Specification and execution of transactions for advanced database applications

نویسندگان

  • Yungho Leu
  • Ahmed K. Elmagarmid
  • Noureddine Boudriga
چکیده

Autonomous multidatabases, Computer Aided Design (CAD) databases, and Object Oriented Databases have requirements that cODstitute a few examples of systems where traditional transactions may not be sufficient. Users of these advanced applications are more sophisticated than users envisioned for On Line Transaction Processing (OLTP) applications a few decades ago. The need to relax the properties of complex database transactions is urgent. Frameworks for fiexible transaction systems are needed. This paper is a step towards this objective. This paper addresses the formalization of a new transaction model called Flex along with execution control and analysis protocols. The algorithm is formalized through the use of Predicate Transition Nets (PTN) and reachability trees. -This research was supported, in part, by a gra.Ilt from the Software Engineering Research Center at Purdue University, a Nalional Science Foundation Industry/University Cooperative Research Center (NSF Granl No. ECD-8913133). IUniversity of 'JUnis, Faculty of Science, Tunisia.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model checking and code generation for transaction processing software

In modern transaction processing software, the ACID properties (Atomicity, Consistency, Isolation, Durability) are often relaxed, in order to address requirements that arise in computing environments of today. Typical examples are the long-running transactions in mobile computing, in service oriented architectures and B2B collaborative applications. These new transaction models are collectively...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

Data sanitization in association rule mining based on impact factor

Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that counterparts cannot discover the sensitive patterns and so data confidentiality is preserved ag...

متن کامل

Reliable Scheduling of Advanced Transactions

The traditional transaction processing model is not suitable for many advanced applications, such as those having long duration or those consisting of co-operating activities. Researchers have addressed this problem by proposing various new transaction models capable of processing advanced transactions. Advanced transactions are characterized by having a number of component subtransactions whos...

متن کامل

Declarative Specifications of Complex Transactions

While specifications of queries are usually of a declarative nature (since the work of Codd in the early seventies), specifications of transactions are still mainly of an operational and descriptive nature. Especially descriptions of complex transactions (such as cascading deletes) tend to be very operational. Often these descriptions turn out to be nondeterministic as well. A problematic conse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Syst.

دوره 17  شماره 

صفحات  -

تاریخ انتشار 1992