{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:19:38Z","timestamp":1770977978949,"version":"3.50.1"},"reference-count":53,"publisher":"Cambridge University Press (CUP)","issue":"3","license":[{"start":{"date-parts":[[2014,11,10]],"date-time":"2014-11-10T00:00:00Z","timestamp":1415577600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Math. Struct. Comp. Sci."],"published-print":{"date-parts":[[2015,3]]},"abstract":"<jats:p>Service-oriented computing is calling for novel computational models and languages with well-disciplined primitives for client\u2013server interaction, structured orchestration and unexpected events handling. We present CaSPiS, a process calculus where the conceptual abstractions of sessioning and pipelining play a central role for modelling service-oriented systems. CaSPiS sessions are two-sided, uniquely named and can be nested. CaSPiS pipelines permit orchestrating the flow of data produced by different sessions. The calculus is also equipped with operators for handling (unexpected) termination of the partner's side of a session. Several examples are presented to provide evidence of the flexibility of the chosen set of primitives. One key contribution is a fully abstract encoding of Misra <jats:italic>et al.<\/jats:italic>'s orchestration language Orc. Another main result shows that in CaSPiS it is possible to program a \u2018graceful termination\u2019 of nested sessions, which guarantees that no session is forced to hang forever after the loss of its partner.<\/jats:p>","DOI":"10.1017\/s0960129512000953","type":"journal-article","created":{"date-parts":[[2014,11,10]],"date-time":"2014-11-10T11:41:34Z","timestamp":1415619694000},"page":"666-709","source":"Crossref","is-referenced-by-count":10,"title":["CaSPiS: a calculus of sessions, pipelines and services"],"prefix":"10.1017","volume":"25","author":[{"given":"MICHELE","family":"BOREALE","sequence":"first","affiliation":[]},{"given":"ROBERTO","family":"BRUNI","sequence":"additional","affiliation":[]},{"given":"ROCCO","family":"DE NICOLA","sequence":"additional","affiliation":[]},{"given":"MICHELE","family":"LORETI","sequence":"additional","affiliation":[]}],"member":"56","published-online":{"date-parts":[[2014,11,10]]},"reference":[{"key":"S0960129512000953_ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20401-2_1"},{"key":"S0960129512000953_ref51","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022883727209"},{"key":"S0960129512000953_ref49","unstructured":"OASIS (2007) Web Services Business Process Execution Language Version 2.0, Working Draft. Available at http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/wsbpel-v2.0.pdf."},{"key":"S0960129512000953_ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-006-0012-1"},{"key":"S0960129512000953_ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68265-3_14"},{"key":"S0960129512000953_ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31982-5_18"},{"key":"S0960129512000953_ref41","first-page":"305","volume-title":"Proceedings of SEFM'07","author":"Lanese","year":"2007"},{"key":"S0960129512000953_ref39","doi-asserted-by":"publisher","DOI":"10.1007\/11817949_32"},{"key":"S0960129512000953_ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328472"},{"key":"S0960129512000953_ref37","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053567"},{"key":"S0960129512000953_ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57208-2_35"},{"key":"S0960129512000953_ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49099-X_6"},{"key":"S0960129512000953_ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73196-2_5"},{"key":"S0960129512000953_ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.04.037"},{"key":"S0960129512000953_ref33","doi-asserted-by":"publisher","DOI":"10.1007\/11888116_4"},{"key":"S0960129512000953_ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11767954_6"},{"key":"S0960129512000953_ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328471"},{"key":"S0960129512000953_ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01918-0_5"},{"key":"S0960129512000953_ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85361-9_32"},{"key":"S0960129512000953_ref24","first-page":"338","article-title":"Global escape in multiparty sessions","volume":"8","author":"Capecchi","year":"2010","journal-title":"Leibniz International Proceedings in Informatics"},{"key":"S0960129512000953_ref23","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/978-3-540-78739-6_21","article-title":"The conversation calculus: A model of service oriented computation","volume":"4960","author":"Caires","year":"2008","journal-title":"Springer Lecture Notes in Computer Science"},{"key":"S0960129512000953_ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79980-1_8"},{"key":"S0960129512000953_ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68265-3_5"},{"key":"S0960129512000953_ref16","first-page":"53","article-title":"An algebra of hierarchical graphs and its application to structural encoding","volume":"20","author":"Bruni","year":"2010","journal-title":"Scientific Annals of Computer Science"},{"key":"S0960129512000953_ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00945-7_5"},{"key":"S0960129512000953_ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01918-0_1"},{"key":"S0960129512000953_ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72794-1_6"},{"key":"S0960129512000953_ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27269-1_15"},{"key":"S0960129512000953_ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050124"},{"key":"S0960129512000953_ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71316-6_3"},{"key":"S0960129512000953_ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68863-1_3"},{"key":"S0960129512000953_ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11841197_3"},{"key":"S0960129512000953_ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03459-6_5"},{"key":"S0960129512000953_ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68265-3_2"},{"key":"S0960129512000953_ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71389-0_4"},{"key":"S0960129512000953_ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.02.001"},{"key":"S0960129512000953_ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68679-8_40"},{"key":"S0960129512000953_ref46","unstructured":"Mezzina L. (2009) Typing Services. Ph.D. in Computer Science and Engineering, IMT Institute for Advanced Studies, Lucca."},{"key":"S0960129512000953_ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68679-8_42"},{"key":"S0960129512000953_ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11841197_10"},{"key":"S0960129512000953_ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.071"},{"key":"S0960129512000953_ref40","first-page":"176","article-title":"Security types for sessions and pipelines","volume":"5387","author":"Kolundzija","year":"2009","journal-title":"Springer Lecture Notes in Computer Science"},{"key":"S0960129512000953_ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11580850_16"},{"key":"S0960129512000953_ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11767954_5"},{"key":"S0960129512000953_ref50","unstructured":"Sensoria Project (2010) Software Engineering for Service-Oriented Overlay Computers. Public Web Site. http:\/\/sensoria.fast.de\/."},{"key":"S0960129512000953_ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71316-6_4"},{"key":"S0960129512000953_ref12","first-page":"451","article-title":"A foundational theory of contracts for multi-party service composition","volume":"89","author":"Bravetti","year":"2008","journal-title":"Fundamenta Informaticae"},{"key":"S0960129512000953_ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71316-6_2"},{"key":"S0960129512000953_ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.08.017"},{"key":"S0960129512000953_ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11539452_30"},{"key":"S0960129512000953_ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78663-4_17"},{"key":"S0960129512000953_ref19","first-page":"569","volume-title":"Proceedings of IFIP-TCS'04","author":"Bruni","year":"2004"},{"key":"S0960129512000953_ref47","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90008-4"}],"container-title":["Mathematical Structures in Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S0960129512000953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T02:54:03Z","timestamp":1555815243000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S0960129512000953\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,10]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["S0960129512000953"],"URL":"https:\/\/doi.org\/10.1017\/s0960129512000953","relation":{},"ISSN":["0960-1295","1469-8072"],"issn-type":[{"value":"0960-1295","type":"print"},{"value":"1469-8072","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,10]]}}}