":1453995176000},"page":"86-104","source":"Crossref","is-referenced-by-count":12,"title":["A Contract-Oriented Middleware"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Tiziana","family":"Cimoli","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Murgia","sequence":"additional","affiliation":[]},{"given":"Alessandro Sebastian","family":"Podda","sequence":"additional","affiliation":[]},{"given":"Livio","family":"Pompianu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,29]]},"reference":[{"key":"5_CR1","unstructured":"PayPal buyer protection. https:\/\/www.paypal.com\/us\/webapps\/mpp\/ua\/useragreement-full#13 . Accessed 8 July 2015"},{"issue":"2","key":"5_CR2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Theor. Comput. Sci. 126(2), 183\u2013235 (1994)","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"5_CR3","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TSE.2007.1011","volume":"33","author":"D Ardagna","year":"2007","unstructured":"Ardagna, D., Pernici, B.: Adaptive service composition in flexible processes. IEEE Trans. Software Eng. 33(6), 369\u2013384 (2007)","journal-title":"IEEE Trans. Software Eng."},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-48169-9_1","volume-title":"Distributed Computing","author":"G Banavar","year":"1999","unstructured":"Banavar, G., Chandra, T., Strom, R.E., Sturman, D.: A case for message oriented middleware. In: Jayanti, P. (ed.) DISC 1999. LNCS, vol. 1693, pp. 1\u201317. Springer, Heidelberg (1999)"},{"key":"5_CR5","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Patteri, M.G., Mascia, M.J., Podda, A.S., Pompianu, L., COREserve: a contract-oriented reservation marketplace (2015). http:\/\/coreserve.unica.it"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-19195-9_11","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Podda, A.S., Pompianu, L.: Compliance and subtyping in timed session types. In: Graf, S., Viswanathan, M. (eds.) Formal Techniques for Distributed Objects, Components, and Systems. LNCS, vol. 9039, pp. 161\u2013177. Springer, Heidelberg (2015)"},{"key":"5_CR7","unstructured":"Bartoletti, M., Cimoli,T., Murgia, M., Podda, A.S., Pompianu, L.: A contract-oriented middleware (2015). http:\/\/co2.unica.it"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-25527-9_9","volume-title":"Programming Languages with Applications to Biology and Security","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Cimoli, T., Zunino, R.: Compliance in behavioural contracts: a brief survey. In: Kahramanogullari, O., et al. (eds.) Degano Festschrift. LNCS, vol. 9465, pp. 103\u2013121. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25527-9_9"},{"issue":"1","key":"5_CR9","first-page":"5","volume":"22","author":"M Bartoletti","year":"2012","unstructured":"Bartoletti, M., Tuosto, E., Zunino, R.: Contract-oriented computing in $$CO_2$$ . Sci. Ann. Comp. Sci. 22(1), 5\u201360 (2012)","journal-title":"Sci. Ann. Comp. Sci."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Zunino, R.: A calculus of contracting processes. In: LICS (2010)","DOI":"10.1109\/LICS.2010.25"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol. 3185, pp. 200\u2013236. Springer, Heidelberg (2004)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-3-642-27694-1","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation","author":"H Rue\u00df","year":"2012","unstructured":"Rue\u00df, H., Sch\u00e4tz, B., Blech, J.O., Falcone, Y.: Behavioral specification based runtime monitors for OSGi services. In: Margaria, T., Steffen, B. (eds.) ISoLA 2012, Part I. LNCS, vol. 7609, pp. 405\u2013419. Springer, Heidelberg (2012)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-15375-4_12","volume-title":"CONCUR 2010 - Concurrency Theory","author":"E Tuosto","year":"2010","unstructured":"Tuosto, E., Bocchi, L., Yoshida, N., Honda, K.: A theory of design-by-contract for distributed multiparty interactions. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 162\u2013176. Springer, Heidelberg (2010)"},{"key":"5_CR14","unstructured":"Bocchi, L., Lange, J., Yoshida, N.: Meeting deadlines together. In: CONCUR (2015, to appear)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/978-3-319-07515-0_42","volume-title":"CONCUR 2014 \u2013 Concurrency Theory","author":"W Yang","year":"2014","unstructured":"Yang, W., Yoshida, N., Bocchi, L.: Timed multiparty session types. In: Baldan, P., Gorla, D. (eds.) CONCUR 2014. LNCS, vol. 8704, pp. 419\u2013434. Springer, Heidelberg (2014)"},{"issue":"2","key":"5_CR16","first-page":"41","volume":"180","author":"A Brogi","year":"2007","unstructured":"Brogi, A., Canal, C., Pimentel, E.: Behavioural types for service integration: achievements and challenges. ENTCS 180(2), 41\u201354 (2007)","journal-title":"ENTCS"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-71316-6_3","volume-title":"Programming Languages and Systems","author":"MG Buscemi","year":"2007","unstructured":"Buscemi, M.G., Montanari, U.: CC-Pi: a constraint-based language for specifying service level agreements. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 18\u201332. Springer, Heidelberg (2007)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"G\u00f6bel, J., Joschko, P., Koors, A., Page, B.: The discrete event simulation framework DESMO-J: review, comparison to other frameworks and latest development. In: Proceedings of ECMS, pp. 100\u2013109 (2013)","DOI":"10.7148\/2013-0100"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Harel, D., Marelly, R.: Playing with time: on the specification and execution of time-enriched LSCs. In: MASCOTS, pp. 193\u2013202 (2002)","DOI":"10.1109\/MASCOT.2002.1167077"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.entcs.2004.02.073","volume":"116","author":"R Heckel","year":"2005","unstructured":"Heckel, R., Lohmann, M.: Towards contract-based testing of Web services. Electr. Notes Theor. Comput. Sci. 116, 145\u2013156 (2005)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"KJ Hoffman","year":"2009","unstructured":"Hoffman, K.J., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1), 1:1\u20131:31 (2009)","journal-title":"ACM Comput. Surv."},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: POPL (2008)","DOI":"10.1145\/1328438.1328472"},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 19:1\u201319:41 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"5_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R Milner","year":"1992","unstructured":"Milner, R., Parrow, P., Walker, D.: A calculus of mobile processes. I and II. Inf. Comput. 100(1), 1\u201377 (1992)","journal-title":"I and II. Inf. Comput."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Mukhija, A., Dingwall-Smith, A., Rosenblum, D.: QoS-aware service composition in Dino. In: ECOWS, pp. 3\u201312 (2007)","DOI":"10.1109\/ECOWS.2007.24"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Neykova, R., Bocchi, L., Yoshida, N.: Timed runtime monitoring for multiparty conversations. In: BEAT, pp. 19\u201326 (2014)","DOI":"10.4204\/EPTCS.162.3"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-55179-4","volume-title":"Computer Aided Verification","author":"KG Larsen","year":"1992","unstructured":"Larsen, K.G., Skou, A.: An overview and synthesis on timed process algebras. In: Larsen, K.G., Skou, A. (eds.) CAV 1991. LNCS, vol. 575, pp. 376\u2013398. Springer, Heidelberg (1992)"},{"issue":"2","key":"5_CR29","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"5_CR30","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/3-540-36110-3_6","volume-title":"Management Technologies for E-Commerce and E-Business Applications","author":"Akhil Sahai","year":"2002","unstructured":"Sahai, A., Machiraju, V., Sayal, M., van Moorsel, A.P.A., Casati, F.: Automated SLA monitoring for Web services. In: DSOM, pp. 28\u201341 (2002)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Saraswat, V.A., Rinard, M.C.: Concurrent constraint programming. In: POPL, pp. 232\u2013245 (1990)","DOI":"10.1145\/96709.96733"},{"key":"5_CR32","unstructured":"Sebastio, S., Vandin, A.: MultiVeStA: statistical model checking for discrete event simulators. In: Proceedings of ValueTools, pp. 310\u2013315 (2013)"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: WWW, pp. 422\u2013431 (2005)","DOI":"10.1145\/1060745.1060808"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Strunk, A.: QoS-aware service composition: a survey. In: ECOWS, pp. 67\u201374. IEEE (2010)","DOI":"10.1109\/ECOWS.2010.16"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-58184-7_118","volume-title":"PARLE \u201994 Parallel Architectures and Languages Europe","author":"K Takeuchi","year":"1994","unstructured":"Takeuchi, K., Honda, K., Kubo, M.: An interaction-based language and its typing system. In: Halatsis, C., Philokyprou, G., Maritsas, D., Theodoridis, S. (eds.) PARLE 1994. LNCS, vol. 817, pp. 398\u2013413. Springer, Heidelberg (1994)"},{"key":"5_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-38230-7_2","volume-title":"Web Services and Formal Methods","author":"E Tuosto","year":"2013","unstructured":"Tuosto, E.: Contract-oriented services. In: Beek, M.H., Lohmann, N. (eds.) WS-FM 2012. LNCS, vol. 7843, pp. 16\u201329. Springer, Heidelberg (2013)"},{"issue":"1","key":"5_CR37","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1232722.1232728","volume":"1","author":"T Yu","year":"2007","unstructured":"Yu, T., Zhang, Y., Lin, K.-J.: Efficient algorithms for Web services selection with end-to-end QoS constraints. ACM Trans. Web 1(1), 6 (2007)","journal-title":"ACM Trans. Web"},{"issue":"5","key":"5_CR38","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TSE.2004.11","volume":"30","author":"L Zeng","year":"2004","unstructured":"Zeng, L., Benatallah, B., Ngu, A.H., Dumas, M., Kalagnanam, J., Chang, H.: QoS-aware middleware for Web services composition. IEEE Trans. Software Eng. 30(5), 311\u2013327 (2004)","journal-title":"IEEE Trans. Software Eng."}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Component Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28934-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T07:41:37Z","timestamp":1748763697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28934-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319289335","9783319289342"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28934-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}