Compensation Methods to Support Generic Graph Editing: A Case Study in Automated Verification of Schema Requirements for an Advanced Transaction Model

نویسندگان

  • Susan Even
  • David Spelt
چکیده

class Element { attribute string name; attribute int position; abstract boolean isConnectedTo(Element n); string changeNameTo(string s); };boolean isConnectedTo(Element n); string changeNameTo(string s); }; abstract class Node extends Element {class Node extends Element { attribute set incomingLinks; attribute set outgoingLinks; boolean addIncomingLink(Link k); }; class ANode extends Node { attribute set<Atomic

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verification of Compensation Requirements for the SEPIA Cooperative Authoring System

Compensation plays an important role in advanced transaction models, cooperative work, and workflow systems. However, in spite of the fact that the correctness of a system may depend on compensation operations, little attention has been devoted to the specification of these operations and the verification of their ability to compensate. In fact, compensation operations are often simply written ...

متن کامل

Compensation methods to support cooperative applications: A case study in automated verification of schema requirements for an advanced transaction model

Compensation plays an important role in advanced transaction models, cooperative work and workflow systems. A schema designer is typically required to supply for each transaction T another transaction T −1 to semantically undo the effects of T . Little attention has been paid to the verification of the desirable properties of such operations, however. This paper demonstrates the use of a higher...

متن کامل

A Theorem Prover-Based Analysis Tool for Object-Oriented Databases

We present a theorem-prover based analysis tool for object-oriented database systems with integrity constraints. Object-oriented database specifications are mapped to higher-order logic (HOL). This allows us to reason about the semantics of database operations using a mechanical theorem prover such as Isabelle or PVS. The tool can be used to verify various semantics requirements of the schema (...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999