A Use-Case Based Component Identification Approach for Migrating Legacy Code into Distributed Environment

  • Hyeon Soo Kim
  • Heung Seok Chae
  • Chul Hong Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3280)


Due to not only proven stability and reliability but a significant investment and years of accumulated experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. In this paper we suggest a systematic approach to identifying components that perform specific business services and that consists of the legacy system’s assets to be leveraged on the modern platform such as J2EE/EJB.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alur, D., Crupi, J., Malks, D.: Core J2EE Patterns: Best practices and design strategies. Prentice Hall PTR, Englewood Cliffs (2001)Google Scholar
  2. 2.
    Battaglia, M., Savoia, G., Favaro, J.: RENAISSANCE: A method to migrate from legacy to immortal software systems. In: Proc. of CSMR 1998, pp. 197–200. IEEE Computer Society, Los Alamitos (1998)Google Scholar
  3. 3.
    Eeles, P., Houstion, K., Kozaczynski, W.: Building J2EE applications with the rational unified process. Addison-Wesley, Reading (2003)Google Scholar
  4. 4.
    Erlikh, L.: Leveraging legacy systems in modern architectures. White Paper from Relativity Technologies (2001)Google Scholar
  5. 5.
    Intercomp: MineIT: Automated extraction of business rules from legacy COBOL applications to Java applications and objects. White Paper from Intercomp (2001)Google Scholar
  6. 6.
    Intercomp: WebIT: Web-enabling of legacy applications. White Paper from Intercomp (2001)Google Scholar
  7. 7.
    Focus, M.: Componentization of legacy assets: A rapid, low-risk method of creating reusable components from legacy CICS applications. White Paper from Micro Focus (2002)Google Scholar
  8. 8.
    SEEC: A next-generation architecture for financial services on the internet. White Paper from SEEC (2000)Google Scholar
  9. 9.
    Serrano, M.A., Carver, D.L., Oca, C.M.: Reengineering legacy systems for distributed environments. The Journal of Systems and Software 64(1), 37–55 (2002)CrossRefGoogle Scholar
  10. 10.
    Sneed, H.M.: Extracting business logic from existing COBOL programs as a basis for redevelopment. In: Proc. of the 9th Int’lWorkshop on Program Comprehension, pp. 167–175 (2001)Google Scholar
  11. 11.
    Ulrich, W.M.: Legacy systems: transformation strategies. Prentice Hall PTR, Englewood Cliffs (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Hyeon Soo Kim
    • 1
  • Heung Seok Chae
    • 2
  • Chul Hong Kim
    • 3
  1. 1.Dept. of Computer Science and EngineeringChungnam Nat’l UnivDaejeonSouth Korea
  2. 2.Dept. of Computer Science and EngineeringPusan Nat’l UnivBusanSouth Korea
  3. 3.Software Engineering Research TeamElectronics and Telecommunications Research InstituteDaejeonSouth Korea

Personalised recommendations