• Title/Summary/Keyword: transaction process

Search Result 453, Processing Time 0.028 seconds

A Semantics-based protocol for Business Process Transactions (비즈니스 프로세스 트랜잭션을 위한 시맨틱스 기반의 프로토콜)

  • Kang, Dong-Woo;Lee, Sun-Jae;Lee, Jae-Yeol;Kim, Kwang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.93-110
    • /
    • 2006
  • A Business Process Management System(BPMS) requires transaction management to guarantee reliability for transactions. Though several transaction protocols have been suggested for the transaction management, the difference of transaction protocols interrupts interoperability among transaction management systems. In this paper, a business process transaction based on semantics is suggested. It is defined based on the static semantics and the operational semantics. As the static semantics defines the ontologies for transaction states and transaction messages using Web Ontology Language(OWL), it solves the difference of expression for the concepts of transaction protocols. As the operational semantics defines state transitions of business process transactions using Abstract State Machine(ASM), it can guarantee formalism for transaction operations. The operational semantics refers to the state ontology and message ontology defined in the static semantics. This approach can enhance interoperability among various transaction protocols, increase the understandability for the transaction protocols, and support autonomous transaction execution and systematic transaction monitoring.

  • PDF

A Study on Global-Transaction Model for the Web-Based Reliable Reservation Service (웹 기반의 신뢰성 있는 예약서비스를 위한 글로벌 트랜잭션 모델에 관한 연구)

  • 김수홍;윤용익
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.3
    • /
    • pp.247-253
    • /
    • 2004
  • This paper mainly deals with a transaction model for the reliability guarantee in a Web-Based Real-Time Reservation Service System. We suggest the Web-Based Global Transaction Model which binds up each transaction currently divided by a function into one transaction and deals with one transaction. Also, we propose a Fail-Check Process in order to deal with the exceptions to be happened in a transaction process. And the simulation shows us that the model which we suggest is feasible and possible through the transaction processing procedure.

  • PDF

Transaction Visibility: Re-Interpretation of Successful SIS Cases, and Implications for E-Commerce (거래가시성: 성공적인 SIS의 재해석을 통한 새로운 e-Commerce 프레임워크)

  • Yang, Hee-Dong;Choi, In-Young
    • Asia pacific journal of information systems
    • /
    • v.13 no.1
    • /
    • pp.73-101
    • /
    • 2003
  • Firms can create additional customer values by changing the visibility characteristic of business transactions. Both visible and invisible transactions can provide distinctive values to the customers. Visible transactions are those that are open to the customer: the customer can see the detailed logic of the transaction and may manipulate specific variables to control the transaction process. Invisible transactions mean that customers have little ability to control the transaction flow and may even be insulated from seeing the transaction. These invisible transactions will be taken care of only by suppliers, and be regarded as a process performed by suppliers. This paper pursues finding out the contingencies of successful transaction visibility change by answering to the following question; "when does increasing(or decreasing) transaction visibility make sense to customers?" This archival case study finds out that transaction visibility change should fit to the need and capabilities of customers. Increasing transaction visibility makes sense when customers need a certain supplier's performance and have a confidence in the capabilities of executing the performance. By the same token, decreasing transaction visibility makes sense when customers have substantial troubles in conducting their current transaction actions or when customers don't feel it necessary to conduct them separately because they can be derived from other action.

An Efficient Security Protocol for Transaction in Mobile Data Network (모바일 데이터 망에서의 거래를 위한 효율적인 보안 프로토콜)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2006
  • The existing electronic transaction protocol uses a cryptography algorithm that is not suitable for mobile environment because of limited memory and process ability. In this paper, we propose an efficient transaction protocol suitable for mobile embedded system. The proposed protocol reduces computation and process time by using ID-based cryptography algorithm and ECC (elliptic curve cryptosystem). It uses vendor authentication only in the first transaction, and from the second transaction, it requires transaction after authentication with session created by applying ECC technique. Therefore, the creation number of authentication for the vendor can be reduced from n to one. And it reduces process time because it provides the same security with 160 bits as with 1024 bits of RSA.

  • PDF

A Performance Enhancement of Java Card Virtual Machine with Multi-Transaction (다중 트랜잭션 기법을 이용한 자바 카드 가상 기계 성능 향상)

  • Noh, Tae-Heon;Lee, Dong-Wook;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.41-49
    • /
    • 2009
  • Smart Card is currently more popular in mobile communication, and smart card with java card platform becomes a standard choice. Java card has a problem that it gets lost working data when power is off. Transaction is the idea to solve a problem of data loss, but it accepts only one transaction process, and other transaction process need to hold until the current working transaction is finished. This might be a factor to drop the Java card's performance. In this paper, we define a rule of dual-lock which can run transaction at multiple transaction buffer as a method for a better java card performance, and we suggest this rule to improve a capability of transaction process. From this research, we are able to improve the data stability, reduce the java card transaction delay time, and get a higher processing speed of java card.

  • PDF

Efficient Method of Processing Long-term Transactions for Distributed Environment (분산 환경에서 장기 트랜잭션의 효율적인 처리 방안)

  • 정지호;엄기환
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.1007-1014
    • /
    • 2003
  • It is important to integrate an enterprise application for automating of the business profess, which is responded by a flow of market environment. There are two categories of method that integrate enterprise applications. One is Synchronous Integration, and the other is Asynchronous Integration. EAI(Enterprise Application Integration) and Web service which of the asynchronous integration is focused in the automating method of the business process. After we construct the application integration for automating of the business process, we have to concern about managing of the business transaction. Many Organizations have proposed the process method of business transaction based on 2-phase commit protocol. But this method can′t supply the phase that classify the transaction by transaction weight. In this paper, we propose an efficient method of transaction process for business transactions, which is composed by ′Classify Phase′ that classify transactions. We called this model "3-Phase Commit Method Applied by Classify Phase", we design this model to manage an resource of enterprise efficiently. The proposed method is compared by the method based on 2-Phase commit that could be a problem of management the resource of enterprise, and the advantage of this method is certified to propose the solution of that problem.

  • PDF

A Study on Management of Business Transaction in Regional Local Government (광역지방자치단체 단위과제 운영에 관한 연구)

  • Chung, Sang-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.49
    • /
    • pp.327-359
    • /
    • 2016
  • The purpose of this study is to examine and analysis the problems in managing 'Business Transaction(Danwi-gwaje)' of regional local government, and propose implications. The study points out the problems emerged in the operation process of Business Transaction including creating of Business Transaction and Business Transaction Profile, setting retention period and filing records, and gives concrete example of them. It concludes with presenting improvements and considerations in managing Business Transaction for systematic and efficient records management.

The function and architecture of electronic payment system (전자 지불 처리 시스템의 기능 및 구조)

  • 송병열;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.2
    • /
    • pp.81-94
    • /
    • 1999
  • This paper shows the architecture of IPS(Intermarket Payment System), an implementation of the electronic payment function for internet-shopping merchant system. Because the original purpose of commerce transaction is the exchange of money for goods or services, it is very important to prepare an exchangeable economic value or method. The electronic payment system is the hardware or software or both to process an electronic payment transaction. It has two type, the broker type and the electronic value type. The broker type means an intermediator between real bank network and internet commerce transaction. The electronic value type means a substitute for money in the real world. This paper shows the architecture and the function to implement the broker type electronic payment system. The system has two parts. One is the mediator part to support multiple payment systems and to offer common access methods for merchant system database. The other is the executor part to implement the payment protocol and to process payment transaction.

  • PDF

Efficient Method of Processing Long-term Transactions for Distributed Environment (분산 환경에서 장기 트랜잭션의 효율적인 처리 방안)

  • 정지호;엄기환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1498-1508
    • /
    • 2003
  • It is important to integrate an enterprise application for automating of the business process, which is responded by a flow of market environment. There are two categories of method that integrate enterprise applications. One is Synchronous Integration, and the other is Asynchronous Integration. EAI(Enterprise Application Integration) and Web service which of the asynchronous integration is focused in the automating method of the business process. After we construct the application integration for automating of the business process, we have to concern about managing of the business transaction. Many Organizations have proposed the process method of business transaction based on 2-phase commit protocol. But this method can't supply the phase that classify the transaction by transaction weight. In this Paper, we Propose an efficient method of transaction process for business transactions, which is composed by ‘Classify Phase’ that classify transactions. We called this model “3-Phase Commit Method Applied by Classify Phase”, we design this model to manage an resource of enterprise efficiently. The proposed method is compared by the method based on 2-Phase commit that could be a problem of management the resource of enterprise, and the advantage of this method is certified to propose the solution of that problem.

Automatic Verification and Tuning of Transaction-based Database Applications (트랜잭션 기반 데이타베이스 응용프로그램의 안전성 자동 검증 및 자동 튜닝)

  • Kang Hyun-Goo;Yi Kwangkeun
    • Journal of KIISE:Databases
    • /
    • v.32 no.1
    • /
    • pp.86-99
    • /
    • 2005
  • In this paper, we suggest a system which automatically verifies and tunes transaction processing database applications based on program analysis technology. This system automatically verifies two kinds of transaction processing errors. The first case is the un-closed transaction. In this case, data is not updated as expected or performance of overall system can decrease seriously by locking some database tables until the process terminates. The second case is the miss-use of transaction isolation(inking) level. This causes runtime exception or abnormal termination of the program depending on runtime environment. This system automatically tunes two kinds of inefficient definition of transaction processing which decrease the performance of overall system. The first case happens when opened transaction is closed too late. And the second case happens when transaction isolation level is set too high.