Skip to main content

Implementing Isolation for Service-Based Applications

  • Conference paper
  • 760 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5870))

Abstract

Loosely-coupled distributed systems can be difficult to design and implement correctly, with time-of-check-to-time-of-use flaws arising from the lack of isolation being of particular concern. It is not feasible to use traditional distributed ACID transactions to solve such problems because the business activities being integrated are typically long-running and the interacting participants have incomplete mutual trust. ’Promises’ were recently proposed as a solution to this problem. This paper discusses how promise-based isolation can be implemented when resources are described by predicates over properties, rather than being identified explicitly.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gray, J., Reuter, A.: Transaction processing: concepts and techniques. Morgan Kaufmann, San Francisco (1993)

    MATH  Google Scholar 

  2. Greenfield, P., Fekete, A., Jang, J., Kuo, D., Nepal, S.: Isolation Support for Service-based Applications: A Position Paper. In: Proc. of CIDR, pp. 314–323 (2007)

    Google Scholar 

  3. Jang, J., Fekete, A., Greenfield, P.: Delivering Promises for Web Services Applications. In: Proc. of IEEE ICWS, pp. 599–606 (2007)

    Google Scholar 

  4. O’Neil, P.: The Escrow Transactional Methods. ACM TODS 11(4), 405–430 (1986)

    Article  Google Scholar 

  5. Eswaran, K., Gray, J., Lorie, R., Traiger, I.: The Notions of Consistency and Predicate Locks in a Database System. Comm. ACM 19(11), 624–633 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  6. Wachter, H., Reuter, A.: The ConTract Model. In: Elmagarmid, A. (ed.) Database Transaction Models for Advanced Applications, pp. 219–263 (1992)

    Google Scholar 

  7. Garcia-Molina, H., Salem, K.: Sagas. In: Proc. of ACM SIGMOD, pp. 249–259 (1987)

    Google Scholar 

  8. Srinivasan, K., Malu, P., Moakley, G.: Automatic Multibusiness Transactions. IEEE Internet Computing 7(3), 66–73 (2003)

    Article  Google Scholar 

  9. Zhao, W., Moser, L.E., Melliar-Smith, P.M.: A Reservation-Based Coordination Protocol for Web Services. In: Proc. of IEEE ICWS, pp. 49–56 (2005)

    Google Scholar 

  10. Greenfield, P., Kuo, D., Nepal, S., Fekete, A.: Consistency for Web Services Applications. In: Proc. of VLDB, pp. 1199–1203 (2005)

    Google Scholar 

  11. Kleinberg, J., Tardos, E.: Algorithm Design. Addison-Wesley, Reading (2006)

    Google Scholar 

  12. Bustamante, M.: Building a WCF Router. In Service Station, MSDN Magazine (April 2008), http://msdn.microsoft.com/en-us/magazine

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, W., Fekete, A., Greenfield, P., Jang, J. (2009). Implementing Isolation for Service-Based Applications. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2009. OTM 2009. Lecture Notes in Computer Science, vol 5870. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05148-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05148-7_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05147-0

  • Online ISBN: 978-3-642-05148-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics