Index A


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

AbsoluteLayout.jar file  2nd 
abstract classes 
abstract operations
    WSDL documents 
AbstractEntry class 
accept() method 
access
    remote
        personal portals 
    resources
        controllimg  2nd 
access control lists 
Access Grid project 
Accessibility attribute (.NET Passport)  2nd 
accessing
    Web services  2nd 
accessPoint element 
accountability  2nd  3rd 
    micro payments 
    optimistic model 
    pessimistic model 
    reputation  2nd 
AccountPermission class 
actionPerformed method 
activatable services
    implementing  2nd  3rd  4th 
ActivationGroup class 
Activator class
    implementing  2nd  3rd  4th 
adaptability
    J2EE 
adapters
    resource 
adaptive broadcast  2nd 
adaptive broadcast messages 
adaptive broadcasts 
add_publisherAssertions method  2nd 
addAll() method
    SortedListModel class 
addChildElement method 
addElement() method
    SortedListModel class 
addGroup() method
    P2PDashboard class 
adding
    groups
        Dashboard 
    peers
        Dashboard 
    user-defined bodies
        SOAP requests  2nd 
addPeer() method
    P2PDashboard class 
addresses
    HTTP
        peers 
    identity 
    invocation
        WSDL documents 
    IP 
    IPv4 classifications 
    multicast  2nd 
    physical 
    TCP
        peers 
administered objects 
administrators
    chat rooms 
Advanced Encryption Standard.  [See AES]
Advanced settings panel
    JXTA Configurator 
advertisements
    cached
        rendezvous peers 
    endpoints 
    JXTA  2nd  3rd 
        creating  2nd  3rd 
        creating/publishing  2nd  3rd  4th 
        input pipes 
        pipe, creating 
        publishing 
    module specs 
    nonvalid, deleting 
    parameters  2nd 
    pipe
        creating 
        passing to module class advertisement 
    printing 
    processing  2nd  3rd  4th  5th  6th  7th 
    sets 
advertising
    defined 
    use cases 
AES
    resources 
AES (Advanced Encryption Standard) 
AES Algorithm (Rijndael) Web site 
Agent class 
    code  2nd  3rd  4th  5th 
    Distance Learning program 
    methods 
agent communications
    intelligent software agents  2nd 
Agent interface 
AgentFactory class
    code  2nd 
    Distance Learning program 
agents
    classifying 
    community 
    delivery 
    goal-oriented direction 
    intelligent  2nd  3rd 
        mobile agents  2nd 
        simple frameworks  2nd 
    intelligent software agents 
        agent communications  2nd 
        identity 
        integrity 
        security 
        software agents  2nd 
    learning 
    mobile  2nd 
    software  2nd 
    technology 
    transfer 
    user 
AIM (AOL Instant Messenger)  2nd 
algorithms
    Rijndael 
    secure hash 
ALPINE Network 
analyzers 
annotation services 
anonymity  2nd  3rd  4th  5th  6th 
anonymizing proxies 
AOL Instant Messenger.  [See AIM]
Apache Axis 
Apache Web site 
APEX 
APEX (Application Exchange) 
API specifications
    CDC release 
    CVM release 
    Foundation Profile release 
APIs
    J2SE 
    JavaSpace
        code listing  2nd 
    JavaSpaces  2nd  3rd 
        notify method  2nd 
        notify request 
        read methods  2nd 
        take methods 
        write method  2nd 
    JAXR 
        architecture  2nd 
        classes 
        packages 
        registry connections  2nd 
        registry objects  2nd 
        registry readings  2nd  3rd 
        registry writing  2nd  3rd 
    Jena 
        API example 
        toolkit download 
    JMS  2nd  3rd  4th 
        architecture  2nd 
        client implementation listings  2nd  3rd  4th  5th  6th 
        clients 
        destinations 
        interfaces 
        JNDI namespaces 
        messages, processing  2nd 
        messaging 
        messaging application example.  [See JMS, messaging application example]
        messaging clients  2nd  3rd 
        messaging domains 
        messaging providers  2nd  3rd 
        messaging system 
        messaging vs request-response  2nd 
        MOM  2nd 
        peer modules 
        provider configuration  2nd 
        providers 
    JXTA 
    specifications
        developing 
    UDDI  2nd  3rd 
    UDDI Inquiry  2nd 
    UDDI Publishing 
        add_publisherAssertions method  2nd 
        data, deleting  2nd 
        methods, calling  2nd 
        save_binding method  2nd  3rd  4th 
        save_business method  2nd  3rd  4th  5th 
        save_publisherAssertions method  2nd 
        save_service method  2nd 
        save_tModel method  2nd 
    UDDI Request Authoring  2nd  3rd  4th  5th 
applets
    J2EE 
applicabilitly (P2P  2nd 
applicability (P2P) 
application
    clients
        J2EE 
application deployment models  2nd 
Application Exchange protocol.  [See APEX]
application layer (JXTA) 
application servers
    J2EE  2nd 
applications
    ;JXTA
        message defnition 
    details 
        jails, creating  2nd  3rd 
        second peer, creating  2nd 
        third peer, creating 
        token transfer  2nd  3rd 
    enterprises.  [See J2EE]
    file exchange 
    Free Haven 
    Intel Peer-to-Peer Trusted Library 
    JCE 
    JMS messaging example  2nd  3rd 
        client implementation listings  2nd  3rd  4th  5th  6th 
        GUI 
        limitations 
        message consuming  2nd 
        message producing 
        provider configuration  2nd 
    JXTA
        message defnition 
    P2P
        file exchange 
        future 
        performance  2nd 
    Publius 
    security  2nd 
    SOAP-over-P2P  2nd  3rd 
    support 
applilcation details
    Distance Learning program  2nd  3rd  4th 
        classroom, creating  2nd 
        students, creating  2nd  3rd 
approvals 
architecture
    JAXR  2nd 
    JMS  2nd 
    NET Passport 
    P2P 
        dynamic networks  2nd  3rd  4th  5th  6th  7th  8th 
        hierarchical topology 
        JXTA  2nd 
        mixed model support  2nd  3rd  4th  5th 
        mixed models  2nd 
        node autonomy  2nd 
        peers  2nd 
        requirements  2nd 
architectures
    big-endian 
    little-endian 
    P2P
        WWW  2nd 
    SOAs 
    stacks.  [See stacks]
arguments
    put command 
arrays
    distributed  2nd 
assertion statements 
Assocation element 
associative lookup  2nd 
asynchronous communication 
atrributes
    stability
        RegistryEntry interface 
    status
        RegistryEntry interface 
attacks
    brute-force 
attribute
    connectivityPredicate 
attributes
    Accessibility (.NET Passport)  2nd 
    Bday Precision (.NET Passport) 
    Birthdate (.NET Passport) 
    City (.NET Passport) 
    Country (.NET Passport) 
    deletionScope 
    FirstName (.NET Passport) 
    Flags (.NET Passport) 
    Gender (.NET Passport) 
    id
        classification nodes 
    Lang Preference (.NET Passport) 
    LastName (.NET Passport) 
    leftArgument 
    MemberIDHigh (.NET Passport) 
    MemberIDLow (.NET Passport) 
    namePattern 
    NET Passport  2nd 
    Nickname (.NET Passport) 
    objectType 
    Occupation (.NET Passport) 
    PostalCode (.NET Passport) 
    Preferred email (.NET Passport) 
    ProfileVersion (.NET Passport) 
    Region (.NET Passport) 
    sourceObject 
    stringcomparepredicate 
    tags  2nd 
    targetObject 
    threshold
        Peer Discovery protocol 
    TimeZone (.NET Passport) 
    Wallet (.NET Passport) 
authenticated operations
    UDDI 
Authenticating Service Exchange 
authentication  2nd  3rd 
    challenge-response  2nd 
    digital certificates  2nd 
    passwords 
    tokens 
    trusted third parties 
authenticator 
authInfo element  2nd 
Author class 
authoring
    SOAP headers  2nd 
    SOAP messages 
        body 
        constructor 
        envelope 
        SOAPRequest class function 
        SOAPRequest class listing  2nd  3rd 
        user-defined body  2nd 
        XML documents, creating  2nd 
    XML
        JAXB 
        JAXB.  [See JAXB, XML authoring/processing]
        SOAP messages  2nd 
authoritative servers 
authorization  2nd  3rd  4th  5th 
    confidentiality  2nd 
    integrity  2nd 
    Kerberos  2nd 
    Kerberos v.5  2nd  3rd 
    NET Passport  2nd  3rd  4th  5th 
        architecture 
        attributes  2nd 
        cookies  2nd 
        Kerberos interoperability 
    nonrepudiation  2nd  3rd  4th 
    PKI 
    SAML  2nd  3rd  4th 
authorization tokens 
autonomy
    nodes  2nd 
autonomy (networks) 
availability
    J2EE  2nd 
Avaki 
Axis 



JavaT P2P Unleashed
JavaT P2P Unleashed
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net