A secure framework for managing transactional properties of business objects
نویسندگان
چکیده
A business object is a set of well-structured, persistent data associated with some predefined transactional operations. Maintaining the transactional correctness of business objects is very important, especially in financial applications. The object’s correctness has to be guaranteed at any time during the lifecycle of the object. This requires that each simple operation is correct, i.e., satisfies the ACID property, and the object is in acceptable states before and after each operation. The correctness of each simple transaction can be secured and guaranteed by using a transactional database or a transaction monitor. However, the combined effect of executing a set of simple transactions may violate some business rules and leave the object in an unacceptable state. The proposed model is based on Heirarchical Statechart to specify the allowable states and transitions on a business object during its life cycle. The paper describes an XML-based framework to support application development based on this model. The framework includes an XML language for model specification, a set of tools for model definition, testing and simulation, and a set of APIs to provide business object management functionalities at runtime. The model and framework allows secure transactional properties of a business object to be defined formally and declaratively, and provides correctness guarantees at runtime. The framework facilitates fast product development and integration in a service-oriented architectural model, and provides great flexibilities for persisting data in either XML or relational databases. The experience of how to use the framework in developing a financial transactions system and the tradeoffs is based on comparison between XML and relational databases. 57 A Shoniregun C., Duan Z., Bose S. and Logvynovskiy A. (2005). A SECURE FRAMEWORK FOR MANAGING TRANSACTIONAL PROPERTIES OF BUSINESS OBJECTS. In Proceedings of the Second International Conference on e-Business and Telecommunication Networks, pages 57-65 DOI: 10.5220/0001407200570065 Copyright c © SciTePress
منابع مشابه
A token-based independent update protocol for managing replicated objects
Replication is the key to providing high availability, fault tolerance, and enhanced performance in a computing system [17, 39]. Existing strategies used for managing replicated objects can be divided into two levels. At the system level, many strategies use multicast group communication systems to provide a run-time system support or toolkit for simplifying the design and implementation of rel...
متن کاملAutomatically Generating Symbolic Prefetches for Distributed Transactional Memories
Developing efficient distributed applications while managing complexity can be challenging. Managing network latency is a key challenge for distributed applications. We propose a new approach to prefetching, symbolic prefetching, that can prefetch remote objects before their addresses are known. Our approach was designed to hide the latency of accessing remote objects in distributed transaction...
متن کاملBuilding a Business Transaction Framework based on Abstract Transaction Constructs
Transaction support is vital for reliability of business processes which nowadays can involve dynamically composed services across organizational boundaries. However, no single transaction model is comprehensive enough to accommodate various transactional properties demanded by those processes. Therefore we develop the Business Transaction Framework, which is based on Abstract Transactional Con...
متن کاملAbsorptive Capability and Competitive Advantage: Some Insights from Indian Pharmaceutical Industry
Every firm learns through firm specific methods. This learning process is operationalized by firm’s knowledge management practices. Therefore, knowledge to result in successful learning should be assisted by a combinative framework which can enhance a firms’ absorptive capability. This in turn will play a decisive role for achieving competitive advantage. Current literature in strategic managem...
متن کاملDesigning a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems
Currently e-commerce system security focuses on mechanisms such as secure transactional protocols, cryptographic schemes, parameter sanitization and it is assumed that putting these in place will guarantee a secure eCommerce application. However, often vulnerabilities in the business application logic itself are often ignored that can make the effect of these security mechanisms null and void. ...
متن کامل