Advertisement

A Use-Case Based Component Identification Approach for Migrating Legacy Code into Distributed Environment

  • Hyeon Soo Kim
  • Heung Seok Chae
  • Chul Hong Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3280)

Abstract

Due to not only proven stability and reliability but a significant investment and years of accumulated experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. In this paper we suggest a systematic approach to identifying components that perform specific business services and that consists of the legacy system’s assets to be leveraged on the modern platform such as J2EE/EJB.

Keywords

Legacy System Design Model Common Element System Element User Interface Element 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alur, D., Crupi, J., Malks, D.: Core J2EE Patterns: Best practices and design strategies. Prentice Hall PTR, Englewood Cliffs (2001)Google Scholar
  2. 2.
    Battaglia, M., Savoia, G., Favaro, J.: RENAISSANCE: A method to migrate from legacy to immortal software systems. In: Proc. of CSMR 1998, pp. 197–200. IEEE Computer Society, Los Alamitos (1998)Google Scholar
  3. 3.
    Eeles, P., Houstion, K., Kozaczynski, W.: Building J2EE applications with the rational unified process. Addison-Wesley, Reading (2003)Google Scholar
  4. 4.
    Erlikh, L.: Leveraging legacy systems in modern architectures. White Paper from Relativity Technologies (2001)Google Scholar
  5. 5.
    Intercomp: MineIT: Automated extraction of business rules from legacy COBOL applications to Java applications and objects. White Paper from Intercomp (2001)Google Scholar
  6. 6.
    Intercomp: WebIT: Web-enabling of legacy applications. White Paper from Intercomp (2001)Google Scholar
  7. 7.
    Focus, M.: Componentization of legacy assets: A rapid, low-risk method of creating reusable components from legacy CICS applications. White Paper from Micro Focus (2002)Google Scholar
  8. 8.
    SEEC: A next-generation architecture for financial services on the internet. White Paper from SEEC (2000)Google Scholar
  9. 9.
    Serrano, M.A., Carver, D.L., Oca, C.M.: Reengineering legacy systems for distributed environments. The Journal of Systems and Software 64(1), 37–55 (2002)CrossRefGoogle Scholar
  10. 10.
    Sneed, H.M.: Extracting business logic from existing COBOL programs as a basis for redevelopment. In: Proc. of the 9th Int’lWorkshop on Program Comprehension, pp. 167–175 (2001)Google Scholar
  11. 11.
    Ulrich, W.M.: Legacy systems: transformation strategies. Prentice Hall PTR, Englewood Cliffs (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Hyeon Soo Kim
    • 1
  • Heung Seok Chae
    • 2
  • Chul Hong Kim
    • 3
  1. 1.Dept. of Computer Science and EngineeringChungnam Nat’l UnivDaejeonSouth Korea
  2. 2.Dept. of Computer Science and EngineeringPusan Nat’l UnivBusanSouth Korea
  3. 3.Software Engineering Research TeamElectronics and Telecommunications Research InstituteDaejeonSouth Korea

Personalised recommendations