A Component-Based Approach to Compose Transaction Standards

نویسندگان

  • Romain Rouvoy
  • Patricia Serrano-Alvarado
  • Philippe Merle
چکیده

This paper tackles the problem of composition of transaction services, which are governed by various transaction standards. Among others, we can cite the Object Transaction Service, Java Transaction Service, or Web Services Atomic Transaction. However, the Web Services Atomic Transaction standard encloses legacy transaction standards to support the Web Services application platform. This encapsulation introduces an additional complexity to the system and hides the specificities of legacy transaction standards. When composing heterogeneous legacy applications, the underlying transaction services are basically not composed transparently. This paper presents an approach to build an Adapted Transaction Service, named ATS, which supports several transaction standards concurrently. The objective of ATS is to facilitate the transaction standards composition. To introduce ATS we detail how the Object Transaction Service, Web Services Atomic Transaction, and Java Transaction Service standards can be composed. Besides, an ATS implementation is introduced using the GoTM framework. We show that this fine-grained component-based approach does not introduce an additional overhead to legacy applications and supports well scalability. Moreover, this approach can be extended to other standards.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of ranked-based and unranked-based metrics for determining the effectiveness of search engines

Purpose: Traditionally, there have many metrics for evaluating the search engine, nevertheless various researchers’ proposed new metrics in recent years. Aware of this new metrics is essential to conduct research on evaluation of the search engine field. So, the purpose of this study was to provide an analysis of important and new metrics for evaluating the search engines. Methodology: This is ...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

Detecting frauds using customer behavior trend analysis and known scenarios

In this paper a fraud detection method is proposed which user behaviors are modeled using two main components namely the un-normal trend analysis component and scenario based component. The extent of deviation of a transaction from his/her normal behavior is estimated using fuzzy membership functions. The results of applying all membership functions on a transaction will then be infused and a f...

متن کامل

تحلیلی بر وجوه نهادی مدیریت ریسک در صنعت بیمه مبتنی بر رویکرد اقتصاد هزینه مبادله

While many studies have been conducted regarding the analysis and risk assessment in the insurance, less attention has been paid to cognitive and objective aspects of uncertainty concept. The role of insurance companies to cover existing uncertainty in the framework of legal contracts can be crystallized. Thus, the measurement unit of dealing between insurer and insured is transaction. Imper...

متن کامل

Providing a Model for Evaluating Suspicious Bank Accounts with the Approach of Determining Tax Effects Based on Structural Equation Modeling

The main approach of this study is to provide solutions to managers, economists, and tax auditors. To have a clearer perspective of the transactional relationships that distress the taxpayer transaction tax also help them to choose the best strategy to improve tax revenue. In this paper the fuzzy Delphi method was used to identify the indicators affecting suspicious bank accounts. The data coll...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006