tags, factoring into design process, 147-149
technology teams, importance to information architects, 31
tenets of application security, 55-57
TOC (table of contents) navigation scheme, explanation of, 35
TokenCache, purpose of, 82-83
topical site organization, example of, 32
transaction semantics for EJBs, role in Register NPO use case in business tier, 254-259
transactional data, advisory about caching of, 81
Transactional XML, modes of, 283. See also XML
trust. See also circles of trust in federated network identify framework
establishing in SSO, 61
role in developing secure environments, 56-57
type attribute, using with ActionMapping configuration objects, 94
types in WSDL documents
overview of, 289-290
purpose of, 284