Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] P/Invoke patterns bridging strategy (messaging) interoperability security transactions performance [See also RAS (reliability, availability, scalability), business application example.] of asynchronous communication of bridging strategy (messaging) Enterprise Service Bus IIOP.NET measuring micro-tuning in QoS (Quality of Service) transactions Web services best practices in Web services messaging strategy performance management bridging solutions example scenario integration strategy comparison platform unification strategy 2nd Web services management strategy performance metrics for QoS (Quality of Service) permissions (in CAS) persistence (Java database connectivity) Platform Invocation platform unification strategy benefits of example of usage interoperability and ISO Network Management model 2nd limitations of patterns point-to-point pattern (messaging) Policies (XACML) [See also security policies.] policy resolution process (.NET security) Policy Sets (XACML) polling strategy [See response polling strategy (asynchronous Web services).] POP (Post Office Protocol) porting .NET applications to Java EE advantages of example scenario guidelines for by rewriting C# code in Java with Visual MainWin for Java EE Post Office Protocol (POP) presentation layer interoperability Principal (Java security) principal spoofing (security threat) producer-centric reliability profiles (Web services interoperability) 2nd Attachments Profile Basic Profile Security Profile programmatic security (Java) programmatic transaction support in .NET in Java EE programs (Java) [See applications (Java).] protection domain (Java security) protocol channels providers (Web services) proxies [See also Asynchronous Java Proxy pattern.] generating (JNBridgePro) usage (JNBridgePro) proxy-based management architecture publish-subscribe pattern (messaging) |