2006
DOI: 10.1007/s10796-006-9007-2
|View full text |Cite
|
Sign up to set email alerts
|

Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing

Abstract: Service-oriented computing (SOC) is the computing paradigm that utilizes services as a fundamental building block. Services are self-describing, open components intended to support composition of distributed applications. Currently, Web services provide a standardbased realization of SOC due to: (1) the machine-readable format (XML) of their functional and nonfunctional specifications, and (2) their messaging protocols built on top of the Internet. However, how to methodologically identify, specify, design, de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…Besides the multitude of service derivation approaches utilizing source code, there are also other strategies. For instance, Baghdadi [36] analyzes the schemas of relational database applications to define web services. In a quite similar vein, Mani et al [37] investigate the user interfaces of applications to derive requirements for information services.…”
Section: Service Derivation Approachesmentioning
confidence: 99%
“…Besides the multitude of service derivation approaches utilizing source code, there are also other strategies. For instance, Baghdadi [36] analyzes the schemas of relational database applications to define web services. In a quite similar vein, Mani et al [37] investigate the user interfaces of applications to derive requirements for information services.…”
Section: Service Derivation Approachesmentioning
confidence: 99%
“…This SIM does not address IT perspective. On the other hand, the method described in [29] elicits only the IT perspective. This method uses database reverse engineering to identify basic data access services.…”
Section: Related Workmentioning
confidence: 99%
“…Also services by using variety of methods such extracting a service from a limited area by plotting Create, Read, Update, Delete (CRUD) tasks or converting a table that represent a bounded data as a service and so on this architecture prepare an easy to achieve and not limited techniques for enterprises to get SOA's benefits (Baghdadi, 2006;Klose and Knackstedt, 2007;Jamshidi et al, 2008). Through the comparison it is clear that SOA as architectural method can response the main SME challenges.…”
Section: Soa-sme Compatibilitymentioning
confidence: 99%
“…Through the comparison it is clear that SOA as architectural method can response the main SME challenges. In more than one SOA approaches, lack of experts has been tried to be covered by tools to automating the service identification from enterprise' business processes, or leverage existing databases in order to transform them as services (Baghdadi, 2006) (Jamshidi et al, 2008). Also, the comparison has revealed a focus on business-IT alignment in SOA methods that is a main challenge in SMEs that suffer due to this gap between their business and information systems even when they implement ERP system that not fully compatible with their business and enterprise structure.…”
Section: Soa-sme Compatibilitymentioning
confidence: 99%