A Use-Case Based Component Identification Approach for Migrating Legacy Code into Distributed Environment
Due to not only proven stability and reliability but a significant investment and years of accumulated experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. In this paper we suggest a systematic approach to identifying components that perform specific business services and that consists of the legacy system’s assets to be leveraged on the modern platform such as J2EE/EJB.
KeywordsLegacy System Design Model Common Element System Element User Interface Element
Unable to display preview. Download preview PDF.
- 1.Alur, D., Crupi, J., Malks, D.: Core J2EE Patterns: Best practices and design strategies. Prentice Hall PTR, Englewood Cliffs (2001)Google Scholar
- 2.Battaglia, M., Savoia, G., Favaro, J.: RENAISSANCE: A method to migrate from legacy to immortal software systems. In: Proc. of CSMR 1998, pp. 197–200. IEEE Computer Society, Los Alamitos (1998)Google Scholar
- 3.Eeles, P., Houstion, K., Kozaczynski, W.: Building J2EE applications with the rational unified process. Addison-Wesley, Reading (2003)Google Scholar
- 4.Erlikh, L.: Leveraging legacy systems in modern architectures. White Paper from Relativity Technologies (2001)Google Scholar
- 5.Intercomp: MineIT: Automated extraction of business rules from legacy COBOL applications to Java applications and objects. White Paper from Intercomp (2001)Google Scholar
- 6.Intercomp: WebIT: Web-enabling of legacy applications. White Paper from Intercomp (2001)Google Scholar
- 7.Focus, M.: Componentization of legacy assets: A rapid, low-risk method of creating reusable components from legacy CICS applications. White Paper from Micro Focus (2002)Google Scholar
- 8.SEEC: A next-generation architecture for financial services on the internet. White Paper from SEEC (2000)Google Scholar
- 10.Sneed, H.M.: Extracting business logic from existing COBOL programs as a basis for redevelopment. In: Proc. of the 9th Int’lWorkshop on Program Comprehension, pp. 167–175 (2001)Google Scholar
- 11.Ulrich, W.M.: Legacy systems: transformation strategies. Prentice Hall PTR, Englewood Cliffs (2002)Google Scholar