{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:03:08Z","timestamp":1762459388177,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319395692"},{"type":"electronic","value":"9783319395708"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39570-8_4","type":"book-chapter","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T05:04:10Z","timestamp":1464066250000},"page":"52-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Developing Honest Java Programs with Diogenes"],"prefix":"10.1007","author":[{"given":"Nicola","family":"Atzei","sequence":"first","affiliation":[]},{"given":"Massimo","family":"Bartoletti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,24]]},"reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1093\/comjnl\/bxn064","volume":"53","author":"WMP van der Aalst","year":"2010","unstructured":"van der Aalst, W.M.P., Lohmann, N., Massuthe, P., Stahl, C., Wolf, K.: Multiparty contracts: agreeing and implementing interorganizational processes. Comput. J. 53(1), 90\u2013106 (2010)","journal-title":"Comput. J."},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13414-2_2","volume-title":"Coordination Models and Languages","author":"L Acciai","year":"2010","unstructured":"Acciai, L., Boreale, M., Zavattaro, G.: Behavioural contracts with request-response operations. In: Clarke, D., Agha, G. (eds.) COORDINATION 2010. LNCS, vol. 6116, pp. 16\u201330. Springer, Heidelberg (2010)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Barbanera, F., de\u2019Liguoro, U.: Two notions of sub-behaviour for session-based client\/server systems. In: PPDP, pp. 155\u2013164. ACM (2010)","DOI":"10.1145\/1836089.1836109"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-19195-9_11","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Podda, A.S., Pompianu, L.: Compliance and subtyping in timed session types. In: Graf, S., Viswanathan, M. (eds.) Formal Techniques for Distributed Objects, Components, and Systems. LNCS, vol. 9039, pp. 161\u2013177. Springer, Heidelberg (2015)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-28934-2_5","volume-title":"Formal Aspects of Component Software","author":"M Bartoletti","year":"2016","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Podda, A.S., Pompianu, L.: A contract-oriented middleware. In: Braga, C., et al. (eds.) FACS 2015. LNCS, vol. 9539, pp. 86\u2013104. Springer, Heidelberg (2016). doi:\n                    10.1007\/978-3-319-28934-2_5\n                    \n                  . \n                    http:\/\/co2.unica.it"},{"key":"4_CR6","unstructured":"Bartoletti, M., Murgia, M., Scalas, A., Zunino, R.: Verifiable abstractions for contract-oriented systems. JLAMP (2015, to appear)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-38592-6_21","volume-title":"Formal Techniques for Distributed Systems","author":"M Bartoletti","year":"2013","unstructured":"Bartoletti, M., Scalas, A., Tuosto, E., Zunino, R.: Honesty by typing. In: Beyer, D., Boreale, M. (eds.) FORTE 2013 and FMOODS 2013. LNCS, vol. 7892, pp. 305\u2013320. Springer, Heidelberg (2013). \n                    http:\/\/tcs.unica.it\/papers\/HbT.pdf"},{"issue":"1","key":"4_CR8","first-page":"5","volume":"22","author":"M Bartoletti","year":"2012","unstructured":"Bartoletti, M., Tuosto, E., Zunino, R.: Contract-oriented computing in $${\\rm CO}_2$$. Sci. Ann. Comp. Sci. 22(1), 5\u201360 (2012)","journal-title":"Sci. Ann. Comp. Sci."},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-319-33612-1_9","volume-title":"Web Services, Formal Methods, and Behavioral Types","author":"M Bartoletti","year":"2016","unstructured":"Bartoletti, M., Zunino, R.: On the decidability of honesty and of its variants. In: Hildebrandt, T., Ravara, A., van der Werf, J.M., Weidlich, M. (eds.) WS-FM 2014\u00a0+ WS-FM 2015. LNCS, vol. 9421, pp. 143\u2013166. Springer, Heidelberg (2016). doi:\n                    10.1007\/978-3-319-33612-1_9"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Quesada, J.F.: Maude: specification and programming in rewriting logic. In: TCS (2001)","DOI":"10.1016\/S0304-3975(01)00359-0"},{"key":"4_CR11","unstructured":"Contractvm. \n                    https:\/\/github.com\/contractvm"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/S1571-0661(05)82534-4","volume":"71","author":"S Eker","year":"2002","unstructured":"Eker, S., Meseguer, J., Sridharanarayanan, A.: The maude LTL model checker. Electr. Notes Theor. Comput. Sci. 71, 162\u2013187 (2002)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"4_CR13","unstructured":"Ethereum. \n                    https:\/\/github.com\/ethereum\/"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/3-540-57208-2_35","volume-title":"CONCUR 1993","author":"K Honda","year":"1993","unstructured":"Honda, K.: Types for dyadic interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715, pp. 509\u2013523. Springer, Heidelberg (1993)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"9:1","DOI":"10.1145\/2827695","volume":"63","author":"K Honda","year":"2016","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. J. ACM 63(1), 9:1\u20139:67 (2016)","journal-title":"J. ACM"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-74407-8_15","volume-title":"CONCUR 2007 \u2013 Concurrency Theory","author":"C Laneve","year":"2007","unstructured":"Laneve, C., Padovani, L.: The must preorder revisited. In: Caires, L., Vasconcelos, V.T. (eds.) CONCUR 2007. LNCS, vol. 4703, pp. 212\u2013225. Springer, Heidelberg (2007)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-45139-0_6","volume-title":"Model Checking Software","author":"F Lerda","year":"2001","unstructured":"Lerda, F., Visser, W.: Addressing dynamic issues of program model checking. In: Dwyer, M.B. (ed.) SPIN 2001. LNCS, vol. 2057, pp. 80\u2013102. Springer, Heidelberg (2001)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Mukhija, A., Dingwall-Smith, A., Rosenblum, D.: QoS-aware service composition in Dino. In: ECOWS, LNCS, vol. 5900, pp. 3\u201312. Springer (2007)","DOI":"10.1109\/ECOWS.2007.24"},{"issue":"2","key":"4_CR20","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ic.2006.06.002","volume":"205","author":"A Rensink","year":"2007","unstructured":"Rensink, A., Vogler, W.: Fair testing. Inf. Comput. 205(2), 125\u2013198 (2007)","journal-title":"Inf. Comput."},{"issue":"2","key":"4_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1022920129859","volume":"10","author":"W Visser","year":"2003","unstructured":"Visser, W., Havelund, K., Brat, G., Park, S., Lerda, F.: Model checking programs. Autom. Softw. Eng. 10(2), 203\u2013232 (2003)","journal-title":"Autom. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39570-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T00:09:00Z","timestamp":1590192540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39570-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319395692","9783319395708"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39570-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}