Hybrid atomicity for nested transactions
نویسندگان
چکیده
منابع مشابه
Hybrid Atomicity for Nested Transactions
Abst rac t . This paper defines the notion of hybrid atomicityfor nested transaction systems, and presents and verifies an algorithm providing this property. Hybrid atomicity is a modular property; it allows the correctness of a system to be deduced from the fact that each object is implemented to have the property. It allows more concurrency than dynamic atomicity, by assigning timestamps to t...
متن کاملTransactions: From Local Atomicity to Atomicity in the Cloud
Atomicity is a fundamental concept in computer science. Initially it was defined as an abstraction to be used in a local context. But over time, its use has expanded or scaled as application programmers have come to rely on it. This reliance is based on atomicity’s ability to make concurrent systems understandable and applications much simpler to program. Atomicity has multiple origins, but it ...
متن کاملIntegrity Checking for Nested Transactions
In this paper, we present a mechanism to specify and to validate consistency constraints in object oriented databases. Constraints are speciied using pre and post-conditions associated with an exception handling mechanism. During transaction run-time, we treat exceptions corresponding to errors (in this case, we use immediate exceptions which are processed immediately) or presumption of errors ...
متن کاملAtomicity versus Anonymity: Distributed Transactions for Electronic Commerce
1. Electronic Commerce Electronic commerce challenges our notions of distributed transactions in several ways. I discuss issues how distributed transactions can apply to electronic transactions, with special emphasis on the role of atomic@. I discuss the application of these ideas to two systems I have helped design and build: NetBill (a system for highly atomic micro-transactions) and Cryptogr...
متن کاملSecure Nested Transactions
Preventing the writing of sensitive information to a “low” database variable is insufficient, since the use of locks to synchronize accesses to the database provide a covert channel. In this example, T1 signals to T2 by locking X but not Y. In multilevel databases, this leak is prevented by allowing the low transaction to implicitly pre-empt the high transaction when the latter holds a resource...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 1995
ISSN: 0304-3975
DOI: 10.1016/0304-3975(95)00029-v