Abstract
Numerous extended transaction models have been proposed in the literature to overcome the limitations of the traditional transaction model for advanced applications characterized by their long durations, cooperation between activities and access to multiple databases (like CAD/CAM and office automation). However, most of these extended models have been proposed with specific applications in mind and almost always fail to support applications with slightly different requirements.
We propose the Multiform Transaction model to overcome this limitation. The multiform transaction model supports a variety of other extended transaction models. A multiform transaction consists of a set of component transactions together with a set of coordinators which specify the transaction completion dependencies among the component transactions. A set of transaction primitives allow the programmer to define custom completion dependencies. We show how a wide range of extended transactions can be implemented as multiform transactions, including sagas, transactional workflows, nested transactions, and contingent transactions. We allow the programmers to define their own primitives—having very well-defined interfaces—so that application specific transaction models like distributed multilevel secure transactions can also be supported.
Similar content being viewed by others
References
V. Atluri, E. Bertino, and S. Jajodia, “Degrees of isolation, concurrency control protocols and commit protocols, ” in Database Security, VIII: Status and Prospects, J. Biskup, M. Morgenstern and C. Landwehr (Eds.), North-Holland: Amsterdam, 1994, pp. 259–274.
R. Barga and C. Pu, “A practical and modular method to implement extended transaction models, ” in Proceedings of the 21st International Conference on Very Large Data Bases, Zürich, Switzerland, 1995, pp. 206–217.
E. Bertino, G. Chiola, and L.V. Mancini, “Deadlock detection in the face of transaction and data dependencies in advanced transaction models, ” in Proceedings of the 19th International Conference on Application and Theory of Petri Nets, Lisbon, Portugal, June 1998, pp. 266–285.
E. Bertino, S. Jajodia, L.V. Mancini, and I. Ray, “Advanced transaction processing in multilevel secure file stores, ” IEEE Transactions on Knowledge and Data Engineering, vol. 10, no. 1, 1998, pp. 120–135.
A. Biliris, S. Dar, N. Gehani, H.V. Jagadish, and K. Ramamritham, “ASSET: A system for supporting extended transactions, ” in Proceedings of the ACM SIGMOD International Conference on Management of Data, Minneapolis, Minnesota, May 1994, pp. 44–54.
O. Bukhres, A. Elmagarmid, and E. Kuhn, “Implementation of the flex transaction model, ” Bulletin of the IEEE Technical Committee on Data Engineering, vol. 12, no. 2, pp. 28–32, 1993.
P.K. Chrysanthis and K. Ramamritham, “Synthesis of extended transaction models using ACTA, ” ACM Transactions on Database Systems, vol. 19, no. 3, pp. 450–491, 1994.
U. Dayal, M. Hsu, and R. Ladin, “Organizing long-running activities with triggers and transactions, ” in Proceedings of the ACM SIGMOD International Conference on Management of Data, Atlantic City, May 1990, pp. 204–214.
A.K. Elmagarmid, (Ed.), Database Transaction Models for Advanced Applications, Morgan Kaufmann Publishers, Inc.: San Mateo, CA, 1991.
J.L. Eppinger, L.B. Mummert, and A.Z. Spector (Eds.), Camelot and Avalon. A Distributed Transaction Facility, Morgan Kaufmann Publishers, Inc.: San Mateo, CA, 1991.
H. Garcia-Molina and K. Salem, “SAGAS, ” in Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1987, pp. 249–259.
D. Georgakopoulos, M. Hornick, P. Krychniak, and F. Manola, “Specification and management of extended transactions in a programmable transaction environment, ” in Proceedings of the IEEE 10th International Conference on Data Engineering, 1994, pp. 462–477.
J. Gray and A. Reuter, Transaction Processing: Concept and Techniques, Morgan Kaufmann Publishers: San Mateo, CA, 1993.
S. Jajodia, C.D. McCollum, and B.T. Blaustein, “Integrating concurrency control and commit algorithms in distributed multilevel secure databases, ” in Database Security, VII: Status and Prospects, T.F. Keefe and C.E. Landwehr (Eds.), North-Holland: Amsterdam, 1994, pp. 109–121.
E. Knapp, “Deadlock detection in distributed databases, ” ACM Computing Surveys, vol. 19, no. 4, pp. 303–328, 1987.
B. Liskov and R. Scheifler, “Guardians and actions, ” ACM Transactions on Programming Languages and Systems, vol. 8. no. 4, pp. 484–502, 1983.
J. Eliot B. Moss, “Nested transactions: An approach to reliable distributed computing, ” PhD Thesis, EECS Department, M.I.T., 1981.
S.S. Muchnick and N.D. Jones (Eds.), Program Flow Analysis: Theory and Applications, Prentice Hall: Englewood Cliffs, N.J., 1981.
I. Ray, S. Jajodia, E. Bertino, and L. Mancini, “An advanced commit protocol for MLS distributed database systems, ” in Proceedings of the 3rd ACM Conference on Computer And Communications Security, New Delhi, India, March 1996, pp. 119–128.
A. Reuter, “ConTracts: A means for extending control beyond transaction boundaries, ” in Proceedings of the 3rd International Workshop on High Performance Transaction Systems, Asilomar, September 1989.
Transarc Corporation, Encina Toolkit Server Core Programmer's Reference, Pittsburgh, PA 15219, 1993.
A. Zhang, M. Nodine, B. Bhargava, and O. Bukhres, “Ensuring relaxed atomicity for flexible transactions in multidatabase systems, ” in Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1994, pp. 67–78.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Mancini, L.V., Ray, I., Jajodia, S. et al. Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8, 399–446 (2000). https://doi.org/10.1023/A:1008738705440
Issue Date:
DOI: https://doi.org/10.1023/A:1008738705440