start page | rating of books | rating of authors | reviews | copyrights

Book Home

Java™ Distributed Computing Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: C

caching database data: 7.2.5. Data Caching Issues
CallableStatement class: 7.1.2.3. Statement
cancel( ): C.4.6. cancel( )
CAs (certification authorities): 5.4.2. Public Key Methods
5.5.5. Distributing Certified Public Keys
5.7.2.2. Certificates and authentication techniques
catch clause: 1.3.4. Fault Tolerance Through Exception Handling
certification: 5.5.4. Certification: The Last Identity Link
certification authorities (CAs): 5.4.2. Public Key Methods
5.5.5. Distributing Certified Public Keys
5.7.2.2. Certificates and authentication techniques
digital signatures (see digital signatures)
distributing public keys: 5.5.5. Distributing Certified Public Keys
presently available techniques for: 5.7.2.2. Certificates and authentication techniques
public key certificates: 5.4.2. Public Key Methods
CFDContentHandler class (example): 2.2. URLs, URLConnections, and ContentHandlers
CFDContentHandlerFactory class (example): 2.2. URLs, URLConnections, and ContentHandlers
character-based I/O: 2.1.4. Streams, Readers, and Writers for Input and Output
CharArrayReader class: 2.1.4. Streams, Readers, and Writers for Input and Output
CharArrayWriter class: 2.1.4. Streams, Readers, and Writers for Input and Output
chat system (example): 10.1. A Simple Chat System
checkPermission( ): 5.5.3. An Authenticating Credit Agent
chess-playing agents example: 6.1. Messages Defined
Chess...Event classes (example): 6.6.2. Distributed Events
ChessEventServer class (example): 6.6.2. Distributed Events
ChessMessage class (example): 6.4. Fixed Protocols
ChessMove class (example): 6.4.2. Objects as Message Arguments
6.5.4. An Adaptable Message Handler
ChessPlayer class (example): 6.4. Fixed Protocols
ChessServer class (example): 6.4. Fixed Protocols
6.4. Fixed Protocols
fixed message protocol for: 6.4. Fixed Protocols
Java events for: 6.6.2. Distributed Events
RMI implementation of: 6.7. Using Remote Objects
synchronous vs. asynchronous handling: 6.3.1. Asychronous vs. Synchronous Message Handling
Cipher class: 5.6.1. Ciphers for Secure Data Transfers
classes
ClassLoader class: 2.3. The ClassLoader
object serialization versus: 3.6.6. Serializing Objects
ClassNotFoundException: 2.3.1. Loading Classes from the Network
downloading for applets: A.2. Class Downloads
locking for threads: 4.3.1. Synchronizing Threads
references to: 3.2.1. Creating Remote Objects
clients
interface for object classes: 3.3. Features of Distributed Object Systems
object stub: 3.3. Features of Distributed Object Systems
IDL interface and: 3.5.4. Client Stubs
3.5.5.2. The client stubs
Java RMI and: 3.6.4. Client Stubs and Server Skeletons
PipedClient class (example): 2.1.4. Streams, Readers, and Writers for Input and Output
RunnableSolverClient class (example): 4.2.1. Implementing Runnable
SimpleClient class (example): 1.3.5. Network Support
code, obtaining online: 0.3. About the Source Code
collaborative systems
chat system (example): 10.1. A Simple Chat System
Collaborator interface (example): 9.3.1. Building the Infrastructure with Message Passing
9.3.1. Building the Infrastructure with Message Passing
collaborator requirements: 9.3.1. Building the Infrastructure with Message Passing
CollaboratorMessage class (example): 9.3.1. Building the Infrastructure with Message Passing
concerns with: 9.2. Issues with Collaboration
definition of: 9.1. What Is a Collaborative System?
infrastructure of: 9.3. A Basic Collaborative Infrastructure
with message passing: 9.3.1. Building the Infrastructure with Message Passing
MessageCollaborator interface (example): 9.3.1. Building the Infrastructure with Message Passing
9.3.1. Building the Infrastructure with Message Passing
A.1. Whiteboard Applet
with RMI: 9.3.2. Collaborating with RMI
shared whiteboard (example): 10.2. A Shared Whiteboard
commit( ): 7.1.2.3. Statement
communication protocols: 1.2.2. Flexible, Extendible Communication Protocols
complexity of cryptographic algorithms: 5.7.1.2. Sophistication and complexity
concede( ): 6.4. Fixed Protocols
ConcedeMessage class (example): 6.4. Fixed Protocols
configuring JDBC drivers: 7.2.1. JDBC Driver Configurations
ConfirmMoveMessage class (example): 6.4. Fixed Protocols
6.4.1. Heterogeneous Argument Lists
connect( ): 9.3.1. Building the Infrastructure with Message Passing
ConnectException: D.1. The java.rmi Package
ConnectIOException: D.1. The java.rmi Package
Connection interface: 7.1.2.2. Connection
connect_pull_supplier( ): B.2.2. Interface Specifics
constraintsFor( ): 7.2.4. JDBC-Enabled Data Objects
consume( ): 8.4.2. Real Data Monitoring
consumeAll( ): 8.4.2. Real Data Monitoring
ConsumerAdmin interface: B.2. Event Service
ContentConsumer class (example): 8.4.2. Real Data Monitoring
ContentHandler class: 2.2. URLs, URLConnections, and ContentHandlers
ContentHandlerFactory class: 2.2. URLs, URLConnections, and ContentHandlers
ContentProducer class (example): 8.4.2. Real Data Monitoring
CORBA: 3.5. CORBA
B. CORBA Services
Event Service: B.2. Event Service
IDL (Interface Definition Language): 3.5.2. The Interface Definition Language (IDL)
Solver interface (example): 3.5.5.1. The IDL interface
Naming Service: B.1. Naming Service
java.rmi.Naming versus: B.1.1. Comparison to the RMI Registry
ORB (Object Request Broker): 3.5.1. The Object Request Broker (ORB)
RMI versus: 3.7. RMI vs. CORBA
Security Service: B.3. Security Service
CosEventChannelAdmin module: B.2.2. Interface Specifics
CosEventComm module: B.2.2. Interface Specifics
CosNaming module: B.1. Naming Service
costs of cryptography: 5.7.1.5. Financial and legal issues
createRegistry( ): D.2. The java.rmi.registry Package
createServerSocket( ): D.3. The java.rmi.server Package
createSocket( ): D.3. The java.rmi.server Package
createStatement( ): 7.1.2.3. Statement
Credential class: B.3.2. Security Model
crypt( ): 5.6.1. Ciphers for Secure Data Transfers
cryptography
algorithms for: 5.2.1.1. The User API
5.7. Choosing a Cryptographic Algorithm
JCE (Java Cryptography Extension): 5.2.2. The Core Security API
SSL for: 5.7.3.1. Secure Socket Layer (SSL)


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.