Abstract
Due to not only proven stability and reliability but a significant investment and years of accumulated experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. In this paper we suggest a systematic approach to identifying components that perform specific business services and that consists of the legacy system’s assets to be leveraged on the modern platform such as J2EE/EJB.
This research was partially supported by University IT Research Center Project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alur, D., Crupi, J., Malks, D.: Core J2EE Patterns: Best practices and design strategies. Prentice Hall PTR, Englewood Cliffs (2001)
Battaglia, M., Savoia, G., Favaro, J.: RENAISSANCE: A method to migrate from legacy to immortal software systems. In: Proc. of CSMR 1998, pp. 197–200. IEEE Computer Society, Los Alamitos (1998)
Eeles, P., Houstion, K., Kozaczynski, W.: Building J2EE applications with the rational unified process. Addison-Wesley, Reading (2003)
Erlikh, L.: Leveraging legacy systems in modern architectures. White Paper from Relativity Technologies (2001)
Intercomp: MineIT: Automated extraction of business rules from legacy COBOL applications to Java applications and objects. White Paper from Intercomp (2001)
Intercomp: WebIT: Web-enabling of legacy applications. White Paper from Intercomp (2001)
Focus, M.: Componentization of legacy assets: A rapid, low-risk method of creating reusable components from legacy CICS applications. White Paper from Micro Focus (2002)
SEEC: A next-generation architecture for financial services on the internet. White Paper from SEEC (2000)
Serrano, M.A., Carver, D.L., Oca, C.M.: Reengineering legacy systems for distributed environments. The Journal of Systems and Software 64(1), 37–55 (2002)
Sneed, H.M.: Extracting business logic from existing COBOL programs as a basis for redevelopment. In: Proc. of the 9th Int’lWorkshop on Program Comprehension, pp. 167–175 (2001)
Ulrich, W.M.: Legacy systems: transformation strategies. Prentice Hall PTR, Englewood Cliffs (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H.S., Chae, H.S., Kim, C.H. (2004). A Use-Case Based Component Identification Approach for Migrating Legacy Code into Distributed Environment. In: Aykanat, C., Dayar, T., Körpeoğlu, İ. (eds) Computer and Information Sciences - ISCIS 2004. ISCIS 2004. Lecture Notes in Computer Science, vol 3280. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30182-0_90
Download citation
DOI: https://doi.org/10.1007/978-3-540-30182-0_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23526-2
Online ISBN: 978-3-540-30182-0
eBook Packages: Springer Book Archive