Container-Interposed Transactions

نویسندگان

  • Marek Procházka
  • František Plášil
چکیده

The paper focuses on transaction context propagation in component-based software architectures, where every component is deployed into a container and client requests may be performed in the scope of a container-interposed transaction. In the existing commercial architectures such as EJB and COM+, the “single attribute approach” is used to specify the transaction context propagation. Being difficult to comprehend, this specification is also not powerful enough to express all the possible transaction propagation policies even for the flat transaction model; advanced transaction models cannot be employed at all. Moreover, the specification takes place as late as at the deployment time so that it is hard to reflect a particular transaction propagation policy in the component code. As a remedy, we propose to specify transaction propagation policy as a part of a component interface by means of a straightforward double attribute (NT&CT) approach. This way, advanced transaction models based on intertransaction dependencies, giving permissions, and delegation can be also specified.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transactions in software components: Container-interposed transactions

The paper focuses on transaction context propagation in component-based software architectures, where every component is deployed into a container and client requests may be performed in the scope of a container-interposed transaction. In the existing commercial architectures such as EJB and COM+, the “single attribute approach” is used to specify the transaction context propagation. Being diff...

متن کامل

The Spanning Connectivity of the Burnt Pancake Graphs

Let u and v be any two distinct vertices of an undirected graph G, which is k-connected. For 1 ≤ w ≤ k, a w-container C(u, v) of a k-connected graph G is a set of w-disjoint paths joining u and v. A wcontainer C(u, v) of G is a w∗-container if it contains all the vertices of G. A graph G is w∗-connected if there exists a w∗-container between any two distinct vertices. Let κ(G) be the connectivi...

متن کامل

Errata for "Discovering Documentation for Java Container Classes"

We apologize to the reader for any inconvenience these mistakes may have caused. We are indebted to Hewijin Christine Jiau, Dung-Feng Yu, and Kuo-Feng Ssu for pointing out these mistakes. REFERENCES [1] J. Henkel, C. Reichenbach, and A. Diwan, “Discovering Documentation for Java Container Classes,” IEEE Trans. Software Eng., vol. 33, no. 8, pp. 526543, Aug. 2007. IEEE TRANSACTIONS ON SOFTWARE E...

متن کامل

Survey of RFID and Its Application to International Ocean/Air Container Tracking

Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Acti...

متن کامل

Integrating e-Government Infrastructures through Secure XML Document Containers

In this paper we present an architecture for an information container that can support complex eGovernment procedures. Based on basic trends and a eGovernment scenario, we apply the research results gained in a project on electronic contracting on this eGovernment scenario. We argue, that eGovernment and eBusiness have structural similarities, that allow us to apply a generic contracting contai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001