start page | rating of books | rating of authors | reviews | copyrights

Book Home

Java™ Distributed Computing Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: A

abstract object interfaces: 1.3.2. Abstract Interfaces
acceptMove( ): 6.4. Fixed Protocols
access control lists: 5.3.1. Access Control Lists
AccessDecision class: B.3.2. Security Model
AccessException: D.1. The java.rmi Package
Acl interface: 5.3.1. Access Control Lists
AclEntry class: 5.3.1. Access Control Lists
activation, dynamic: 3.3.2. Object Manager
adaptable message protocols: 6.5. Adaptable Protocols
addAgent( ): 9.3.1. Building the Infrastructure with Message Passing
addEntry( ): 5.3.1. Access Control Lists
addHandler( ): 6.6.2. Distributed Events
addMessageType( ): 6.5.4. An Adaptable Message Handler
addPageElements( ): 8.5.2. Web Browsing
addPermission( ): 5.3.1. Access Control Lists
addresses, IP: 2.1.1. IP Addressing
addSample( ): 8.4. Monitoring Bandwidth
agents
AgentConnection class (example): 9.3.1. Building the Infrastructure with Message Passing
AgentHandler class (example): 9.3.1. Building the Infrastructure with Message Passing
identities for: 5.3. Identities and Access Control
9.3.1. Building the Infrastructure with Message Passing
collaboration and: 9.2.2. Maintaining Agent Identities
managing: 5.2.2. The Core Security API
verifying: 5.1. Security Issues and Concerns
5.5.5. Distributing Certified Public Keys
imposter: 5.1. Security Issues and Concerns
algorithms, cryptographic: 5.2.1.1. The User API
5.7. Choosing a Cryptographic Algorithm
Diffie-Hellman technique: 5.4.2. Public Key Methods
5.4.2. Public Key Methods
5.7.2.1. Encryption techniques
DSA: 5.2.1.1. The User API
5.7.2.1. Encryption techniques
presently available: 5.7.2. Available Algorithms
RSA public key encryption: 5.7.2.1. Encryption techniques
AlreadyBoundException: D.1. The java.rmi Package
applets: A. Using the Examples in Applets
downloading support classes for: A.2. Class Downloads
applications
collaborative (see collaborative systems)
distributed (see distributed applications)
assignmentsFor( ): 7.2.4. JDBC-Enabled Data Objects
asymmetric encryption techniques: 5.4.2. Public Key Methods
5.6.1. Ciphers for Secure Data Transfers
asynchronous
agents: 4.4.1. Asynchronous Agents
communications, CORBA Event Service for: B.2. Event Service
message handling: 6.3.1. Asychronous vs. Synchronous Message Handling
message passing: 6.3.2. A Basic Message Processor
audio, streaming (example): 8.5.1. Streaming Multimedia
AudioConsumer class (example): 8.5.1. Streaming Multimedia
AudioProducer class (example): 8.5.1. Streaming Multimedia
AuditChannel interface: B.3.2. Security Model
AuditDecision interface: B.3.2. Security Model
auditing transactions (CORBA): B.3.1. Service Types
audit_needed( ): B.3.2. Security Model
authenticate( ): 5.5.3. An Authenticating Credit Agent
5.6.2. Back to Our Credit Agent
authentication: 1.3.6.2. Secure remote transactions
AuthAgent client (example): 5.5.3. An Authenticating Credit Agent
5.6.2. Back to Our Credit Agent
AuthCreditAgent client (example): 5.5.3. An Authenticating Credit Agent
CORBA Security Service for: B.3.1. Service Types
digital signatures (see digital signatures)
one-, two-, many-way: 5.7.1.3. One-, two-, and many-way cryptography
PGP for: 5.7.3.2. Pretty Good Privacy (PGP)
presently available techniques for: 5.7.2.2. Certificates and authentication techniques


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.