Describing the functionality of EJB using the behavior protocols
نویسندگان
چکیده
component architectures are getting more popular. Industrial and academic communities try to design facilities for description of component architectures. In the SOFA/DCUP project, the description of the architecture is based on the CDL (component definition language), that embodies the behavioral protocols. The behavioral protocols of components describe the behavior of the system. One of the biggest industrial company, Sun Microsystems created the Enterprise Java Beans architecture component architecture based on the Java language and environment. The EJB specification has not facilities for formal describing. In this paper, the behavioral protocols are used to describe the EJB. The preliminary results are presented, because the work is still in progress.
منابع مشابه
User interface code generation for EJB-based data models using intermediate form representations
The use of J2EE platform enables data model development based on EJB components. Data modeling concepts of EJB technology, although resembling those of relational databases, are different and need new methods for automated user interface code generation. This paper presents a method for user interface code generation based on intermediate form representations that can be used to build equivalen...
متن کاملHigh–Available Enterprise JavaBeans Using Group Communication System Support
The Enterprise JavaBeans (EJB) architecture provides a structure to build scalable and distributed applications, based on transactions. Despite of the transactional service, if the server crashes, the EJB will be unavailable. The EJB could be recovered when the server restarts up. Its availability is restricted. High– available systems require fast recovery time that can be easily implemented u...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملAccommodating Changing Requirements with EJB
Component Based Software Development promises to lighten the task of web application developers by providing a standard component architecture for building distributed object oriented business applications. Hard evidence consolidating this promise has yet to be provided, especially knowing that the standard libraries of today's programming languages offer considerable support for distribution (...
متن کاملStudy the curing behavior and mechanical properties of Pigmented UV curable epoxy acrylate monomers
The formulations contained different acrylate monomer with different structure and functionalities and TiO2, were applied to obtain pigmented acrylic films by UV exposure. The conversion and mechanical characteristic were correlated. The results showed that there is a significant interaction between pigment, reactive diluents’ type and mechanical properties of coatings. It seems that cured film...
متن کامل