Computer implemented method, system and computer usable program code for monitoring a transaction that crosses an enterprise boundary in a composite application. A computer implemented method for monitoring a transaction that crosses an enterprise boundary in a composite application includes a provider enterprise of the transaction receiving a request to provide monitoring data regarding the transaction to a requester enterprise of the transaction. The received request includes a correlation token identifying the monitoring data to be provided and the requester enterprise as being authorized to receive the monitoring data. The transaction monitoring data is then provided to the requester enterprise. The provided transaction monitoring data may be analyzed by the requester enterprise to provide analysis results regarding transaction delivery performance.

 
Web www.patentalert.com

< Application-layer security method and system

> System and method for providing interoperable and on-demand telecommunications service

~ 00499