{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T14:02:10Z","timestamp":1768917730994,"version":"3.49.0"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"OOPSLA1","license":[{"start":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:00:00Z","timestamp":1680739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/T006544\/2, EP\/K011715\/1, EP\/K034413\/1, EP\/L00058X\/1, EP\/N027833\/2, EP\/N028201\/1, EP\/T014709\/2, EP\/V000462\/1, EP\/X015955\/1, and NCSC\/EPSRC VeTSS"],"award-info":[{"award-number":["EP\/T006544\/2, EP\/K011715\/1, EP\/K034413\/1, EP\/L00058X\/1, EP\/N027833\/2, EP\/N028201\/1, EP\/T014709\/2, EP\/V000462\/1, EP\/X015955\/1, and NCSC\/EPSRC VeTSS"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018705","name":"HORIZON EUROPE European Institute of Innovation and Technology","doi-asserted-by":"publisher","award":["101093006"],"award-info":[{"award-number":["101093006"]}],"id":[{"id":"10.13039\/100018705","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Program. Lang."],"published-print":{"date-parts":[[2023,4,6]]},"abstract":"<jats:p>\n            Multiparty session types (MPST) are a specification and verification framework for distributed message-passing systems. The communication protocol of the system is specified as a\n            <jats:italic>global type<\/jats:italic>\n            , from which a collection of\n            <jats:italic>local types<\/jats:italic>\n            (local process implementations) is obtained by\n            <jats:italic>endpoint projection<\/jats:italic>\n            . A global type is a single disciplining entity for the whole system, specified by\n            <jats:italic>one designer<\/jats:italic>\n            that has full knowledge of the communication protocol. On the other hand, distributed systems are often described in terms of their\n            <jats:italic>components<\/jats:italic>\n            : a different designer is in charge of providing a subprotocol for each component. The problem of modular specification of global protocols has been addressed in the literature, but the state of the art focuses only on dual input\/output compatibility. Our work overcomes this limitation. We propose the first MPST theory of\n            <jats:italic>multiparty compositionality for distributed protocol specification<\/jats:italic>\n            that is semantics-preserving, allows the composition of two or more components, and retains full MPST expressiveness. We introduce\n            <jats:italic>hybrid types<\/jats:italic>\n            for describing subprotocols interacting with each other, define a novel\n            <jats:italic>compatibility relation<\/jats:italic>\n            , explicitly describe an algorithm for composing multiple subprotocols into a\n            <jats:italic>well-formed global type<\/jats:italic>\n            , and prove that compositionality preserves projection, thus retaining semantic guarantees, such as liveness and deadlock freedom. Finally, we test our work against real-world case studies and we smoothly extend our novel compatibility to MPST with delegation and explicit connections.\n          <\/jats:p>","DOI":"10.1145\/3586031","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T21:06:02Z","timestamp":1680815162000},"page":"112-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Hybrid Multiparty Session Types: Compositionality for Protocol Specification through Endpoint Projection"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3191-7722","authenticated-orcid":false,"given":"Lorenzo","family":"Gheri","sequence":"first","affiliation":[{"name":"University of Oxford, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3925-8557","authenticated-orcid":false,"given":"Nobuko","family":"Yoshida","sequence":"additional","affiliation":[{"name":"University of Oxford, UK"}]}],"member":"320","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/83880.84528"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.279.4"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2019.07.004"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2020.100620"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50029-0_6"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61362-4_3"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85361-9_33"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44584-6_29"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00590-9_21"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429101"},{"key":"#cr-split#-e_1_2_1_11_1.1","unstructured":"Marco Carbone Fabrizio Montesi and Hugo Torres Vieira. 2018. Choreographies for Reactive Programming. https:\/\/doi.org\/10.48550\/ARXIV.1801.08107 10.48550\/ARXIV.1801.08107"},{"key":"#cr-split#-e_1_2_1_11_1.2","unstructured":"Marco Carbone Fabrizio Montesi and Hugo Torres Vieira. 2018. Choreographies for Reactive Programming. https:\/\/doi.org\/10.48550\/ARXIV.1801.08107"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-019-00332-y"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.09.027"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290342"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454041"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428223"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2022.27"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18941-3_4"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITP.2021.15"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32940-1_20"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-014-0218-8"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39212-2_18"},{"key":"e_1_2_1_23_1","unstructured":"Ethereum. 2022. Introduction to Smart Contracts. https:\/\/ethereum.org\/en\/developers\/docs\/smart-contracts\/ Accessed: 20\/10\/2022 \t\t\t\t  Ethereum. 2022. Introduction to Smart Contracts. https:\/\/ethereum.org\/en\/developers\/docs\/smart-contracts\/ Accessed: 20\/10\/2022"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2022.8"},{"key":"#cr-split#-e_1_2_1_25_1.1","unstructured":"Lorenzo Gheri and Nobuko Yoshida. 2023. Hybrid Multiparty Session Types - Full Version. https:\/\/doi.org\/10.48550\/ARXIV.2302.01979 10.48550\/ARXIV.2302.01979"},{"key":"#cr-split#-e_1_2_1_25_1.2","unstructured":"Lorenzo Gheri and Nobuko Yoshida. 2023. Hybrid Multiparty Session Types - Full Version. https:\/\/doi.org\/10.48550\/ARXIV.2302.01979"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS52264.2021.9470531"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6749"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2021.10"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19056-8_4"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053567"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328897.1328472"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2827695"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.CONCUR.2020.12"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49665-7_24"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54494-5_7"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70592-5_22"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2020.9"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3547638"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2022.4"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32940-1_17"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676964"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_6"},{"key":"e_1_2_1_44_1","volume-title":"Kerberos: The Network Authentication Protocol. https:\/\/web.mit.edu\/kerberos\/ Accessed: 20\/10\/2022","author":"MIT.","year":"2022","unstructured":"MIT. 2022 . Kerberos: The Network Authentication Protocol. https:\/\/web.mit.edu\/kerberos\/ Accessed: 20\/10\/2022 MIT. 2022. Kerberos: The Network Authentication Protocol. https:\/\/web.mit.edu\/kerberos\/ Accessed: 20\/10\/2022"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446804.3446854"},{"key":"e_1_2_1_46_1","unstructured":"Fabrizio Montesi. 2013. Choreographic Programming. Ph. D. Dissertation. isbn:978-87-7949-299-8 https:\/\/www.fabriziomontesi.com\/files\/choreographic_programming.pdf \t\t\t\t  Fabrizio Montesi. 2013. Choreographic Programming. Ph. D. Dissertation. isbn:978-87-7949-299-8 https:\/\/www.fabriziomontesi.com\/files\/choreographic_programming.pdf"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40184-8_30"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178372.3179495"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21485-2_14"},{"key":"e_1_2_1_50_1","unstructured":"OMG. 2022. Business Process Model and Notation. https:\/\/www.bpmn.org\/ Accessed: 20\/10\/2022 \t\t\t\t  OMG. 2022. Business Process Model and Notation. https:\/\/www.bpmn.org\/ Accessed: 20\/10\/2022"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43376-8_10"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.324.3"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2017.24"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2016.21"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290343"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3322484"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90636-8_3"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2577080.2577085"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/38765.38828"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485501"},{"key":"e_1_2_1_61_1","volume-title":"Object-oriented concurrent programming","author":"Yonezawa A","unstructured":"A Yonezawa and M Tokoro . 1986. Object-oriented concurrent programming . The MIT Press . isbn:978-0262240260 A Yonezawa and M Tokoro. 1986. Object-oriented concurrent programming. The MIT Press. isbn:978-0262240260"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36987-3_5"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05119-2_3"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86593-1_2"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428216"}],"container-title":["Proceedings of the ACM on Programming Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586031","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3586031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:10Z","timestamp":1750178770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,6]]},"references-count":67,"journal-issue":{"issue":"OOPSLA1","published-print":{"date-parts":[[2023,4,6]]}},"alternative-id":["10.1145\/3586031"],"URL":"https:\/\/doi.org\/10.1145\/3586031","relation":{},"ISSN":["2475-1421"],"issn-type":[{"value":"2475-1421","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,6]]},"assertion":[{"value":"2023-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}