Transform: A Transaction Safe Web Application Model
نویسندگان
چکیده
Classical models of database-driven web applications follow thin-client architectures, i.e., all data processing and business logic resides on the server while the client’s role is to arrange and display the user interface. When transactions come into play, which may naturally span several consecutive interactions between client pages and server actions, problems arise since transactions cannot exceed the boundaries of server actions. We address this issue by proposing a novel architecture for web applications, where a webservice-based data access component is integrated directly in the markup of a client page. Our approach guarantees ACID transaction properties and generates serializable histories in the sense of conflict serializability. In contrast to past efforts to transaction management in web applications, our architecture does not necessitate the existence of an additional, external transaction server.
منابع مشابه
The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملDesign Recovery of Web Application Transactions
Modern Web sites provide applications that are increasingly built to support the execution of business processes. In such a transaction-oriented Web site, the user executes a series of activities in order to carry out a specific task (e.g., purchase an airplane ticket). The manner in which the activities can be executed is a consequence of the transaction design. Unfortunately, many Web sites a...
متن کاملA Business-Aware Web Services Transaction Model
Advanced business applications typically involve well-defined standard business functions such as payment processing, shipping and tracking, managing market risk and so on, which apply to a variety of application scenarios. Although such business functions drive transactional applications between trading partners they are completely external to current Web services transaction mechanisms as the...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملAn Efficient Algorithm for Fault Classification and Identification in Online Transaction Management
Nowadays the customer demand for accessing a web based application has grown enormously as everything is available in the Internet. Sensitive application providers retain their resources in safe from unauthorized access by using single signon technique. In this technique if a user gives an irrelevant information in a particular session, he may be asked to continue the session by using sign on t...
متن کامل