Skip to main content

User Action Recovery in Internet SAGAs (iSAGAs)

  • Conference paper
  • First Online:
Technologies for E-Services (TES 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2193))

Included in the following conference series:

Abstract

With the expansion of Web sites to include business functions, a user’s typical interaction with a Web site is a multi-step process. The loss of connection, or other system failure, can result in the loss of work accumulated before the disruption. This work must then be repeated — often at significant cost in time and computation. In some environments, such as wireless scenarios, these costs can include battery power as well.

This paper presents a protocol for recovering from such scenarios. We first describe Internet-based interactions using the familiar concepts of transactions and recovery. Using these abstractions, we then describe a protocol for recovering users to valid states in Internet interactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Agrawal and D.J. DeWitt. Integrated concurrency control and recovery mechanisms: Design and performance evaluation. ACM Transactions on Database Systems, 10(4):529–564, 1985.

    Article  Google Scholar 

  2. G. Alonso, D. Agrawal, A. El Abbadi, M. Kamath, R. Gunthor, and C. Mohan. Advanced transaction models in workflow contexts. In Proceedings of the International Conference on Data Engineering, pages 574–581, 1996.

    Google Scholar 

  3. P.K. Chrysanthis and K. Ramamritham. Acta: A framework for specifying and reasoning about transaction structure and behavior. In Proceedings of the 1990 ACM SIGMOD Conference, 1990.

    Google Scholar 

  4. P.K. Chrysanthis and K. Ramamritham. Synthesis of extended transaction models using acta. ACM Transactions on Database Systems, 19(3):450–491, 1994.

    Article  Google Scholar 

  5. Microsoft Corporation. Active server pages tutorial. http://msdn.microsoft.com/workshop/server/asp/asptutorial.asp, 2001.

  6. Microsoft Corporation. Visual interdev. http://msdn.microsoft.com/vinterdev/, 2001.

  7. R. Fielding, J. Gettys, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext transfer protocol-http/1.1. Available via FTP: ftp://ftp.isi.edu/in-notes/rfc2616.txt, 1999.

  8. H. Garcia-Molina and K. Salem. Sagas. In Proceedings of the 1987 ACM SIGMOD Conference, 1987.

    Google Scholar 

  9. The PHP Group. What is php? http://www.php.net/, 2001.

  10. T. Harder and A. Reuter. Principles of transaction-oriented database recovery. ACM Computing Surveys, 15(4):287–317, 1983.

    Article  Google Scholar 

  11. Sun Microsystems. Java server pages. http://java.sun.com/products/jsp/, 2001.

  12. C. Mohan, D. Haderle, B. Lindsay, H. Pirahesh, and P. Schwartz. Aries: A transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. ACM Transactions on Database Systems, 17(1):94–162, 1992.

    Article  Google Scholar 

  13. N. Neves and W.K. Fuchs. Adaptive recovery for mobile environments. Communications of the ACM, 40(1):68–74, 1997.

    Article  Google Scholar 

  14. Inc. O’Reilly & Associates. What is perl? http://www.perl.com/pub, 2001.

  15. C. Pedregal-Martin and K. Ramamritham. Guaranteeing recoverability in electronic commerce. In Proceedings of the Workshop on Advanced Issues in Electronic Commerce and Web-Based Information Systems, 2001.

    Google Scholar 

  16. J.D. Tygar. Atomicity versus anonymity: Distributed transactions for electronic commerce. In VLDB’98, Proceedings of 24rd International Conference on Very Large Data Bases, August 24-27, 1998, New York City, pages 1–12, 1998.

    Google Scholar 

  17. U. Varshney and R. Vetter. Emerging mobile and wireless networks. Communications of the ACM, 43(6):73–81, 2000.

    Article  Google Scholar 

  18. G.D. Walborn and P.K. Chrysanthis. Pro-motion: Management of mobile transactions. In Proceedings of the Symposium on Applied Computing, pages 101–108, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dutta, K., VanderMeer, D., Datta, A., Ramamritham, K. (2001). User Action Recovery in Internet SAGAs (iSAGAs). In: Casati, F., Shan, MC., Georgakopoulos, D. (eds) Technologies for E-Services. TES 2001. Lecture Notes in Computer Science, vol 2193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44809-8_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-44809-8_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42565-6

  • Online ISBN: 978-3-540-44809-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics