Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] C# programming language consuming Web services, porting .NET applications to Java EE defining data classes rewriting code in Java C# Web service, porting .NET applications to Java EE callback [See automatic callback strategy (asynchronous Web services).] CAS (Code Access Security) 2nd CertPath API Chain of Responsibility pattern channels (.NET Remoting) class libraries .NET Framework porting .NET application to Java class loader (Java security) client-activated objects in .NET Remoting clients Dynamic Invocation Interface client Dynamic Proxy client JAX-RPC client types closing connections .NET database connectivity Java database connectivity CLR (Common Language Runtime) security in clustering CMP (Container-Managed Persistence) CMT (Container-Managed Transaction) demarcation Coarse-Grained Transaction Facade pattern Code Access Security (CAS) 2nd code level interoperability code source (Java security) code-access permissions COM Interop COM, disadvantages of Common Language Runtime (CLR) security in communication (asynchronous Web services) Compensating Asynchronous Request Handler pattern Compensating Transaction Handler pattern compiling Java programs compliance, security interoperability for confidentiality (security threat) configuration management bridging solutions example scenario integration strategy comparison platform unification strategy 2nd Web services management strategy configuration-based programming connected model (ADO.NET) connection pooling .NET database connectivity Java database connectivity Connector Architecture (Java EE) consistency (transactions) consumer-centric reliability consuming Web services Container Managed Persistence (CMP) container-based security in Java container-managed persistence Container-Managed Transaction (CMT) demarcation CORBA [See also IIOP.NET.] benefits of limitations of custom mappings (IIOP.NET) |