receive ports, vs. receive locations, 85
regression testing, 126
release management, 126
reply attacks, Kerberos and, 58
request/reply communications, 110
implementing, 88-89
resilient systems, failure in, 65
resource monitoring, 65
role-based authorization, 57
routing messages, 84, 110
routing, content-based, 112
Rules Processing capability, 100
rules processing, 77, 100