Wrapper-based evolution of legacy information systems

Ph. Thiran, J.L. Hainaut, G.J.P.M. Houben, D. Benslimane

Research output: Contribution to journalArticleAcademicpeer-review

33 Citations (Scopus)

Abstract

System evolution most often implies the integration of legacy components, such as databases, with newly developed ones, leading to mixed architectures that suffer from severe heterogeneity problems. For instance, incorporating a new program in a legacy database application can create an integrity mismatch, since the database model and the program data view can be quite different (e.g. standard file model versus OO model). In addition, neither the legacy DBMS (too weak to address integrity issues correctly) nor the new program (that relies on data server responsibility) correctly cope with data integrity management. The component that can reconciliate these mismatched subsystems is the R/W wrapper, which allows any client program to read, but also to update the legacy data, while controlling the integrity constraints that are ignored by the legacy DBMS.This article describes a generic, technology-independent, R/W wrapper architecture, a methodology for specifying them in a disciplined way, and a CASE tool for generating most of the corresponding code.The key concept is that of implicit construct, which is a structure or a constraint that has not been declared in the database, but which is controlled by the legacy application code. The implicit constructs are elicited through reverse engineering techniques, and then translated into validation code in the wrapper. For instance, a wrapper can be generated for a collection of COBOL files in order to allow external programs to access them through a relational, object-oriented or XML interface, while offering referential integrity control. The methodology is based on a transformational approach that provides a formal way to build the wrapper schema and to specify inter-schema mappings.
Original languageEnglish
Pages (from-to)329-359
JournalACM Transactions on Software Engineering and Methodology
Volume15
Issue number4
DOIs
Publication statusPublished - 2006

Fingerprint

Dive into the research topics of 'Wrapper-based evolution of legacy information systems'. Together they form a unique fingerprint.

Cite this