{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:07:20Z","timestamp":1725894440487},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368295"},{"type":"electronic","value":"9783642368301"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36830-1_10","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T19:35:47Z","timestamp":1361216147000},"page":"186-205","source":"Crossref","is-referenced-by-count":7,"title":["A Theory of Agreements and Protection"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Tiziana","family":"Cimoli","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M. Armbrust","year":"2010","unstructured":"Armbrust, M., et al.: A view of cloud computing. Comm. ACM\u00a053(4), 50\u201358 (2010)","journal-title":"Comm. ACM"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Cimoli, T., Pinna, G.M., Zunino, R.: An event-based model for contracts. In: Proc. PLACES (2012)","DOI":"10.4204\/EPTCS.109.3"},{"issue":"1","key":"10_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.7561\/SACS.2012.1.5","volume":"22","author":"M. Bartoletti","year":"2012","unstructured":"Bartoletti, M., Tuosto, E., Zunino, R.: Contract-oriented computing in CO2. Scientific Annals in Computer Science\u00a022(1), 5\u201360 (2012)","journal-title":"Scientific Annals in Computer Science"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-30829-1_17","volume-title":"Coordination Models and Languages","author":"M. Bartoletti","year":"2012","unstructured":"Bartoletti, M., Tuosto, E., Zunino, R.: On the Realizability of Contracts in Dishonest Systems. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol.\u00a07274, pp. 245\u2013260. Springer, Heidelberg (2012)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Zunino, R.: A calculus of contracting processes. In: LICS (2010)","DOI":"10.1109\/LICS.2010.25"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-540-77351-1_4","volume-title":"Software Composition","author":"M. Bravetti","year":"2007","unstructured":"Bravetti, M., Zavattaro, G.: Towards a Unifying Theory for Choreography Conformance and Contract Compliance. In: Lumpe, M., Vanderperren, W. (eds.) SC 2007. LNCS, vol.\u00a04829, pp. 34\u201350. Springer, Heidelberg (2007)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-71316-6_3","volume-title":"Programming Languages and Systems","author":"M.G. Buscemi","year":"2007","unstructured":"Buscemi, M.G., Montanari, U.: CC-Pi: A Constraint-Based Language for Specifying Service Level Agreements. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, pp. 18\u201332. Springer, Heidelberg (2007)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A theory of contracts for web services. ACM Transactions on Programming Languages and Systems 31(5) (2009)","DOI":"10.1145\/1538917.1538920"},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.jcss.2011.05.002","volume":"78","author":"K. Chatterjee","year":"2012","unstructured":"Chatterjee, K., Henzinger, T.A.: A survey of stochastic \u03c9-regular games. J. Comput. Syst. Sci.\u00a078(2), 394\u2013413 (2012)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1-2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.tcs.2006.07.032","volume":"365","author":"K. Chatterjee","year":"2006","unstructured":"Chatterjee, K., Henzinger, T.A., Jurdzinski, M.: Games with secure equilibria. Theor. Comput. Sci.\u00a0365(1-2), 67\u201382 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"10_CR11","unstructured":"Even, S., Yacobi, Y.: Relations among public key signature systems. Technical Report 175, Computer Science Department, Technion, Haifa (1980)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-16612-9_21","volume-title":"Runtime Verification","author":"G. G\u00f6ssler","year":"2010","unstructured":"G\u00f6ssler, G., Le M\u00e9tayer, D., Raclet, J.-B.: Causality Analysis in Contract Violation. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol.\u00a06418, pp. 270\u2013284. Springer, Heidelberg (2010)"},{"key":"10_CR13","unstructured":"Henriksen, A.S.: Adversarial Models for Cooperative Interactions. PhD thesis, Department of Computer Science, University of Copenhagen (2011)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Hildebrandt, T.T., Mukkamala, R.R.: Declarative event-based workflow as distributed dynamic condition response graphs. In: Proc. PLACES (2010)","DOI":"10.4204\/EPTCS.69.5"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: POPL (2008)","DOI":"10.1145\/1328438.1328472"},{"issue":"2","key":"10_CR16","first-page":"72","volume":"81","author":"T. Hvitved","year":"2012","unstructured":"Hvitved, T., Klaedtke, F., Z\u0103linescu, E.: A trace-based model for multiparty contracts. JLAP\u00a081(2), 72\u201398 (2012)","journal-title":"JLAP"},{"key":"10_CR17","unstructured":"Katoen, J.-P.: Quantitative and qualitative extensions of event structures. PhD thesis, University of Twente (1996)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BFb0035386","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"W. Penczek","year":"1997","unstructured":"Penczek, W.: Model-Checking for a Subclass of Event Structures. In: Brinksma, E. (ed.) TACAS 1997. LNCS, vol.\u00a01217, pp. 145\u2013164. Springer, Heidelberg (1997)"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-540-72952-5_11","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"C. Prisacariu","year":"2007","unstructured":"Prisacariu, C., Schneider, G.: A Formal Language for Electronic Contracts. In: Bonsangue, M.M., Johnsen, E.B. (eds.) FMOODS 2007. LNCS, vol.\u00a04468, pp. 174\u2013189. Springer, Heidelberg (2007)"},{"issue":"1","key":"10_CR20","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1093\/comjnl\/bxn064","volume":"53","author":"W.M.P. Aalst van der","year":"2010","unstructured":"van der Aalst, W.M.P., Lohmann, N., Massuthe, P., Stahl, C., Wolf, K.: Multiparty contracts: Agreeing and implementing interorganizational processes. Comput. J.\u00a053(1), 90\u2013106 (2010)","journal-title":"Comput. J."},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-17906-2_31","volume-title":"Advances in Petri Nets 1986. Proceedings of an Advanced Course, Bad Honnef, 8.-19. September 1986","author":"G. Winskel","year":"1987","unstructured":"Winskel, G.: Event Structures. In: Brauer, W., Reisig, W., Rozenberg, G. (eds.) APN 1986. LNCS, vol.\u00a0255, pp. 325\u2013392. Springer, Heidelberg (1987)"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36830-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T08:19:40Z","timestamp":1557562780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36830-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368295","9783642368301"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36830-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}