2013
DOI: 10.1007/s00778-013-0318-x
|View full text |Cite
|
Sign up to set email alerts
|

Consistency anomalies in multi-tier architectures: automatic detection and prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…[31] developed a set of tools and methods to automatically detect data anomalies from applications under snapshot isolation technology. [44][45][46][47], use a middleware layer that is embedded between the application and the database, according to the serializable theory and dependency graph technology [2,3,6,10,19,24], the method quantifies and classifies the data anomalies. However, this method detects data anomalies based on applications such as TPC-C [18], and finds no new data anomalies.…”
Section: Related Workmentioning
confidence: 99%
“…[31] developed a set of tools and methods to automatically detect data anomalies from applications under snapshot isolation technology. [44][45][46][47], use a middleware layer that is embedded between the application and the database, according to the serializable theory and dependency graph technology [2,3,6,10,19,24], the method quantifies and classifies the data anomalies. However, this method detects data anomalies based on applications such as TPC-C [18], and finds no new data anomalies.…”
Section: Related Workmentioning
confidence: 99%
“…This form of atomicity is offered by most commercial database systems, and is easily realized through the judicious use of locks. Enforcing stronger multi-record atomicity guarantees is more challenging, especially in distributed environments with replicated database state [6,9,19,32,50]. In this paper, we consider behaviors induced when the database guarantees only a very weak form of consistency and isolation that allows transactions to see an arbitrary subset of committed updates by other transactions.…”
Section: Data Store Semanticsmentioning
confidence: 99%
“…There are also dynamic anomaly detection techniques [28,11,7] which either build the dependency graphs at run-time and check for cycles, or analyze the trace of events after execution. These approaches do not provide any guarantee that all anomalies will be detected, even for bounded executions.…”
Section: Related Work and Conclusionmentioning
confidence: 99%