{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:22:39Z","timestamp":1742390559107},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726661"},{"type":"electronic","value":"9783540726678"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72667-8_7","type":"book-chapter","created":{"date-parts":[[2007,6,22]],"date-time":"2007-06-22T19:57:19Z","timestamp":1182542239000},"page":"68-83","source":"Crossref","is-referenced-by-count":6,"title":["Web Service Contracting: Specification and Reasoning with SCIFF"],"prefix":"10.1007","author":[{"given":"Marco","family":"Alberti","sequence":"first","affiliation":[]},{"given":"Federico","family":"Chesani","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Gavanelli","sequence":"additional","affiliation":[]},{"given":"Evelina","family":"Lamma","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Montali","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Torroni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"http:\/\/lia.deis.unibo.it\/research\/socs\/","key":"7_CR1"},{"unstructured":"http:\/\/www.w3.org\/TR\/rif-ucr\/","key":"7_CR2"},{"unstructured":"http:\/\/www.daml.org\/services\/owl-s\/","key":"7_CR3"},{"unstructured":"http:\/\/www.w3.org\/Submission\/SWSF-SWSL\/","key":"7_CR4"},{"unstructured":"http:\/\/www.l3s.de\/peertrust\/","key":"7_CR5"},{"key":"7_CR6","first-page":"39","volume-title":"Proc.\u00a0PPDP","author":"M. Alberti","year":"2006","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Montali, M.: An abductive framework for a-priori verification of web services. In: Proc.\u00a0PPDP, pp. 39\u201350. ACM Press, New York (2006)"},{"issue":"2-4","key":"7_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1080\/08839510500479546","volume":"20","author":"M. Alberti","year":"2006","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Compliance verification of agent interaction: a logic-based tool. Applied Artificial Intelligence\u00a020(2-4), 133\u2013157 (2006)","journal-title":"Applied Artificial Intelligence"},{"doi-asserted-by":"crossref","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in Abductive Logic Programming: the SCIFF framework. ACM Transactions on Computational Logic\u00a08 (2007)","key":"7_CR8","DOI":"10.1145\/1380572.1380578"},{"issue":"2-3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10588-006-9544-8","volume":"12","author":"M. Alberti","year":"2006","unstructured":"Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Sartor, G., Torroni, P.: Mapping deontic operators to abductive expectations. Computational and Mathematical Organization Theory\u00a012(2-3), 205\u2013225 (2006)","journal-title":"Computational and Mathematical Organization Theory"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/11580072_10","volume-title":"Rules and Rule Markup Languages for the Semantic Web","author":"S. Bhansali","year":"2005","unstructured":"Bhansali, S., Grosof, B.N.: Extending the sweetDeal approach for e-procurement using sweetRules and RuleML. In: Adi, A., Stoutenburg, S., Tabet, S. (eds.) RuleML 2005. LNCS, vol.\u00a03791, pp. 113\u2013129. Springer, Heidelberg (2005)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1007\/11896548_63","volume-title":"Current Trends in Database Technology \u2013 EDBT 2006","author":"F. Bry","year":"2006","unstructured":"Bry, F., Eckert, M.: Twelve theses on reactive rules for the web. In: Grust, T., H\u00f6pfner, H., Illarramendi, A., Jablonski, S., Mesiti, M., M\u00fcller, S., Patranjan, P.-L., Sattler, K.-U., Spiliopoulou, M., Wijsen, J. (eds.) EDBT 2006. LNCS, vol.\u00a04254, pp. 842\u2013854. Springer, Heidelberg (2006)"},{"issue":"1-3","key":"7_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S0743-1066(98)10005-5","volume":"37","author":"T. Fr\u00fchwirth","year":"1998","unstructured":"Fr\u00fchwirth, T.: Theory and practice of constraint handling rules. Journal of Logic Programming\u00a037(1-3), 95\u2013138 (1998)","journal-title":"Journal of Logic Programming"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0743-1066(97)00026-5","volume":"33","author":"T.H. Fung","year":"1997","unstructured":"Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. Journal of Logic Programming\u00a033(2), 151\u2013165 (1997)","journal-title":"Journal of Logic Programming"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/11580072_12","volume-title":"Rules and Rule Markup Languages for the Semantic Web","author":"G. Governatori","year":"2005","unstructured":"Governatori, G., Hoang, D.P.: A semantic web based architecture for e-contracts in defeasible logic. In: Adi, A., Stoutenburg, S., Tabet, S. (eds.) RuleML 2005. LNCS, vol.\u00a03791, pp. 145\u2013159. Springer, Heidelberg (2005)"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1145\/775152.775200","volume-title":"Proc.\u00a012th WWW","author":"B.N. Grosof","year":"2003","unstructured":"Grosof, B.N., Poon, T.C.: SweetDeal: representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In: Proc.\u00a012th WWW, pp. 340\u2013349. ACM Press, New York (2003)"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/0743-1066(94)90033-7","volume":"19-20","author":"J. Jaffar","year":"1994","unstructured":"Jaffar, J., Maher, M.: Constraint logic programming: a survey. Journal of Logic Programming\u00a019-20, 503\u2013582 (1994)","journal-title":"Journal of Logic Programming"},{"issue":"6","key":"7_CR17","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"A.C. Kakas","year":"1993","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive Logic Programming. Journal of Logic and Computation\u00a02(6), 719\u2013770 (1993)","journal-title":"Journal of Logic and Computation"},{"unstructured":"Kifer, M., Lara, R., Polleres, A., Zhao, C., Keller, U., Lausen, H., Fensel, D.: A logical framework for web service discovery. In: Semantic Web Services: Preparing to Meet the World of Business Applications. CEUR Workshop Proc., vol.\u00a0119 (2004)","key":"7_CR18"},{"issue":"3\/4","key":"7_CR19","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1023\/A:1018934223383","volume":"25","author":"R.A. Kowalski","year":"1999","unstructured":"Kowalski, R.A., Sadri, F.: From logic programming towards multi-agent systems. Annals of Mathematics and Artificial Intelligence\u00a025(3\/4), 391\u2013419 (1999)","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/5254.920599","volume":"16","author":"S.A. McIlraith","year":"2001","unstructured":"McIlraith, S.A., Son, T.C., Zeng, H.: Semantic web services. IEEE Intelligent Systems\u00a016(2), 46\u201353 (2001)","journal-title":"IEEE Intelligent Systems"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/978-3-540-30073-1_9","volume-title":"Secure Data Management","author":"W. Nejdl","year":"2004","unstructured":"Nejdl, W., Olmedilla, D., Winslett, M.: PeerTrust: Automated trust negotiation for peers on the semantic web. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2004. LNCS, vol.\u00a03178, pp. 118\u2013132. Springer, Heidelberg (2004)"},{"issue":"1","key":"7_CR22","first-page":"77","volume":"1","author":"D. Roman","year":"2005","unstructured":"Roman, D., Keller, U., Lausen, H., de Bruijn, J., Lara, R., Stollberg, M., Polleres, A., Feier, C., Bussler, C., Fensel, D.: Web service modeling ontology. Applied Ontology\u00a01(1), 77\u2013106 (2005)","journal-title":"Applied Ontology"},{"issue":"1-3","key":"7_CR23","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0743-1066(99)00073-4","volume":"44","author":"C. Sakama","year":"2000","unstructured":"Sakama, C., Inoue, K.: Abductive logic programming and disjunctive logic programming: their relationship and transferability. JLP\u00a044(1-3), 75\u2013100 (2000)","journal-title":"JLP"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web: Research and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72667-8_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:03:19Z","timestamp":1605762199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72667-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540726661","9783540726678"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72667-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}