{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:43:38Z","timestamp":1725853418979},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336114"},{"type":"electronic","value":"9783319336121"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33612-1_9","type":"book-chapter","created":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T04:18:38Z","timestamp":1461039518000},"page":"143-166","source":"Crossref","is-referenced-by-count":1,"title":["On the Decidability of Honesty and of Its Variants"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,20]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Barbanera, F., de\u2019Liguoro, U.: Two notions of sub-behaviour for session-based client\/server systems. In: Proceedings of the PPDP, pp. 155\u2013164 (2010)","DOI":"10.1145\/1836089.1836109"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-19195-9_11","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Podda, A.S., Pompianu, L.: Compliance and subtyping in timed session types. In: Graf, S., Viswanathan, M. (eds.) FORTE 2015. LNCS, vol. 9039, pp. 161\u2013177. Springer, Switzerland (2015)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-28934-2_5","volume-title":"Formal Aspects of Component Software","author":"M Bartoletti","year":"2016","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Podda, A.S., Pompianu, L.: A contract-oriented middleware. In: Braga, C., \u00d6lveczky, P.C. (eds.) FACS 2015. LNCS, vol. 9539, pp. 86\u2013104. Springer, Heidelberg (2016). \n                      http:\/\/co2.unica.it"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-25527-9_9","volume-title":"Programming Languages with Applications to Biology and Security","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Cimoli, T., Zunino, R.: Compliance in behavioural contracts: a brief survey. In: Bodei, C., et al. (eds.) Programming Languages with Applications to Biology and Security. LNCS, vol. 9465, pp. 103\u2013121. Springer, Switzerland (2015). \n                      http:\/\/tcs.unica.it\/software\/co2-maude\/co2-verifiable-abstractions.pdf"},{"issue":"3","key":"9_CR5","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1017\/S096012951200093X","volume":"25","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Model checking usage policies. Math. Struct. Comput. Sci. 25(3), 710\u2013763 (2015)","journal-title":"Math. Struct. Comput. Sci."},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.scico.2014.11.015","volume":"109","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Lange, J., Scalas, A., Zunino, R.: Choreographies in the wild. Sci. Comput. Program. 109(1), 36\u201360 (2015)","journal-title":"Sci. Comput. Program."},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-319-12904-4_7","volume-title":"Rewriting Logic and Its Applications","author":"M Bartoletti","year":"2014","unstructured":"Bartoletti, M., Murgia, M., Scalas, A., Zunino, R.: Modelling and verifying contract-oriented systems in maude. In: Escobar, S. (ed.) WRLA 2014. LNCS, vol. 8663, pp. 130\u2013146. Springer, Heidelberg (2014)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-38592-6_21","volume-title":"Formal Techniques for Distributed Systems","author":"M Bartoletti","year":"2013","unstructured":"Bartoletti, M., Scalas, A., Tuosto, E., Zunino, R.: Honesty by typing. In: Beyer, D., Boreale, M. (eds.) FMOODS\/FORTE 2013. LNCS, vol. 7892, pp. 305\u2013320. Springer, Heidelberg (2013)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/978-3-662-44584-6_28","volume-title":"CONCUR 2014 \u2013 Concurrency Theory","author":"M Bartoletti","year":"2014","unstructured":"Bartoletti, M., Scalas, A., Zunino, R.: A semantic deconstruction of session types. In: Baldan, P., Gorla, D. (eds.) CONCUR 2014. LNCS, vol. 8704, pp. 402\u2013418. Springer, Heidelberg (2014)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-30829-1_17","volume-title":"Coordination Models and Languages","author":"M Bartoletti","year":"2012","unstructured":"Bartoletti, M., Tuosto, E., Zunino, R.: On the realizability of contracts in dishonest systems. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 245\u2013260. Springer, Heidelberg (2012)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-540-85361-9_33","volume-title":"CONCUR 2008 - Concurrency Theory","author":"L Bettini","year":"2008","unstructured":"Bettini, L., Coppo, M., D\u2019Antoni, L., De Luca, M., Dezani-Ciancaglini, M., Yoshida, N.: Global progress in dynamically interleaved multiparty sessions. In: van Breugel, F., Chechik, M. (eds.) CONCUR 2008. LNCS, vol. 5201, pp. 418\u2013433. Springer, Heidelberg (2008)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Castagna, G., Dezani-Ciancaglini, M., Giachino, E., Padovani, L.: Foundations of session types. In: Proceedings of the PPDP (2009)","DOI":"10.1145\/1599410.1599437"},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/1538917.1538920","volume":"31","author":"G Castagna","year":"2009","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A theory of contracts for web services. ACM TOPLAS 31(5), 19:1\u201319:61 (2009)","journal-title":"ACM TOPLAS"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-38493-6_4","volume-title":"Coordination Models and Languages","author":"M Coppo","year":"2013","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Padovani, L., Yoshida, N.: Inference of global progress properties for dynamically interleaved multiparty sessions. In: De Nicola, R., Julien, C. (eds.) COORDINATION 2013. LNCS, vol. 7890, pp. 45\u201359. Springer, Heidelberg (2013)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-642-39212-2_18","volume-title":"Automata, Languages, and Programming","author":"P-M Deni\u00e9lou","year":"2013","unstructured":"Deni\u00e9lou, P.-M., Yoshida, N.: Multiparty compatibility in communicating automata: characterisation and synthesis of global session types. In: Fre, S., et al. (eds.) ICALP 2013, Part II. LNCS, vol. 7966, pp. 174\u2013186. Springer, Heidelberg (2013)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-78663-4_18","volume-title":"Trustworthy Global Computing","author":"M Dezani-Ciancaglini","year":"2008","unstructured":"Dezani-Ciancaglini, M., de\u2019Liguoro, U., Yoshida, N.: On progress for structured communications. In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, vol. 4912, pp. 257\u2013275. Springer, Heidelberg (2008)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BFb0017477","volume-title":"Trees in Algebra and Programming \u2014 CAAP\u201994","author":"J Esparza","year":"1994","unstructured":"Esparza, J.: On the decidability of model checking for several \n                      \n                        \n                      \n                      $$\\mu $$\n                    -calculi and petri nets. In: Tison, S. (ed.) CAAP 1994. LNCS, vol. 787, pp. 115\u2013129. Springer, Heidelberg (1994)"},{"key":"9_CR18","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7431.001.0001","volume-title":"Service-Oriented Computing","author":"D Georgakopoulos","year":"2008","unstructured":"Georgakopoulos, D., Papazoglou, M.P.: Service-Oriented Computing. MIT Press, Cambridge, Massachusetts (2008)"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/3-540-57208-2_35","volume-title":"CONCUR\u201993","author":"K Honda","year":"1993","unstructured":"Honda, K.: Types for dyadic interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715, pp. 509\u2013523. Springer, Heidelberg (1993)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type disciplines for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"issue":"1","key":"9_CR21","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/1328897.1328472","volume":"43","author":"Kohei Honda","year":"2008","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: Proceedings of the POPL, pp. 273\u2013284 (2008)","journal-title":"ACM SIGPLAN Notices"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11817949_16","volume-title":"CONCUR 2006 \u2013 Concurrency Theory","author":"N Kobayashi","year":"2006","unstructured":"Kobayashi, N.: A new type system for deadlock-free processes. In: Baier, C., Hermanns, H. (eds.) CONCUR 2006. LNCS, vol. 4137, pp. 233\u2013247. Springer, Heidelberg (2006)"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-32940-1_17","volume-title":"CONCUR 2012 \u2013 Concurrency Theory","author":"J Lange","year":"2012","unstructured":"Lange, J., Tuosto, E.: Synthesising choreographies from local session types. In: Koutny, M., Ulidowski, I. (eds.) CONCUR 2012. LNCS, vol. 7454, pp. 225\u2013239. Springer, Heidelberg (2012)"},{"key":"9_CR24","volume-title":"Communication and Concurrency","author":"R Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall Inc., Upper Saddle River (1989)"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-642-40184-8_30","volume-title":"CONCUR 2013 \u2013 Concurrency Theory","author":"F Montesi","year":"2013","unstructured":"Montesi, F., Yoshida, N.: Compositional choreographies. In: D\u2019Argenio, P.R., Melgratti, H. (eds.) CONCUR 2013. LNCS, vol. 8052, pp. 425\u2013439. Springer, Heidelberg (2013)"},{"issue":"1","key":"9_CR26","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1093\/comjnl\/bxn064","volume":"53","author":"WMP Aalst van der","year":"2010","unstructured":"van der Aalst, W.M.P., Lohmann, N., Massuthe, P., Stahl, C., Wolf, K.: Multiparty contracts: agreeing and implementing interorganizational processes. Comput. J. 53(1), 90\u2013106 (2010)","journal-title":"Comput. J."}],"container-title":["Lecture Notes in Computer Science","Web Services, Formal Methods, and Behavioral Types"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33612-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T20:58:22Z","timestamp":1559422702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33612-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336114","9783319336121"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33612-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}