TY - JOUR
T1 - Correspondence assertions for process synchronization in concurrent communications
AU - Bonelli, Eduardo
AU - Compagnoni, Adriana
AU - Gunter, Elsa
PY - 2005/3
Y1 - 2005/3
N2 - High-level specification of patterns of communications such as protocols can be modeled elegantly by means of session types (Honda et al., 1998). However, a number of examples suggest that session types fall short when finer precision on protocol specification is required. In order to increase the expressiveness of session types we appeal to the theory of correspondence assertions (Clarke & Marrero, 1998; Gordon & Jeffrey, 2003b). The resulting type discipline augments the types of long-term channels with effects and thus yields types which may depend on messages read or written earlier within the same session. This new type system can be used to check: source of information, whether data is propagated as specified across multiple parties, if there are unspecified communications between parties, and if the data being exchanged has been modified by the code in an unspecified way. We prove that evaluation preserves typability and that well-typed processes are safe. Also, we illustrate how the resulting theory allows us to address shortcomings present in the pure theory of session types.
AB - High-level specification of patterns of communications such as protocols can be modeled elegantly by means of session types (Honda et al., 1998). However, a number of examples suggest that session types fall short when finer precision on protocol specification is required. In order to increase the expressiveness of session types we appeal to the theory of correspondence assertions (Clarke & Marrero, 1998; Gordon & Jeffrey, 2003b). The resulting type discipline augments the types of long-term channels with effects and thus yields types which may depend on messages read or written earlier within the same session. This new type system can be used to check: source of information, whether data is propagated as specified across multiple parties, if there are unspecified communications between parties, and if the data being exchanged has been modified by the code in an unspecified way. We prove that evaluation preserves typability and that well-typed processes are safe. Also, we illustrate how the resulting theory allows us to address shortcomings present in the pure theory of session types.
UR - http://www.scopus.com/inward/record.url?scp=17044434267&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=17044434267&partnerID=8YFLogxK
U2 - 10.1017/S095679680400543X
DO - 10.1017/S095679680400543X
M3 - Article
AN - SCOPUS:17044434267
SN - 0956-7968
VL - 15
SP - 219
EP - 247
JO - Journal of Functional Programming
JF - Journal of Functional Programming
IS - 2
ER -