{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:27Z","timestamp":1772163987159,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,21]],"date-time":"2007-03-21T00:00:00Z","timestamp":1174435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,21]]},"DOI":"10.1145\/1272996.1273028","type":"proceedings-article","created":{"date-parts":[[2012,10,10]],"date-time":"2012-10-10T10:45:29Z","timestamp":1349865929000},"page":"305-314","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Discrete control for safe execution of IT automation workflows"],"prefix":"10.1145","author":[{"given":"Yin","family":"Wang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan"}]},{"given":"Terence","family":"Kelly","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Laboratories, Palo Alto, California"}]},{"given":"St\u00e9phane","family":"Lafortune","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan"}]}],"member":"320","published-online":{"date-parts":[[2007,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113361.1113370"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217943"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872080"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.362854"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/70.481746"},{"key":"e_1_3_2_1_6_1","volume-title":"HotOS","author":"Brown A. B.","year":"2005","unstructured":"A. B. Brown and J. L. Hellerstein . Reducing the cost of IT operations---is automation always the answer ? In HotOS , June 2005 . A. B. Brown and J. L. Hellerstein. Reducing the cost of IT operations---is automation always the answer? In HotOS, June 2005."},{"key":"e_1_3_2_1_7_1","first-page":"108","volume-title":"Feature Interactions in Telecom, Networks IV","author":"Chen Y.-L.","year":"1997","unstructured":"Y.-L. Chen , S. Lafortune , and F. Lin . Resolving feature interactions using modular supervisory control with priorities . In Feature Interactions in Telecom, Networks IV , pages 108 -- 122 . IOS Press , 1997 . Y.-L. Chen, S. Lafortune, and F. Lin. Resolving feature interactions using modular supervisory control with priorities. In Feature Interactions in Telecom, Networks IV, pages 108--122. IOS Press, 1997."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.402"},{"key":"e_1_3_2_1_9_1","first-page":"308","volume-title":"Selected Writings on Computing","author":"Dijstra E. W.","year":"1982","unstructured":"E. W. Dijstra . Selected Writings on Computing , chapter The Mathematics Behind the Banker's Algorithm, pages 308 -- 312 . Springer-Verlag , 1982 . E. W. Dijstra. Selected Writings on Computing, chapter The Mathematics Behind the Banker's Algorithm, pages 308--312. Springer-Verlag, 1982."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Annual Technical Conference","author":"Eide E.","year":"2006","unstructured":"E. Eide , L. Stoller , T. Stack , J. Freire , and J. Lepreau . Integrated scientific workflow management for the emulab network testbed . In USENIX Annual Technical Conference , Dec. 2006 . E. Eide, L. Stoller, T. Stack, J. Freire, and J. Lepreau. Integrated scientific workflow management for the emulab network testbed. In USENIX Annual Technical Conference, Dec. 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374726"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/975344"},{"key":"e_1_3_2_1_13_1","unstructured":"jBPM. http:\/\/www.jboss.com\/products\/jbpm.  jBPM. http:\/\/www.jboss.com\/products\/jbpm."},{"key":"e_1_3_2_1_14_1","unstructured":"K. Keeton. Personal communication.  K. Keeton. Personal communication."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217958"},{"key":"e_1_3_2_1_16_1","volume-title":"HotDep","author":"Kiciman E.","year":"2005","unstructured":"E. Kiciman and L. Subramanian . A root cause localization model for large scale systems . In HotDep , June 2005 . E. Kiciman and L. Subramanian. A root cause localization model for large scale systems. In HotDep, June 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-002-0105-4"},{"key":"e_1_3_2_1_18_1","volume-title":"UC San Diego","author":"Killian C.","year":"2006","unstructured":"C. Killian , J. Anderson , R. Jhala , and A. Vahdat . Life, death, and the critical transition: Finding liveness bugs in systems code. Technical report , UC San Diego , 2006 . http:\/\/mace.ucsd.edu\/papers\/MaceMC_TR.pdf. C. Killian, J. Anderson, R. Jhala, and A. Vahdat. Life, death, and the critical transition: Finding liveness bugs in systems code. Technical report, UC San Diego, 2006. http:\/\/mace.ucsd.edu\/papers\/MaceMC_TR.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(88)90001-1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2000.876986"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. OSDI","author":"Nagaraja K.","year":"2004","unstructured":"K. Nagaraja , F. Oliveira , R. Bianchini , R. P. Martin , and T. D. Nguyen . Understanding and dealing with operator mistakes in Internet services . In Proc. OSDI , Dec. 2004 . K. Nagaraja, F. Oliveira, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and dealing with operator mistakes in Internet services. In Proc. OSDI, Dec. 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. USITS","author":"Oppenheimer D.","year":"2003","unstructured":"D. Oppenheimer , A. Ganapathi , and D. A. Patterson . Why do Internet services fail, and what can be done about it ? In Proc. USITS , Mar. 2003 . D. Oppenheimer, A. Ganapathi, and D. A. Patterson. Why do Internet services fail, and what can be done about it? In Proc. USITS, Mar. 2003."},{"key":"e_1_3_2_1_25_1","unstructured":"Oracle BPEL workflows. http:\/\/www.oracle.com\/technology\/products\/ias\/bpel\/.  Oracle BPEL workflows. http:\/\/www.oracle.com\/technology\/products\/ias\/bpel\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596141_37"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/0325013"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. OSDI","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and J. William S. Beebee . Enhancing server availability and security through failure-oblivious computing . In Proc. OSDI , Dec. 2004 . M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing server availability and security through failure-oblivious computing. In Proc. OSDI, Dec. 2004."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2001.946050"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.412626"},{"key":"e_1_3_2_1_32_1","unstructured":"Secure programming lint. http:\/\/wwww.splint.org\/.  Secure programming lint. http:\/\/wwww.splint.org\/."},{"key":"e_1_3_2_1_33_1","volume-title":"WorkShop: Command-Line Utilities","year":"2006","unstructured":"Sun. WorkShop: Command-Line Utilities , chapter 24: Using Lock Lint. Sun Press , 2006 . http:\/\/docs.sun.com\/app\/docs\/doc\/802-5763\/. Sun. WorkShop: Command-Line Utilities, chapter 24: Using Lock Lint. Sun Press, 2006. http:\/\/docs.sun.com\/app\/docs\/doc\/802-5763\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(00)00008-9"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10626-006-0006-8"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551233"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. OSDI","author":"Yang J.","year":"2004","unstructured":"J. Yang , P. Twohey , D. Engler , and M. Musuvathi . Using model checking to find serious file system errors . In Proc. OSDI , Dec. 2004 . J. Yang, P. Twohey, D. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In Proc. OSDI, Dec. 2004."}],"event":{"name":"EuroSys07: Eurosys 2007 Conference","location":"Lisbon Portugal","acronym":"EuroSys07","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 2nd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2007"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1272996.1273028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1272996.1273028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:47:36Z","timestamp":1750243656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1272996.1273028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,21]]},"references-count":36,"alternative-id":["10.1145\/1272996.1273028","10.1145\/1272996"],"URL":"https:\/\/doi.org\/10.1145\/1272996.1273028","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1272998.1273028","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,3,21]]},"assertion":[{"value":"2007-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}