{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:26:44Z","timestamp":1725532004961},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642013638"},{"type":"electronic","value":"9783642013645"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01364-5_11","type":"book-chapter","created":{"date-parts":[[2009,4,30]],"date-time":"2009-04-30T12:32:58Z","timestamp":1241094778000},"page":"175-190","source":"Crossref","is-referenced-by-count":5,"title":["Security Types for Sessions and Pipelines"],"prefix":"10.1007","author":[{"given":"Marija","family":"Kolund\u017eija","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1007\/978-3-540-68679-8_40","volume-title":"Concurrency, Graphs and Models","author":"L. Acciai","year":"2008","unstructured":"Acciai, L., Boreale, M.: A Type System for Client Progress in a Service-Oriented Calculus. In: Degano, P., De Nicola, R., Meseguer, J. (eds.) Concurrency, Graphs and Models. LNCS, vol.\u00a05065, pp. 642\u2013658. Springer, Heidelberg (2008)"},{"key":"11_CR2","unstructured":"Banerjee, A., Naumann, D.A.: A Simple Semantics and Static Analysis for Java Security. Technical Report 2001-1, Stevens Institute of Technology (2001)"},{"key":"11_CR3","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA (1973)"},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1017\/S095679680400543X","volume":"15","author":"E. Bonelli","year":"2005","unstructured":"Bonelli, E., Compagnoni, A., Gunter, E.: Correspondence assertions for process synchronization in concurrent communications. J. Funct. Program.\u00a015(2), 219\u2013247 (2005)","journal-title":"J. Funct. Program."},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/11841197_3","volume-title":"WS-FM 2006","author":"M. Boreale","year":"2006","unstructured":"Boreale, M., Bruni, R., Nicola, R.D., Lanese, I., Loreti, M., Montanari, U., Sangiorgi, D., Zavattaro, G.: SCC: a Service Centered Calculus. In: ACSAC 2006. LNCS, vol.\u00a04186, pp. 38\u201357. Springer, Heidelberg (2006)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-68863-1_3","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"M. Boreale","year":"2008","unstructured":"Boreale, M., Bruni, R., Nicola, R.D., Loreti, M.: Sessions and Pipelines for Structured Service Programming. In: Barthe, G., de Boer, F.S. (eds.) FMOODS 2008. LNCS, vol.\u00a05051, pp. 19\u201338. Springer, Heidelberg (2008)"},{"key":"11_CR7","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-540-73986-9_7","volume-title":"Computer Network Security","author":"G. Boudol","year":"2007","unstructured":"Boudol, G., Kolundzija, M.: Access Control and Declassification. In: Computer Network Security. CCIS, vol.\u00a01, pp. 85\u201398. Springer, Heidelberg (2007)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-79980-1_8","volume-title":"Algebraic Methodology and Software Technology","author":"R. Bruni","year":"2008","unstructured":"Bruni, R., Mezzina, L.G.: Types and Deadlock Freedom in a Calculus of Services, Sessions and Pipelines. In: Meseguer, J., Ro\u015fu, G. (eds.) AMAST 2008. LNCS, vol.\u00a05140, pp. 100\u2013115. Springer, Heidelberg (2008)"},{"issue":"5","key":"11_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Comm. of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Comm. of the ACM"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-78663-4_18","volume-title":"Trustworthy Global Computing","author":"M. Dezani-Ciancaglini","year":"2008","unstructured":"Dezani-Ciancaglini, M., de\u2019 Liguoro, U., Yoshida, N.: On Progress for Structured Communications. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol.\u00a04912, pp. 257\u2013275. Springer, Heidelberg (2008)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/11785477_20","volume-title":"ECOOP 2006 \u2013 Object-Oriented Programming","author":"M. Dezani-Ciancaglini","year":"2006","unstructured":"Dezani-Ciancaglini, M., Mostrous, D., Yoshida, N., Drossopoulou, S.: Session Types for Object-Oriented Languages. In: Thomas, D. (ed.) ECOOP 2006. LNCS, vol.\u00a04067, pp. 328\u2013352. Springer, Heidelberg (2006)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A.D.: Stack Inspection: Theory and Variants. In: POPL 2002, pp. 307\u2013318 (2002)","DOI":"10.1145\/565816.503301"},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00236-005-0177-z","volume":"42","author":"S. Gay","year":"2005","unstructured":"Gay, S., Hole, M.: Subtyping for Session Types in the pi Calculus. Acta Inf.\u00a042(2), 191\u2013225 (2005)","journal-title":"Acta Inf."},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language Primitives and Type Disciplines for Structured Communication-based Programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol.\u00a01381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/11817949_32","volume-title":"CONCUR 2006 \u2013 Concurrency Theory","author":"D. Kitchin","year":"2006","unstructured":"Kitchin, D., Cook, W.R., Misra, J.: A Language for Task Orchestration and Its Semantic Properties. In: Baier, C., Hermanns, H. (eds.) CONCUR 2006. LNCS, vol.\u00a04137, pp. 477\u2013491. Springer, Heidelberg (2006)"},{"key":"11_CR16","first-page":"305","volume-title":"SEFM 2007","author":"I. Lanese","year":"2007","unstructured":"Lanese, I., Vasconcelos, V.T., Martins, F., Ravara, A.: Disciplining Orchestration and Conversation in Service-Oriented Computing. In: SEFM 2007, pp. 305\u2013314. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-71316-6_4","volume-title":"Programming Languages and Systems","author":"A. Lapadula","year":"2007","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: A Calculus for Orchestration of Web Services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, pp. 33\u201347. Springer, Heidelberg (2007)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Pottier, F., Skalka, C., Smith, S.: A Systematic Approach to Static Access Control. ACM TOPLAS\u00a027(2) (2005)","DOI":"10.1145\/1057387.1057392"},{"issue":"9","key":"11_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/357766.351244","volume":"35","author":"C. Skalka","year":"2000","unstructured":"Skalka, C., Smith, S.: Static Enforcement of Security with Types. ACM SIGPLAN Notices\u00a035(9), 34\u201345 (2000)","journal-title":"ACM SIGPLAN Notices"},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A Sound Type System for Secure Flow Analysis. J. Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. Computer Security"},{"key":"11_CR21","unstructured":"Zdancewic, S.: Programming Languages for Information Security. PhD thesis, Cornell University (2002)"}],"container-title":["Lecture Notes in Computer Science","Web Services and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01364-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T15:26:05Z","timestamp":1558279565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01364-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642013638","9783642013645"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01364-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}