Adapting integrity checking techniques for concurrent operation executions
Visualitza/Obre
Cita com:
hdl:2117/168993
Tipus de documentText en actes de congrés
Data publicació2019
EditorSpringer
Condicions d'accésAccés obert
Tots els drets reservats. Aquesta obra està protegida pels drets de propietat intel·lectual i
industrial corresponents. Sense perjudici de les exempcions legals existents, queda prohibida la seva
reproducció, distribució, comunicació pública o transformació sense l'autorització del titular dels drets
Abstract
One challenge for achieving executable models is preserving the integrity of the data. That is, given a structural model describing the constraints that the data should satisfy, and a behavioral model describing the operations that might change the data, the integrity checking problem consists in ensuring that, after executing the modeled operations, none of the specified constraints is violated. A multitude of techniques have been presented so far to solve the integrity checking problem. However, to the best of our knowledge, all of them assume that operations are not executed concurrently. As we are going to see, concurrent operation executions might lead to violations not detected by these techniques. In this paper, we present a technique for detecting and serializing those operations that can cause a constraint violation when executed concurrently , so that, previous incremental techniques, exploiting our approach, can be safely applied in systems with concurrent operation executions guaranteeing the integrity of the data.
CitacióOriol, X.; Teniente, E. Adapting integrity checking techniques for concurrent operation executions. A: System Analysis and Modelling Conference. "System Analysis and Modeling: Languages, Methods, and Tools for Industry 4.0, 11th International Conference, SAM 2019: Munich, Germany, September 16–17, 2019: proceedings". Berlín: Springer, 2019, p. 235-248.
ISBN978-3-030-30690-8
Versió de l'editorhttps://link.springer.com/chapter/10.1007%2F978-3-030-30690-8_14
Fitxers | Descripció | Mida | Format | Visualitza |
---|---|---|---|---|
AdaptingIntegrityCheckingTechniques-XOH.pdf | 293,6Kb | Visualitza/Obre |