A methodology for designing federated enterprise models with conceptualized legacy wrappers

Willem Jan Van Den Heuvel, Philippe Thiran

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Abstract

The ubiquity of the Internet offers progressive enterprises the possibility to organize themselves into virtual alliances. To do so, trading partners must not only align their business processes but at the same time integrate their enterprise information systems. Most of these enterprise systems are geriatric and show the signs of years of ad-hoc patching and fixing. This makes these systems, that are referred to as legacy systems, hard to maintain and adapt to new business requirements. Wrapper technology can be used to capitalize on the legacy assets, and allow them to integrate with new business components that are used to construct a virtual and federated enterprise. In this paper, we present a methodology for constructing federated (or networked) enterprise models by blending modern business data requirements with available legacy wrappers. A unique feature of this methodology is its balanced "symmetric" design perspective, combining both forward- and reverse engineering techniques.

Original languageEnglish
Title of host publicationICEIS 2003
Subtitle of host publicationProceedings of the 5th International Conference on Enterprise Information Systems
PublisherICEIS Committee
Pages353-358
Number of pages6
Volume1
ISBN (Electronic)9729881618
Publication statusPublished - 1 Jan 2003
Event5th International Conference on Enterprise Information Systems, ICEIS 2003 - Angers, France
Duration: 23 Apr 200326 Apr 2003

Conference

Conference5th International Conference on Enterprise Information Systems, ICEIS 2003
CountryFrance
CityAngers
Period23/04/0326/04/03

Keywords

  • Conceptualized Wrapper
  • Federated Enterprise Model
  • Legacy Databases
  • Reverse-Engineering

Fingerprint Dive into the research topics of 'A methodology for designing federated enterprise models with conceptualized legacy wrappers'. Together they form a unique fingerprint.

Cite this