Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] Basic Profile (Web services interoperability) Basic Security Profile (BSP) Bean-Managed Persistence (BMP) 2nd Bean-Managed Transaction (BMT) demarcation behaviors best practices asynchronous Web services bridging strategy (messaging) interoperability security management RAS (reliability, availability, scalability) transactions Web services binary encoding 2nd bindings BMP (Bean-Managed Persistence) 2nd BMT (Bean-Managed Transaction) demarcation bridge infrastructure (session management) bridge integration (Secure Object Handler strategy) [See also integration strategies.] bridging solutions (management) benefits of limitations of bridging strategy (messaging) benefits of best practices example of usage limitations of patterns Replenish Stock use case scope of solution BSP (Basic Security Profile) business process integration (Java EE interoperability) Business tier (security interoperability) bytecode verifier (Java security) |