Container-Interposed Transactions
نویسندگان
چکیده
The paper focuses on transaction context propagation in component-based software architectures, where every component is deployed into a container and client requests may be performed in the scope of a container-interposed transaction. In the existing commercial architectures such as EJB and COM+, the “single attribute approach” is used to specify the transaction context propagation. Being difficult to comprehend, this specification is also not powerful enough to express all the possible transaction propagation policies even for the flat transaction model; advanced transaction models cannot be employed at all. Moreover, the specification takes place as late as at the deployment time so that it is hard to reflect a particular transaction propagation policy in the component code. As a remedy, we propose to specify transaction propagation policy as a part of a component interface by means of a straightforward double attribute (NT&CT) approach. This way, advanced transaction models based on intertransaction dependencies, giving permissions, and delegation can be also specified.
منابع مشابه
Transactions in software components: Container-interposed transactions
The paper focuses on transaction context propagation in component-based software architectures, where every component is deployed into a container and client requests may be performed in the scope of a container-interposed transaction. In the existing commercial architectures such as EJB and COM+, the “single attribute approach” is used to specify the transaction context propagation. Being diff...
متن کاملThe Spanning Connectivity of the Burnt Pancake Graphs
Let u and v be any two distinct vertices of an undirected graph G, which is k-connected. For 1 ≤ w ≤ k, a w-container C(u, v) of a k-connected graph G is a set of w-disjoint paths joining u and v. A wcontainer C(u, v) of G is a w∗-container if it contains all the vertices of G. A graph G is w∗-connected if there exists a w∗-container between any two distinct vertices. Let κ(G) be the connectivi...
متن کاملErrata for "Discovering Documentation for Java Container Classes"
We apologize to the reader for any inconvenience these mistakes may have caused. We are indebted to Hewijin Christine Jiau, Dung-Feng Yu, and Kuo-Feng Ssu for pointing out these mistakes. REFERENCES [1] J. Henkel, C. Reichenbach, and A. Diwan, “Discovering Documentation for Java Container Classes,” IEEE Trans. Software Eng., vol. 33, no. 8, pp. 526543, Aug. 2007. IEEE TRANSACTIONS ON SOFTWARE E...
متن کاملSurvey of RFID and Its Application to International Ocean/Air Container Tracking
Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Acti...
متن کاملIntegrating e-Government Infrastructures through Secure XML Document Containers
In this paper we present an architecture for an information container that can support complex eGovernment procedures. Based on basic trends and a eGovernment scenario, we apply the research results gained in a project on electronic contracting on this eGovernment scenario. We argue, that eGovernment and eBusiness have structural similarities, that allow us to apply a generic contracting contai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001