TRANSFORM: A TRANSACTION SAFE WEB APPLICATION MODEL

Matthias Ihle, Georg LausenLausen

2006

Abstract

Classical models of database-driven web applications follow thin-client architectures, i.e., all data processing and business logic resides on the server while the client’s role is to arrange and display the user interface. When transactions come into play, which may naturally span several consecutive interactions between client pages and server actions, problems arise since transactions cannot exceed the boundaries of server actions. We address this issue by proposing a novel architecture for web applications, where a webservice-based data access component is integrated directly in the markup of a client page. Our approach guarantees ACID transaction properties and generates serializable histories in the sense of conflict serializability. In contrast to past efforts to transaction management in web applications, our architecture does not necessitate the existence of an additional, external transaction server.

References

  1. Bernstein, P. A. and Goodman, N. (1981). Concurrency control in distributed database systems. ACM Comput. Surv., 13(2):185-221.
  2. Ceri, S., Fraternali, P., and Bongio, A. (2000). Web modeling language (webml): a modeling language for designing web sites. In Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking, pages 137-157, Amsterdam, The Netherlands, The Netherlands. NorthHolland Publishing Co.
  3. Draheim, D. and Weber, G. (2004). Form-Oriented Analysis: A New Methodology to Model Form-Based Applications. Springer Verlag.
  4. E. James Whitehead, J. and Goland, Y. (1999). Webdav: a network protocol for remote collaborative authoring on the web. In Proceedings of the Sixth European conference on Computer supported cooperative work, pages 291-310, Norwell, MA, USA. Kluwer Academic Publishers.
  5. Fielding, R., Gettys, J., Mogul, J. C., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T. (1998). Hypertext Transfer Protocol - HTTP/1.1. Technical Report Internet RFC 2616, IETF. http://www.ietf. org/rfc/rfc2616.txt.
  6. Fielding, R. T. (2000). Architectural styles and the design of network-based software architectures.
  7. Garrett, J. J. (2005). Ajax: A new approach to web applications. http://www.adaptivepath. com/publications/essays/archives/ 000385.php.
  8. Härder, T. (1984). Observations on optimistic concurrency control schemes. Inf. Syst., 9(2):111-120.
  9. Härder, T. and Reuter, A. (1983). Principles of transactionoriented database recovery. ACM Comput. Surv., 15(4):287-317.
  10. Kung, H. T. and Robinson, J. T. (1981). On optimistic methods for concurrency control. ACM Trans. Database Syst., 6(2):213-226.
  11. Lampson, B. W. and Sturgis, H. E. (1979). Crash recovery in a distributed data storage system. Technical report.
  12. Lewis, P. M., Bernstein, A., and Kifer, M. (2002). Databases and Transaction Processing. AddisonWesley.
  13. Lyon, J., Evans, K., and Klein, J. (1998). Transaction Internet Protocol. Technical Report Internet RFC 2371. http://www.ietf.org/rfc/ rfc2372.txt?number=2372.
  14. Pardon, G. and Alonso, G. (2000). Cheetah: a lightweight transaction server for plug-and-play internet data management. In VLDB 7800: Proceedings of the 26th International Conference on Very Large Data Bases, pages 210-219, San Francisco, CA, USA. Morgan Kaufmann Publishers Inc.
  15. Shadgar, B. and Holyer, I. (2004). Adapting databases and webdav protocol. In WWW 7804: Proceedings of the 13th international conference on World Wide Web, pages 612-620, New York, NY, USA. ACM Press.
  16. W3C (1999). XML Path Language (XPath) Version 1.0. Technical report.
  17. W3C (2000). Simple Object Access Protocol (SOAP) 1.1. Technical report.
  18. Weikum, G. and Vossen, G. (2001). Transactional information systems: theory, algorithms, and the practice of concurrency control and recovery. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
  19. Yang, J. and Kaiser, G. E. (1999). Jpernlite: Extensible transaction services for the www. IEEE Transactions on Knowledge and Data Engineering, 11(4):639-657.
Download


Paper Citation


in Harvard Style

Ihle M. and LausenLausen G. (2006). TRANSFORM: A TRANSACTION SAFE WEB APPLICATION MODEL . In Proceedings of WEBIST 2006 - Second International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 978-972-8865-46-7, pages 164-171. DOI: 10.5220/0001253101640171


in Bibtex Style

@conference{webist06,
author={Matthias Ihle and Georg LausenLausen},
title={TRANSFORM: A TRANSACTION SAFE WEB APPLICATION MODEL},
booktitle={Proceedings of WEBIST 2006 - Second International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2006},
pages={164-171},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001253101640171},
isbn={978-972-8865-46-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of WEBIST 2006 - Second International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - TRANSFORM: A TRANSACTION SAFE WEB APPLICATION MODEL
SN - 978-972-8865-46-7
AU - Ihle M.
AU - LausenLausen G.
PY - 2006
SP - 164
EP - 171
DO - 10.5220/0001253101640171