{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:29:32Z","timestamp":1759638572039,"version":"3.41.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2010,8,1]],"date-time":"2010-08-01T00:00:00Z","timestamp":1280620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0702635"],"award-info":[{"award-number":["CCF-0702635"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Program. Lang. Syst."],"published-print":{"date-parts":[[2010,8]]},"abstract":"<jats:p>Permissions specify mutable state that can be accessed by a program. Fractions distinguish write access (1) from read access (any smaller fraction). Nesting can model object invariants and ownership. Fractional permissions provides a foundation the meaning of many of access-based annotations: uniqueness, read-only, immutability, method effects, guarded state, etc. The semantics of fractional permissions with nesting is given in terms of \u201cfractional heaps.\u201d We show that the fraction law \u03a0 \u2261 1\/2 \u03a0 + 1\/2 \u03a0 permits sound reasoning and that nesting can be carried out safely using only local reasoning.<\/jats:p>","DOI":"10.1145\/1749608.1749611","type":"journal-article","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T12:57:24Z","timestamp":1281531444000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Semantics of fractional permissions with nesting"],"prefix":"10.1145","volume":"32","author":[{"given":"John Tang","family":"Boyland","sequence":"first","affiliation":[{"name":"University of Wisconsin-Milwaukee, Milwaukee WI"}]}],"member":"320","published-online":{"date-parts":[[2010,8,13]]},"reference":[{"volume":"3086","volume-title":"Proceedings of the 18th European Conference on Object-Oriented Programming (ECOOP'04)","author":"Aldrich J.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30538-5_9"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297050"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Bierhoff K. and Aldrich J. 2007b. Modular typestate verification of aliased objects. Tech. rep. CMU-ISRI-07-105 School of Computer Science Carnegie Mellon University Pittsburgh PA.  Bierhoff K. and Aldrich J. 2007b. Modular typestate verification of aliased objects. Tech. rep. CMU-ISRI-07-105 School of Computer Science Carnegie Mellon University Pittsburgh PA.","DOI":"10.1145\/1297027.1297050"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040327"},{"volume-title":"Proceedings of the 10th International Symposium on Static Analysis","author":"Boyland J.","key":"e_1_2_1_6_1"},{"volume-title":"Proceedings of the 7th ECOOP Workshop on Formal Techniques for Java-like Programs.","year":"2005","author":"Boyland J.","key":"e_1_2_1_7_1"},{"volume":"2072","volume-title":"Proceedings of the 15th European Conference on Object-Oriented Programming (ECOOP'01)","author":"Boyland J.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040329"},{"volume-title":"Proceedings of the International Workshop on Aliasing Confinement and Ownership (IWACO '07)","author":"Boyland J.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1562154.1562158"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.12.034"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582447"},{"volume":"2743","volume-title":"Proceedings of the 17th European Conference on Object-Oriented Programming (ECOOP'03)","author":"Clarke D.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512532"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949332"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349328"},{"volume":"1628","volume-title":"Proceedings of the 13th European Conference on Object-Oriented Programming (ECOOP'99)","author":"Greenhouse A.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.375719"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181195.1181213"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512559"},{"volume-title":"Proceedings of the 2nd ECOOP Workshop on Formal Techniques for Java Programs, S. Drossopolou, S. Eisenbach, B. Jacobs, G. T. Leavens, P. M\u00fcller, and A. Poetzsch-Heffter, Eds.","author":"M\u00fcller P.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297061"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/421090"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964024"},{"volume-title":"Logic in Computer Science","author":"Reynolds J.","key":"e_1_2_1_28_1"}],"container-title":["ACM Transactions on Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1749608.1749611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1749608.1749611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:45Z","timestamp":1750249425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1749608.1749611"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,8]]}},"alternative-id":["10.1145\/1749608.1749611"],"URL":"https:\/\/doi.org\/10.1145\/1749608.1749611","relation":{},"ISSN":["0164-0925","1558-4593"],"issn-type":[{"type":"print","value":"0164-0925"},{"type":"electronic","value":"1558-4593"}],"subject":[],"published":{"date-parts":[[2010,8]]},"assertion":[{"value":"2008-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}