- abstract schema
- Part of the deployment descriptor for an entity bean that is used to define
the bean relationships, persistent fields, or query statements.
- access bean
- An enterprise bean wrapper that is typically used by client programs,
such as Java Server Pages (JSP) files and servlets. Access beans hide the
complexity of using enterprise beans and improve the performance of reading
and writing multiple enterprise bean properties.
- access control
- In computer security, the process of ensuring that the resources of a
computer system can be accessed only by authorized users in authorized ways.
- access control list (ACL)
- In computer security, a list associated with an object that identifies
all the subjects that can access the object and their specific access rights.
- access ID
- The unique identification of a user used during authorization to determine
if access is permitted to the resource.
- access intent
- Metadata that optimizes the run-time behavior of an entity bean with respect
to concurrency control, resource management, and database access strategies.
- access intent policy
- A grouping of access intents that governs a type of data access pattern
for enterprise bean persistence.
- access point group
- A collection of core groups that defines the set of core groups in the
same cell or in different cells that communicate with each other.
- ACL
- See access control list.
- adapter
- A mechanism for connecting two unlike parts or machines, or for electronically
or physically connecting a device to a computer or to another device.
- administrative agent
- A program that provides administrative support without requiring a direct
connection to a database.
- agent
- A function that represents a requester to a server.
- alarm listener
- A type of asynchronous bean that is called when a high-speed transient
alarm expires.
- algorithm
- A set of well-defined rules for the solution of a problem in a finite
number of steps.
- algorithm mapping
- A process by which service providers can define the mapping of Uniform
Resource Identifier (URI) algorithms to cryptographic algorithms that are
used for XML digital signature and XML encryption.
- Apache
- An open source Web server.
- API
- See application programming interface.
- applet
- A small application program that performs a specific task and is usually
portable between operating systems. Often written in Java code, applets can
be downloaded from the Internet and run in a Web browser.
- applet client
- A client that runs within a browser-based Java run-time environment, and
is capable of interacting with enterprise beans directly instead of indirectly
through a servlet.
- application
- One or more computer programs or software components that provide functionality
in direct support of a specific business process or processes.
- application assembly
- The process of creating an enterprise archive (EAR) file containing all
the files related to an application as well as an Extensible Markup Language
(XML) deployment descriptor for the application.
- Application Assembly Tool
- A tool that provides a graphical interface for packaging code artifacts
into modules and for configuring Java 2 Platform Enterprise Edition (J2EE)-compliant
deployment descriptions.
- application client module
- A Java archive (JAR) file that contains a client that accesses a Java
application. The Java application runs inside a client container and can connect
to remote or client-side J2EE resources.
- application programming interface (API)
- A functional interface by which an application program that is written
in a high-level language can use specific data or functions of the operating
system or another program.
- Application Response Measurement (ARM)
- An application programming interface developed by a group of leading technology
vendors that can be used to monitor the availability and performance of business
transactions within and across diverse applications and systems.
- Application Response Measurement (ARM) agent
- The implementation of the ARM standard by an implementation provider.
- application server
- A server program in a distributed network that provides the execution
environment for an application program.
- ARM
- See Application Response Measurement.
- artifact
- A physical piece of information that is used or produced by a software
development process. Examples of artifacts include models, source files, scripts,
and binary executable files.
- association
- (1) For XML documents, the linkage of the document to the rules that govern
its structure, which can be defined by a document type definition (DTD) or
an XML schema.
(2) In enterprise beans, a relationship that exists between
two container-managed persistence (CMP) entity beans. Two types of association
exist: one-to-one and one-to-many.
- asymmetric algorithm
- See public-key algorithm.
- asymmetric cryptography
- In computer security, pertaining to the use of different keys for encryption
and decryption; a synonym for public key cryptography.
- asynchronous bean
- A Java object or an enterprise bean that a Java 2 Platform Enterprise
Edition (J2EE) application can run asynchronously.
- asynchronous messaging
- A method of communication between programs in which a program places a
message on a message queue, then proceeds with its own processing without
waiting for a reply to its message.
- authentication
- In computer security, a process that ensures that the identities of both
the sender and the receiver of a network transaction are true.
- authenticity
- The validation of client and server identities during a Secure Sockets
Layer (SSL) connection by both communicating parties using public key cryptography
and asymmetric cryptography.
- authorization
- The process of granting a user either complete or restricted access to
an object, a resource, or a function.
- authorization table
- A table that contains the role-to-user or group mapping information that
identifies the permitted access of a client to a particular resource.
- automatic restart management
- The facilities that detect failures and manage server restarts.
- AXIS
- An implementation of the Simple Object Access Protocol (SOAP) on which
Java Web services can be implemented.
- basic authentication
- An authentication method that uses a user name and a password.
- bean
- A definition or instance of a JavaBeans component.
- bean-managed messaging
- A function of asynchronous messaging that gives an enterprise bean complete
control over the messaging infrastructure.
- bean-managed persistence (BMP)
- Pertaining to an entity bean that manages its own persistence.
- bean-managed transaction (BMT)
- The capability of the session bean, servlet, or application client component
to manage its own transactions directly, instead of through a container.
- Bean Scripting Framework
- An architecture for incorporating scripting language functions within
Java applications.
- bind
- To establish a connection between software components on a network using
an agreed-to-protocol. In Web services, the bind operation occurs when the
service requestor invokes or initiates an interaction with the service at
run time using the binding details in the service description to locate, contact,
and invoke the service.
- block decryption
- Symmetric algorithms that decrypt a block of data at one time.
- block encryption
- Symmetric algorithms that encrypt a block of data at one time.
- BMP
- See bean-managed persistence.
- BMT
- See bean-managed transaction.
- bootstrapping
- The process by which an initial reference of the naming service is obtained.
The bootstrap setting and the host name form the initial context for Java
Naming and Directory Interface (JNDI) references.
- BOM
- See byte order mark.
- bottleneck
- A place in the system where contention for a resource is affecting performance.
- bridge interface
- A node and a server that run a core group bridge service.
- broker archive
- A file that is the unit of deployment to the broker that can contain any
number of compiled message flow and message set files and a single deployment
descriptor. You need a separate broker archive file for each configuration
that you want to deploy.
- brute force collision
- A programming style that relies on computing power to try all the possibilities
with a known hash until the solution is found.
- bucket
- One or more fields that accumulate the result of an operation.
- bulk decryption
- A synonym for block decryption.
- bulk encryption
- A synonym for block encryption.
- bus
- Interconnecting messaging engines that manage communication resources.
- bus member
- The application servers within which the messaging engines run to support
the bus.
- business logic tier
- The set of components that reside between the presentation and database
tiers. This logic tier hosts the enterprise bean containers, which run the
business logic.
- business process container
- A process engine that contains process modules.
- byte order mark (BOM)
- A character code at the beginning of a data stream that can be used as
a signature that defines the byte order and encoding form.
- CA
- See certificate authority.
- cache instance resource
- A location where any Java 2 Platform, Enterprise Edition (J2EE) application
can store, distribute, and share data
- cache replication
- The sharing of cache IDs, cache entries, and cache invalidations with
other servers in the same replication domain.
- callback handler
- A mechanism that uses a Java Authentication and Authorization Service
(JAAS) interface to pass a security token to the Web service security runtime
for propagation in the Web service security header
- capability list
- A list of associated resources and their corresponding privileges per
user.
- CBR
- See content based routing.
- cell
- An arbitrary grouping of one or more nodes in a WebSphere Application
Server distributed network.
- cell-scoped binding
- A binding scope where the binding is not specific to, and not associated
with any node or server. This type of name binding is created under the persistent
root context of a cell.
- certificate authority (CA)
- An organization that issues certificates. The CA authenticates the certificate
owner’s identity and the services that the owner is authorized to use, issues
new certificates, renews existing certificates, and revokes certificates.
- certificate revocation list (CRL)
- A list of certificates issued by a certificate authority (CA). The certificates
on this list might not be expired, but are no longer trusted by the CA.
- chain
- The name of a channel framework connection that contains an endpoint definition.
- channel
- An entry point to the Web services gateway that carries requests and responses
between Web services and the gateway.
- channel framework
- A common model for connection management, thread usage, channel management,
and message access within WebSphere Application Server.
- cheat sheet
- An interface that guides users through the wizards and steps that are
required to perform a complex task, and links to relevant sections of the
online help.
- CICS
- An IBM licensed program that provides online transaction-processing services
and management for business applications.
- cipher
- A cryptographic algorithm that is used to encrypt data that is unreadable
until converted into plain data with a predefined key.
- cipher suite
- A set of ciphers.
- class
- In object-oriented design or programming, a model or template that can
be used to create objects with a common definition and common properties,
operations, and behavior. An object is an instance of a class.
- class file
- A compiled Java source file.
- class hierarchy
- The relationships between classes that share a single inheritance. All
Java classes inherit from the Object class.
- class loader
- Part of the Java virtual machine code that is responsible for finding
and loading class files. A class loader affects the packaging of applications
and the run-time behavior of packaged applications deployed on application
servers.
- class path
- A list of directories and Java archive (JAR) files that contain resource
files or Java classes that a program can load dynamically at run time.
- client proxy
- An object on the client side of a network connection that provides a remote
procedure call interface to a service on the server side.
- client/server
- Pertaining to the model of interaction in distributed data processing
in which a program on one computer sends a request to a program on another
computer and awaits a response. The requesting program is called a client;
the answering program is called a server
- client type detection
- A process in which a servlet determines the markup language type required
by a client and calls the appropriate JavaServer Pages file.
- Cloudscape
- An embeddable, all Java, object-relational database management system
(ORDBMS).
- cluster
- A group of application servers that collaborates for the purposes of workload
balancing and failover.
- CMP
- See container-managed persistence.
- coexistence
- The ability of two or more entities to function in the same system or
network.
- collection certificate store
- A collection of intermediate certificates or certificate revocation lists
(CRL) that are used by a certificate path to build up a certificate chain
for validation.
- Collector Tool
- A tool that gathers information about a WebSphere Application Server installation
and packages this data in a Java archive (JAR) file to assist in problem determination
and analysis. This information includes logs, property files, configuration
files, operating system data, Java data, and prerequisite software presence
and levels.
- Common Object Request Broker Architecture (CORBA)
- An architecture specification for distributed object-oriented computing
that separates client and server programs with a formal interface definition.
- Common Secure Interoperability Version 2 (CSIv2)
- An authentication protocol developed by the Object Management Group (OMG)
that supports interoperability, authentication delegation and privileges.
- compilation unit
- A Java source file.
- complex type
- In XML, a type that supports elements in its content and that can carry
attributes.
- concurrency control
- The management of contention for data resources.
- configuration repository
- A storage area of configuration data that is typically located in a subdirectory
of the product installation root directory.
- configured name binding
- Persistent storage of an object in the name space that is created using
either the administrative console or the wsadmin program.
- connection factory
- A set of configuration values that produces connections that enable a
J2EE component to access a resource. Connection factories provide on-demand
connections from an application to an enterprise information system (EIS).
- connection handle
- A representation of a physical connection.
- connection pooling
- A technique used for establishing a pool of resource connections that
applications can share on an application server.
- connector
- In J2EE, a standard extension mechanism for containers to provide connectivity
to enterprise information systems (EISs). A connector consists of a resource
adapter and application development tools. (Sun)
- container
- In J2EE, an entity that provides life-cycle management, security, deployment,
and run-time services to components. (Sun)
Each type of container (EJB,
Web, JSP, servlet, applet, and application client) also provides component-specific
services.
- container-managed persistence (CMP)
- In J2EE technology, a data transfer between the variables of an entity
bean and a resource manager administered by the entity bean container.
- container-managed transaction (CMT)
- A transaction whose boundaries are defined by an EJB container. An entity
bean must use container-managed transactions. (Sun)
- container transaction
- A transaction that has its boundaries set by the container for method
invocations of the enterprise bean.
- content based routing (CBR)
- An optional feature of the caching proxy that provides intelligent routing
to back-end application servers. This routing is based on HTTP session affinity
and a weighted round-robin algorithm.
- context parameters
- A definition of the server view of the Web application within which the
servlet is running and supports servlet access to available resources.
- control region
- A virtual storage area that provides the control, scheduling, and work
management mechanisms that are necessary to coordinate shared resources.
- CORBA
- See Common Object Request Broker Architecture.
- core group
- A group of processes that are directly accessible to each other and are
connected using a local area network (LAN).
- core group access point
- A definition of a set of servers that provides access to the core group.
- core group bridge
- The means by which core groups communicate.
- core group member
- A server within the cluster in a core group.
- create method
- In enterprise beans, a method that is defined in the home interface and
invoked by a client to create an enterprise bean. (Sun)
- credential
- In the Java Authentication and Authorization Service (JAAS) framework,
a subject class that owns security-related attributes. These attributes can
contain information used to authenticate the subject to new services.
- CRL
- See certificate revocation list.
- cryptographic token
- A logical view of a hardware device that performs cryptographic functions
and stores cryptographic keys, certificates, and user data.
- CSIv2
- See Common Secure Interoperability Version 2.
- custom service
- A configurable service that plugs in to a WebSphere Application Server
and defines a hook point that runs when the server starts and shuts down when
the server stops.
- custom user registry
- A customer-implemented user registry that implements the UserRegistry
Java interface. This registry type can support virtually any kind of accounts
repository from a relational database and can provide flexibility in adapting
product security to various environments.
- daemon
- A program that runs unattended to perform continuous or periodic system-wide
functions, such as network control. Some daemons are triggered automatically
to perform their task; others operate periodically.
- data access bean
- A class library that provides a rich set of features and functions, while
hiding the complexity associated with accessing relational databases.
- data definition language (DDL)
- A language for describing data and its relationships in a database.
- data replication service (DRS)
- A service that transfers data, objects, or events among application servers.
- data source
- The means by which an application accesses data from a database.
- datagram
- A form of asynchronous messaging in which an application sends a message,
but does not want a response.
- DB2
- A family of IBM licensed programs for relational database management.
- DDL
- See data definition language.
- debugger
- A tool that is used to detect and trace errors in computer programs.
- declarative security
- The security configuration of an application during assembly stage that
is defined in the deployment descriptors and enforced by the security run
time.
- delegation
- The process of propagating a security identity from a caller to a called
object. According to the J2EE specification, a servlet and an enterprise bean
can propagate either the client identity when invoking enterprise beans, or
can use another specified identity as indicated in the corresponding deployment
descriptor.
- demarshall
- The conversion of a data stream into an object.
- demilitarized zone (DMZ)
- A configuration including multiple firewalls to add layers of protection
between a corporate intranet and a public network, like the Internet.
- deploy
- The placement of files or the installation of software into an operational
environment. In Java 2 Platform, Enterprise Edition (J2EE), this action involves
creating a deployment descriptor suitable to the type of application that
is being deployed.
- deployer
- A person who installs modules and J2EE applications into an operational
environment.
- deployment descriptor
- An Extensible Markup Language (XML) file that describes how to deploy
a module or application by specifying configuration and container options.
- deployment manager
- A special type of server that manages operations for a cell.
- deprecated
- Pertaining to an entity, such as a programming element or feature that
is supported, but no longer recommended and that might become obsolete.
- deserializer
- A method for converting a serialized variable into object data.
- digest code
- A number that is the result of a message digest function or a secure hash
algorithm distilling a document.
- digital certificate
- An electronic document used to identify an individual, server, company,
or some other entity, and to associate a public key with the entity. A digital
certificate is issued by a certification authority and is digitally signed
by that authority.
- digital signature
- The encrypted digest code that is appended to a document. In an authentication
system that uses public-key encryption, digital signatures are used to sign
certificates.
- directive
- A first-failure data capture (FFDC) construct that can be contained in
a WebSphere Application Server symptom database to provide information and
suggested actions to assist a diagnostic module in customizing the data that
is logged.
- discover
- In Universal Discovery Description and Integration (UDDI), to browse the
business registry to locate existing Web services integration.
- discovery protocol
- Pertaining to the protocol that is followed to retrieve information from
a network.
- distinguished name (DN)
- A set of name-value pairs (such as CN=person's name and C=country or region)
that uniquely identifies an entity in a digital certificate.
- distributed application
- An application made up of distinct components that are physically located
on different computer systems, connected by a network.
- DMZ
- See demilitarized zone.
- Document Object Model (DOM)
- A system in which a structured document, for example an XML file, is viewed
as a tree of objects that can be programmatically accessed and updated.
- document type definition (DTD)
- The rules that specify the structure for a particular class of SGML or
XML documents.
- DOM
- See Document Object Model.
- domain
- An object, icon, or container that contains other objects representing
the resources of a domain. You can use the domain object to manage those resources.
- drop-down
- Pertaining to a list or a menu that opens when clicked and stays open
until the user selects a menu or a list item or clicks elsewhere in the user
interface.
- DRS
- See data replication service.
- DTD
- See document type definition.
- dynamic cache
- A consolidation of several caching activities, including servlets, Web
services, and WebSphere commands into one service where these activities work
together to improve performance and share configuration parameters.
- dynamic cluster
- A server cluster that uses weights to balance the workloads of its cluster
members dynamically, based on performance information that is collected from
cluster members.
- dynamic policy
- A template of permissions for a particular type of resource.
- dynamic reloading
- The ability to change an existing component without restarting the server
for the changes to become effective.
- EAR
- See enterprise archive.
- ECSA
- See extended common system area.
- Edge Side Include (ESI)
- A technology supporting cacheable and noncacheable Web page components
that can be gathered and assembled at the edge of a network.
- EIS
- See enterprise information system.
- EJB
- See Enterprise JavaBeans.
- EJB container
- A container that implements the EJB component contract of the J2EE architecture.
This contract specifies a run-time environment for enterprise beans that includes
security, concurrency, life-cycle management, transactions, deployment, and
other services. An EJB container is provided by an EJB or J2EE server. (Sun)
- EJB context
- In enterprise beans, an object that allows an enterprise bean to invoke
services provided by the container and to obtain information about the caller
of a client-invoked method. (Sun)
- EJB inheritance
- A form of inheritance in which an enterprise bean inherits properties,
methods, and method-level control descriptor attributes from another enterprise
bean that resides in the same group.
- EJB module
- A software unit that consists of one or more enterprise beans and an EJB
deployment descriptor. (Sun)
- EJB object
- In enterprise beans, an object whose class implements the enterprise bean
remote interface (Sun).
- EJB query
- A string that contains an optional SELECT clause that specifies the EJB
objects to return, a FROM clause that names the bean collections, an optional
WHERE clause that contains search predicates over the collections, an optional
ORDER BY clause that specifies the ordering of the result collection; and
input parameters that correspond to the argument of the finder method.
- EJB reference
- A logical name that is used by an application to locate the home interface
of an enterprise bean in the target operational environment.
- EJB server
- Software that provides services to an EJB container. An EJB server may
host one or more EJB containers (Sun).
- element
- In HTML, XML, or XSL, a basic unit that consists of a start-tag, an end-tag,
associated attributes and their values, and any text that is contained between
the two.
- enclave
- A construct that represents a business transaction or unit of work on
the OS/390 workload manager.
- endian
- A data type that is longer than a byte and that is stored in computer
memory with the most significant byte first or last.
- endpoint
- The system that is the origin or the destination of a session.
- endpoint listener
- The point or the address at which incoming messages for a Web service
are received by a service integration bus.
- enterprise application
- An application that conforms to the Java 2 Platform Enterprise Edition
specification.
- enterprise archive (EAR)
- A specialized Java archive (JAR) file, defined by the J2EE standard used
to deploy J2EE applications to J2EE application servers. An EAR file contains
enterprise beans, a deployment descriptor, and Web archive (WAR) files for
individual Web applications.
- enterprise bean
- A component that implements a business task or business entity and resides
in an EJB container. Entity beans, session beans, and message-driven beans
are all enterprise beans. (Sun)
- enterprise information system (EIS)
- The applications that comprise the existing system of an enterprise for
handling company-wide information. Examples of enterprise information systems
include: an enterprise resource planning (ERP) system, a mainframe transaction
processing system, and a legacy database system. (Sun)
- Enterprise JavaBeans (EJB)
- A component architecture defined by Sun Microsystems for the development
and deployment of object-oriented, distributed, enterprise-level applications.
- entity
- In markup languages such as XML, a collection of characters that can be
referenced as a unit; for example, to incorporate often repeated text or special
characters within a document.
- entity bean
- In EJB programming, an enterprise bean that represents persistent data
maintained in a database. Each entity bean carries its own identity. (Sun)
There
are two types of entity beans: container-managed persistence (CMP) entity
beans and bean-managed persistence (BMP) entity beans.
- environment variable
- A variable that specifies how an operating system or another program runs,
or the devices that the operating system recognizes.
- error
- A discrepancy between a computed, observed, or measured value or condition
and the true, specified, or theoretically correct value or condition.
- error log stream
- A continuous flow of error information that is transmitted using a predefined
format.
- ESI
- See Edge Side Include.
- ESI processor
- A feature in the WebSphere Web server plug-in that supports fragment caching
and fragment assembly into full pages.
- event
- The encapsulated data that is sent as a result of an occurrence or situation
in the system.
- event listener
- A type of asynchronous bean that serves as a notification mechanism and
through which Java 2 Platform, Enterprise Edition (J2EE) components within
a single application can notify each other about various asynchronous events.
- event source
- An object that supports an asynchronous notification server within a single
Java virtual machine. Using an event source, the event listener object can
be registered and used to implement any interface.
- exception
- An event during program execution that prevents the program from continuing
normally.
- exception handler
- A block of code that reacts to a specific type of exception.
- extended common system area (ECSA)
- A major element of MVS/ESA virtual storage above the 16 MB line. This
area contains pageable system data areas that are addressable by all active
virtual storage address spaces. It duplicates the common system area (CSA),
which exists below the 16 MB line.
- extended deployment
- The software that monitors network efficiency and distributes unexpected
workloads.
- extended messaging
- A function of asynchronous messaging where the application server manages
the messaging infrastructure and additional types of messaging beans are provided
to add functionality to that provided by message-driven beans.
- extension
- A class of objects or a set of elements that have been added into a programming
language or a program to provide additional capabilities.
- Extensible Markup Language (XML)
- A standard metalanguage for defining markup languages that is based on
Standard Generalized Markup Language (SGML).
- factory
- In object-oriented programming, a class that is used to create instances
of another class. A factory is used to isolate the creation of objects of
a particular class into one place so that new functions can be provided without
widespread code changes.
- failover
- A cluster event where the primary database server or application server
switches over to a backup system due to the failure of the primary server.
- fast response cache accelerator (FRCA)
- A cache that resides in the kernel on AIX and Windows platforms that provides
support for caching on multiple Web servers and on servers with multiple IP
addresses.
- fault message
- An object that contains status information and details about a problem
with a message.
- federation
- The process of hooking together naming systems so that the aggregate system
can process composite names that span the naming systems.
- file serving
- A function that supports the serving of static files by Web applications.
- filter
- A device or program that separates data, signals, or material in accordance
with specified criteria.
- finder method
- In enterprise beans, a method defined in the home interface and invoked
by a client to locate an entity bean. (Sun)
- fingerprint
- A synonym for digest code.
- firewall
- A network configuration, usually both hardware and software that prevents
unauthorized traffic into and out of a secure network.
- fix pack
- A cumulative collection of fixes that does not contain new functions.
A fix pack can contain fixes that have not been shipped previously. Full regression
testing is performed on fix packs.
- folder
- A container used to organize objects.
- form-based login
- An authentication process where a user ID and a password are retrieved
using an HTML form, and sent to the server over the HTTP or HTTPS protocol.
- form logout
- A mechanism to log out without having to close all Web browser sessions.
- forwardable credentials
- A mechanism-specific security credential that is issued to access a resource,
which is used to obtain another credential for access to a different resource.
- FRCA
- See fast response cache accelerator.
- garbage collection
- A routine that searches memory to reclaim space from program segments
or inactive data.
- gateway
- A middleware component that bridges Internet and intranet environments
during Web service invocations.
- gateway destination
- A type of service destination that receives messages for gateway services.
Gateway destinations are divided into those that are used for request processing
and those that are used for reply processing.
- gateway service
- A Web service that is made available through the Web services gateway.
- General Inter-ORB Protocol (GIOP)
- A protocol that Common Object Request Broker Architecture (CORBA) uses
to define the format of messages.
- generic server
- A server that is managed in, but not supplied by WebSphere Application
Server. Any server or process that is necessary to support the Application
Server environment, including a Java server, a C or C++ server or process,
a CORBA server, or a Remote Method Invocation (RMI) server.
- generic server cluster
- A group of remote servers that need routing by the proxy server.
- getter method
- A method whose purpose is to get the value of an instance or a class variable.
With this capability, another object can find out the value of one of its
variables.
- GIOP
- See General Inter-ORB Protocol.
- global security
- Pertains to all applications running in the environment and determines
whether security is used, the type of registry used for authentication, and
other values, many of which act as defaults.
- grammar
- A document type definition (DTD) or schema providing a structured format
used for successful processing by the trace service.
- group
- A collection of users who can share access authorities for protected resources.
- HA
- See high availability.
- HA group
- A collection of one or more members. A common group name relates the members
together.
- HA policy
- A set of rules that is defined for an HA group that dictate whether zero
(0), or more members are activated. The policy is associated with a specific
HA group by matching the policy match criteria with the group name.
- handle
- In the J2EE specification, an object that identifies an enterprise bean.
A client may serialize the handle, and then later deserialize it to obtain
a reference to the enterprise bean. (Sun).
- handler
- In Web services, a mechanism for processing service content and extending
the function of a JAX-RPC run-time system.
- handshake
- The exchange of messages at the start of a Secure Sockets Layer session
that allows the server to authenticate itself to the client using public-key
techniques, then allows the client and the server to cooperate in creating
symmetric keys for encryption, decryption, and detection of tampering.
- hash
- In computer security, a number generated from a string of text that is
used to ensure that transmitted messages arrived intact.
- hierarchical
- Pertaining to data that is organized on computer systems using a hierarchy
of containers, often called folders (directories) and files. In this scheme,
folders can contain other folders and files. The successive containment of
folders within folders creates the levels of organization, which is the hierarchy.
- high availability
- Pertaining to a clustered system that is reconfigured when node or daemon
failures occur, so that workloads can be redistributed to the remaining nodes
in the cluster.
- high availability file system
- A cluster file system that can be used for component redundancy to provide
continued operations during failures.
- high availability manager
- A framework within which core group membership is determined and status
is communicated between core group members.
- HMAC
- See Keyed-Hashing Message Authentication Code.
- home interface
- In enterprise beans, an interface that defines zero or more create and
remove methods for a session bean or zero or more create, finder, and remove
methods for an entity bean.
- home method
- A method in the home interface that is used by a client to create, locate,
and remove instances of enterprise beans.
- horizontal scaling
- A topology in which more than one application server running on multiple
computing nodes is used to run a single application.
- host
- (1) A computer that is connected to a network and provides an access point
to that network. The host can be a client, a server, or both a client and
server simultaneously.
(2) In performance profiling, a machine or a machine
starting partition on which an application under test resides. The host owns
the processes that are profiled.
- host name
- The network name for a network adaptor on a physical machine in which
the node is installed.
- hot deployment
- The process of adding new components to a running server without stopping
and restarting the application server or application.
- hot servant region
- A servant region that has a request dispatched to it previously and now
has available threads.
- hover help
- A form of online help that can be viewed by moving a mouse or other pointing
device over a GUI item such as an icon or field.
- HTTP
- See Hypertext Transfer Protocol.
- HTTP channel
- A type of channel within a transport chain that provides client applications
with persistent HTTP connections to remote hosts that are either blocked by
firewalls or require an HTTP proxy server. An HTTP channel is used to exchange
application data in the body of an HTTP request and an HTTP response that
are sent to and received from a remote server.
- HTTPS
- See Hypertext Transfer Protocol Secure.
- Hypertext Transfer Protocol (HTTP)
- In the Internet suite of protocols, the protocol that is used to transfer
and display hypertext and XML documents on the Web.
- Hypertext Transfer Protocol Secure (HTTPS)
- An Internet protocol that is used by Web servers and Web browsers to transfer
and display hypermedia documents securely across the Internet.
- IDE
- See integrated development environment.
- identifier
- The name of an item in a program written in the Java language.
- identity
- The data that represents a person and that is stored in one or more repositories.
- identity assertion
- The invocation credential that is asserted to the downstream server. This
credential can be set as the originating client identity, the server identity,
or another specified identity, depending on the RunAs mode for the enterprise
bean.
- identity token
- The token that contains the invocation credential identity, which with
the client authentication token are required by the receiving server to accept
the asserted identity.
- IDL
- See Interface Definition Language.
- IETF
- See Internet Engineering Task Force.
- IIOP
- See Internet Inter-ORB Protocol.
- inbound authentication
- The configuration that determines the type of accepted authentication
for inbound requests.
- inbound port
- A type of port that takes a message that is received at an endpoint listener
and passes the message to the service integration bus for forwarding to the
appropriate inbound service.
- inbound service
- The external interface for a service that is provided by your own organization
and hosted in a location that is directly available through the service destination.
- inbound transport
- Network ports in which a server listens for incoming requests.
- inheritance
- An object-oriented programming technique that supports the use of existing
classes as a basis for creating other classes.
- initial context
- The starting point in a namespace.
- initial reference
- A well-known reference associated with an identifier.
- INS
- See Interoperable Naming Service.
- instance
- In object-oriented programming, an object of a particular class.
- integrated development environment (IDE)
- A set of software development tools such as source editors, compilers,
and debuggers, that is accessible from a single user interface.
In Eclipse,
the IDE is called the Workbench.
- Interactive System Productivity Facility (ISPF)
- An IBM licensed program that serves as a full-screen editor and dialog
manager. Used for writing application programs, it provides a means of generating
standard screen panels and interactive dialogs between the application programmer
and terminal user.
- Interface Definition Language (IDL)
- In Common Object Request Broker Architecture (CORBA), a declarative language
that is used to describe object interfaces, without regard to object implementation.
- internationalized
- An application that has been coded such that it can present information
to users in different locales or languages, and accept input data from users
in multiple locales.
- Internet Engineering Task Force (IETF)
- The task force of the Internet Architecture Board (IAB) that is responsible
for solving the short-term engineering needs of the Internet. The IETF consists
of numerous working groups, each focused on a particular problem. Internet
standards are typically developed or reviewed by individual working groups
before they can become standards.
- Internet Inter-ORB Protocol (IIOP)
- A protocol used for communication between Common Object Request Broker
Architecture (CORBA) Object Request Brokers.
- interoperability
- The capability to communicate, run programs, or transfer data among various
functional units in a way that requires the user to have little or no knowledge
of the unique characteristics of these units.
- Interoperable Naming Service (INS)
- A program that supports the configuration of the Object Request Broker
(ORB) administratively to return object references.
- interoperable object reference (IOR)
- An object reference with which an application can make a remote method
call on a CORBA object. This reference contains all the information needed
to route a message directly to the appropriate server.
- invocation
- The activation of a program or a procedure.
- invocation credential
- An identity with which to invoke a downstream method. The receiving server
requires this identity with the sending server identity to accept the asserted
identity.
- invoker attribute
- An assembly property for a Web module that is used by the servlet that
implements the invocation behavior.
- IOR
- See interoperable object reference.
- ISPF
- See Interactive System Productivity Facility.
- J2EE
- See Java 2 Platform Enterprise Edition.
- J2EE application
- Any deployable unit of J2EE functionality. This unit can be a single module
or a group of modules packaged into an enterprise archive (EAR) file with
a J2EE application deployment descriptor. (Sun)
- J2EE Connector architecture (JCA)
- A standard architecture for connecting the J2EE platform to heterogeneous
enterprise information systems (EIS).
- J2EE server
- A run-time environment that provides enterprise bean or Web containers.
- JAAS
- See Java Authentication and Authorization Service.
- Jacl
- See Java Command Language.
- JAF
- See JavaBeans Activation Framework.
- Java
- An object-oriented programming language for portable interpretive code
that supports interaction among remote objects. The Java language was developed
and specified by Sun Microsystems, Incorporated.
- Java 2 Connector Security
- An architecture designed to extend the end-to-end security model for J2EE-based
applications to include enterprise information systems (EIS).
- Java 2 Platform Enterprise Edition (J2EE)
- An environment for developing and deploying enterprise applications, defined
by Sun Microsystems Inc. The J2EE platform consists of a set of services,
application programming interfaces (APIs), and protocols that provide the
functionality for developing multitiered, Web-based applications.
- Java API for XML (JAX)
- Refers to a set of Java-based application programming interfaces for handling
various operations involving data that is defined through Extensible Markup
Language (XML).
- Java API for XML-based RPC (JAX-RPC)
- A specification that describes application programming interfaces and
conventions for supporting XML-based remote procedure call (RPC) protocols
in the Java platform.
- Java Authentication and Authorization Service (JAAS)
- A package through which services can authenticate and authorize users
while enabling the applications to remain independent from underlying technologies.
- Java Command Language (Jacl)
- A scripting language for the Java 2 environment that is used to create
Web content and to control Java applications.
- Java Database Connectivity (JDBC)
- An industry standard for database-independent connectivity between Java
code and a wide range of databases. The JDBC provides a call-level application
programming interface (API) for SQL-based database access.
- Java Management Extensions (JMX)
- A means of doing management of and through Java technology. JMX was developed
through the Java Community ProcessSM program, by Sun Microsystems, Inc. and
some leading companies in the management field. JMX is a universal, open extension
of the Java programming language for management that can be deployed across
all industries, wherever management is needed.
- Java Message Service (JMS)
- A Java API that supports the creation and communication of various messaging
implementations.
- Java Naming and Directory Interface (JNDI)
- A Java extension that provides an interface for various directory and
naming services in an enterprise.
- Java platform
- A collective term for the Java language for writing programs; a set of
APIs, class libraries, and other programs used in developing, compiling, and
error-checking programs; and a Java virtual machine which loads and executes
the class files. (Sun)
- Java Runtime Environment (JRE)
- A subset of the Java Software Development Kit (SDK) that contains the
core executables and files that constitute the standard Java platform. The
JRE includes the Java virtual machine (JVM), core classes, and supporting
files.
- Java Secure Socket Extension (JSSE)
- A Java package that enables secure Internet communications. It implements
a Java version of the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols and supports data encryption, server authentication, message
integrity, and optionally, client authentication.
- Java virtual machine (JVM)
- A software implementation of a central processing unit that runs compiled
Java code (applets and applications).
- Java Virtual Machine Profiler Interface (JVMPI)
- A profiling tool that supports the collection of information, such as
data about garbage collection and the Java virtual machine (JVM) API that
runs the application server.
- JavaBeans
- As defined for Java by Sun Microsystems, a portable, platform-independent,
reusable component model.
- JavaBeans Activation Framework (JAF)
- A standard extension to the Java platform that determines arbitrary data
types and available operations and can instantiate a bean to run pertinent
services.
- JavaMail API
- A platform and protocol-independent framework for building Java-based
mail client applications.
- JavaServer Pages (JSP)
- A server-side scripting technology that enables Java code to be dynamically
embedded within Web pages (HTML files) and run when the page is served to
return dynamic content to a client.
- JavaServer Pages (JSP) file
- Application building blocks coded to the Sun Microsystems JavaServer Pages
(JSP) specification. JSP files enable the separation of the Hypertext Markup
Language (HTML) code from the business logic in Web pages so that HTML programmers
and Java programmers can collaborate when creating and maintaining pages.
- JAX
- See Java API for XML.
- JAX-RPC
- See Java API for XML-based RPC.
- JAX-RPC handler
- A Java class that performs a range of handling tasks, including logging
messages, transforming message content, or terminating an incoming request.
- JCA
- See J2EE Connector architecture.
- JDBC
- See Java Database Connectivity.
- JMS
- See Java Message Service.
- JMX
- See Java Management Extensions.
- JNDI
- See Java Naming and Directory Interface.
- JRas
- A toolkit that consists of a set of Java packages that enable developers
to incorporate message logging and trace facilities into Java applications.
- JRE
- See Java Runtime Environment.
- JSP
- See JavaServer Pages file.
- JSP page
- A text-based document using fixed template data and JSP elements that
describes how to process a request to create a response. (Sun)
- JSSE
- See Java Secure Socket Extension.
- JVM
- See Java virtual machine.
- JVMPI
- See Java Virtual Machine Profiler Interface.
- junction
- A logical connection created to establish a path from one server to another.
- kernel
- The part of an operating system that performs basic functions such as
allocating hardware resources.
- key
- A cryptographic mathematical value that is used to digitally sign, verify,
encrypt, or decrypt a message.
- key database file
- A synonym for a key ring.
- key file
- A synonym for key ring. The file that stores the keys used during the
authentication of a message.
- key locator
- A mechanism that retrieves the key for XML signing, XML digital signature
verification, XML encryption, and XML decryption.
- Keyed-Hashing Message Authentication Code (HMAC)
- A mechanism for message authentication that uses cryptographic hash functions.
- key ring
- In computer security, a file that contains public keys, private keys,
trusted roots, and certificates.
- keystore file
- A key database file that contains both public keys stored as signer certificates
and private keys stored in personal certificates.
- keystring
- Additional specification of the entry within the naming service.
- launchpad
- A graphical interface for launching the product installation.
- lazy authentication
- The process whereby the security run time obtains the required authentication
data when the Java client accesses a protected enterprise bean for the first
time.
- LDAP
- See Lightweight Directory Access Protocol .
- Lightweight Directory Access Protocol (LDAP)
- An open protocol that uses TCP/IP to provide access to information directories
that support an X.500 model and that does not incur the resource requirements
of the more complex X.500 Directory Access Protocol (DAP). For example, LDAP
can be used to locate people, organizations, and other resources in an Internet
or intranet directory.
- Lightweight Third Party Authentication (LTPA)
- A protocol that uses cryptography to support security in a distributed
environment.
- link name
- A name that is defined in the deployment descriptor of the encompassing
application.
- link pack area (LPA)
- A major element of MVS/ESA virtual storage below the 16MB line. The storage
areas that make up the LPA contain all the common reentrant modules shared
by the system. The LPA provides economy of real storage by sharing one copy
of the modules, protection because LPA code cannot be overwritten even by
key 0 programs, and reduced path length because the modules can be branched
to.
- listener
- A program that detects incoming requests and starts the associated channel.
- listener port
- An object that defines the association between a connection factory, a
destination, and a deployed message-driven bean. Listener ports simplify the
administration of the associations between these resources.
- load balancing
- The monitoring of application servers and management of the workload on
servers. If one server exceeds its workload, requests are forwarded to another
server with more capacity.
- local
- Pertaining to a device, file, or system that is accessed directly from
a user’s system, without a communication line.
- local transaction containment (LTC)
- A bounded scope that is managed by the container to define the application
server behavior in an unspecified transaction context.
- location service daemon
- A component of the Remote Method Invocation and Internet inter-ORB Protocol
(RMI/IIOP) communication function that works with workload management to distribute
RMI requests among application servers in a cell.
- logger
- A named and stateful object with which the user code interacts that logs
messages for a specific system or application component.
- log handler
- A class that uses loggers, levels, and filters to direct whether events
are processed or suppressed.
- logging
- The recording of data about specific events on the system, such as errors.
- logging level
- A value that controls which events are processed by Java logging.
- login binding
- A definition of the implementation to provide login information per authentication
methods.
- login mapping
- A Java Authentication and Authorization Service (JAAS) login configuration
that is used to authenticate a security token in a Web service security header.
- location service daemon
- A component of the Remote Method Invocation and Internet Inter-ORB Protocol
(RMI/IIOP) communication function that works with workload management to distribute
RMI requests among application servers in a cell.
- long name
- The property that specifies the logical name for the server on the z/OS
platform in WebSphere Application Server.
- LPA
- See link pack area.
- LTC
- See local transaction containment.
- LTPA
- See Lightweight Third Party Authentication.
- mail session
- A resource collection of protocol providers that authenticate users and
control user access to messaging systems.
- Managed Bean (MBean)
- In the Java Management Extensions (JMX) specification, the Java objects
that implement resources and their instrumentation. MBeans must follow the
design patterns and interfaces defined in the instrumentation level of the
JMX specification. This ensures that all MBeans provide the instrumentation
of managed resources in a standardized way. MBeans are manageable by any JMX
agent, but they can also be managed by non-compliant agents that support the
MBean concept.
- managed node
- A node with an application server and a node agent that belongs to a cell.
- managed resource
- An entity that exists in the run-time environment of an IT system and
can be managed.
- marshall
- The conversion of an object into a data stream for transmission over a
network.
- MBean
- See Managed Bean.
- MBean provider
- A library containing an implementation of a Java Management Extensions
(JMX) MBean and its MBean Extensible Markup Language (XML) descriptor file.
- MD5
- A type of message algorithm that converts a message of arbitrary length
into a 128-bit message digest. This algorithm is used for digital signature
applications where a large message must be compressed in a secure manner.
- message digest
- A hash value or a string of bits resulting from the conversion of processing
data to a number.
- message-driven bean
- An enterprise bean that provides asynchronous message support and clearly
separates message and business processing.
- metadata
- Data that describes the characteristics of stored data; descriptive data.
For example, the metadata for a database table might include the name of the
table, the name of the database that contains the table, the names of the
columns in the table, and the column descriptions, either in technical terms
or business terms. Database catalogs and information catalogs contain metadata.
- method
- In object-oriented design or programming, the software that implements
the behavior specified by an operation.
- method extension
- An IBM extension to the standard deployment descriptors for enterprise
beans that define transaction isolation methods and control the delegation
of credentials.
- method permission
- A mapping between one or more security roles and one or more methods that
a member of a role can call.
- MIME
- See Multipurpose Internet Mail Extensions.
- module
- In J2EE, a software unit that consists of one or more components of the
same container type and one deployment descriptor of that type. Examples include
EJB, Web, and application client modules. Modules can be deployed as stand-alone
units or assembled into an application. (Sun).
- monitor
- In performance profiling, to collect data about an application from the
running agents that are associated with that application
- mount point
- A logical drive through which volumes are accessed in a sequential access
device class. For removable media device types, such as cartridges, a mount
point is a logical drive associated with a physical drive. For the file device
type, a mount point is a logical drive associated with an I/O stream.
- MPMT
- See multiprocess multithread.
- multiple configuration instances
- More than one instance of a product running in the same machine at the
same time.
- multiprocess multithread (MPMT)
- A process architecture of the IBM HTTP Server that supports multiple processes
as well as multiple threads per process.
- Multipurpose Internet Mail Extensions (MIME)
- An Internet standard that allows different forms of data including video,
audio, or binary data to be attached to e-mail without requiring translation
into ASCII text.
- namespace
- A space reserved by a file system to contain the names of its objects.
- naming
- An operation that is used by clients of WebSphere Application Server applications
to obtain references to objects related to those applications.
- naming contexts
- A logical namespace containing name and object bindings.
- naming federation
- The process of hooking together naming systems so that the aggregate system
can process composite names that span the naming systems.
- naming service
- An implementation of the Java Naming and Directory Interface (JNDI) standard.
- NAT
- See network address translation.
- native
- Pertaining to the relationship between a transport user and a transport
provider that are both based on the same transport protocol.
- network address translation (NAT)
- The conversion of a network address that is assigned to a logical unit
in one network into an address in an adjacent network.
- network protocol stack
- A set of network protocol layers and software that work together to process
the protocols.
- node
- A logical grouping of managed servers.
- node agent
- An administrative function that manages all application servers on a node
and represents the node in the management cell.
- node federation
- The process of combining the managed resources of one node into a distributed
network such that the central manager application can access and administer
the resources on the node.
- node group
- A collection of WebSphere Application Server nodes that defines a boundary
for server cluster formation.
- node name
- The machine name or host name; an arbitrary WebSphere Application Server-specific
name that must be unique.
- nonce
- A unique cryptographic number that is embedded in a message to help detect
a replay attack.
- nonrepudiation
- In business-to-business communication, the ability of the recipient to
prove who sent a message based on the contents of the message. This proof
is derived from the use of a digital signature in the message, which links
the sender to the message.
- notification
- A message that contains the event descriptions that are sent to managed
resources, autonomic managers, and other resources.
- object
- In object-oriented design or programming, a concrete realization (instance)
of a class that consists of data and the operations associated with that data.
An object contains the instance data that is defined by the class, but the
class owns the operations that are associated with the data.
- object adapter
- A Common Object Request Broker Architecture (CORBA) term, denoting the
primary interface that a server implementation uses to access Object Request
Broker (ORB) functions.
- object reference
- A Common Object Request Broker Architecture (CORBA) term, denoting the
information needed to reliably identify a particular object.
- Object Request Broker (ORB)
- In object-oriented programming, software that serves as an intermediary
by transparently enabling objects to exchange requests and responses.
- one-way hash
- An algorithm that converts processing data into a string of bits; known
as a hash value or a message digest.
- Open Servlet Engine (OSE)
- A lightweight communications protocol developed by IBM for interprocess
communication.
- ORB
- See Object Request Broker.
- OSE
- See Open Servlet Engine.
- outbound authentication
- The configuration that determines the type of accepted authentication
for outbound requests.
- outbound port
- The mechanism through which an outbound service communicates with the
externally-hosted Web service. Messages pass between the outbound service
and the external service through the appropriate port.
- outbound service
- A service that provides access through one or more outbound ports to a
Web service that is hosted externally.
- package
- (1) In Java programming, a group of types. Packages are declared with
the package keyword. (Sun)
(2) In J2EE technology, to assemble components
into modules and modules into enterprise applications.
- page list
- An assembly property that specifies the location to forward a request,
but automatically tailors that location, depending on the Multipurpose Internet
Mail Extensions (MIME) type of the servlet.
- parallel garbage collection
- A type of garbage collection that uses several garbage collection threads
at one time.
- part reference
- An object that is used by a configuration to reference other related configuration
objects.
- passivation
- In enterprise beans, the process of transferring an enterprise bean from
memory to secondary storage. (Sun)
- PassTicket
- In RACF secured signon, a dynamically generated, random, one-time-use,
password substitute that a workstation or other client can use to sign on
to the host rather than sending a RACF password across the network.
- payload
- The body of the message that holds the content.
- peer access point
- A means by which core groups can communicate with other cells.
- Performance Monitoring Infrastructure (PMI)
- A set of packages and libraries assigned to gather, deliver, process,
and display performance data.
- permission
- Authorization to perform activities, such as reading and writing local
files, creating network connections, and loading native code.
- persist
- To be maintained across session boundaries, usually in nonvolatile storage
such as a database system or a directory.
- persistence
- (1) A characteristic of data that is maintained across session boundaries,
or of an object that continues to exist after the execution of the program
or process that created it, usually in nonvolatile storage, such as a database
system.
(2) In J2EE technology, the protocol for transferring the state
of an entity bean between its instance variables and an underlying database.
(Sun)
- plug-in
- A software module, often written by a third party that adds function to
an existing program or application, such as a Web browser.
- PME
- See programming model extension.
- PMI
- See Performance Monitoring Infrastructure.
- point-to-point
- A style of messaging application in which the sending application knows
the destination of the message.
- policy
- A set of considerations that you set up to automatically control the behavior
of a managed resource or user.
- port
- As defined in a Web Services Description Language (WSDL) document, a single
endpoint that is defined as a combination of a binding and a network address.
- port destination
- The specialization of a service integration bus destination. Each port
destination represents a particular message format and transport protocol
that you can use to pass messages to an externally-hosted service.
- port number
- In the Internet suite of protocols, the identifier for a logical connector
between an application entity and the transport service.
- presumed trust
- A type of identity assertion where trust is presumed and additional trust
validation is not performed. Use this mode only in an environment where trust
is established with some other mechanism.
- primary key
- An object that uniquely identifies an entity bean within a home (Sun).
- primitive key
- In Java programming, a category of data type that describes a variable
that contains a single value of the appropriate size and format for its type:
a number, a character, or a Boolean value. Examples of primitive types include
byte, short, int, long, float, double, char, boolean.
- principal
- An entity that can communicate securely with another entity.
- private key
- In secure communication, an algorithmic pattern that is used to encrypt
messages that only the corresponding public key can decrypt. The private key
is also used to decrypt messages that were encrypted by the corresponding
public key. The private key is kept on the user’s system and is protected
by a password.
- process definition
- A specification of the run-time characteristics of an application server
process.
- process module
- A program unit that contains a set of process templates that support administrative
tasks.
- profile
- Data that describes the characteristics of a user, group, resource, program,
device, or remote location.
- programmatic login
- A type of form login that supports application presentation site-specific
login forms for the purpose of authentication.
- programmatic security
- A collection of methods used by applications when declarative security
is not sufficient to express the security model of the application.
- programming model extension (PME)
- The programming model capabilities that ship with WebSphere Application
Server Enterprise Edition. These capabilities are also known as enterprise
services.
- property
- A characteristic or attribute that describes a unit of information.
- proxy cluster
- A group of proxy servers that distributes HTTP requests across the cluster.
- proxy peer access point
- A means of identifying the communication settings for a peer access point
that cannot be accessed directly.
- proxy server
- A server that acts as an intermediary for HTTP Web requests that are hosted
by an application or a Web server. A proxy server acts as a surrogate for
the content servers in the enterprise.
- public
- In the Java programming language, pertains to a method or variable that
can be accessed by elements residing in other classes. (Sun)
- public key
- In secure communication, an algorithmic pattern used to decrypt messages
that were encrypted by the corresponding private key. A public key is also
used to encrypt messages that can be decrypted only by the corresponding private
key. Users broadcast their public keys to everyone with whom they must exchange
encrypted messages.
- public-key algorithm
- An algorithm designed so that the key used for encryption is different
from the key used for decryption. The decryption key cannot be derived, at
least not in any reasonable amount of time, from the encryption key.
- publish
- (1) To make a Web site public, for example by putting files in a path
known to the HTTP server.
(2) In UDDI, to advertise a Web service so that
other businesses can find and bind with it. Service providers publish the
availability of their services through a registry.
- QoS
- See quality of service.
- quality of service (QoS)
- A set of communication characteristics required by an application. QoS
defines a specific transmission priority, level of route reliability, and
security level.
- queue
- A WebSphere MQ object to which message queuing applications can put messages,
and from which they can get messages. Local queues can contain a list of messages
waiting to be processed. Queues of other types cannot contain messages: they
point to other queues, or can be used as models for dynamic queues.
- queueing network
- A group of interconnected components.
- RACF
- See Resource Access Control Facility.
- rapid deployment tools
- Tools to rapidly develop and deploy Java 2 Platform, Enterprise Edition
(J2EE) artifacts on the server and package the J2EE artifacts into the deployed
enterprise archive (EAR) file.
- RAR
- See resource adapter archive.
- realm
- A collection of resource managers that honor a common set of user credentials
and authorizations.
- realm name
- The machine name of a user registry.
- reentrance
- A situation where a thread of control attempts to enter a bean instance
again.
- reference
- A logical name defined in the application deployment descriptor that is
used to locate external resources for enterprise applications. At deployment,
the references are bound to the physical location of the resource in the target
operational environment.
- referential integrity
- In Extensible Markup Language (XML) tools, the condition that exists when
all references to items in the XML schema editor or DTD editor are automatically
cleaned up when the schema is detected or renamed.
- refresh pack
- A fix pack, which is a cumulative collection of fixes, that also contains
new functions. Full regression testing is performed on refresh packs.
- region
- A contiguous area of virtual storage that has common characteristics and
that can be shared between processes.
- registry
- A repository that contains access and configuration information for users,
systems, and software.
- remote
- Pertaining to a system, program, or device that is accessed through a
communications line.
- remote home interface
- In enterprise beans, an interface that specifies the methods used by remote
clients for locating, creating, and removing instances of enterprise bean
classes.
- remote interface
- In enterprise beans, an interface that defines the business methods that
can be called by a client.
- remote method
- A business method in the remote interface that is callable by a client.
- Remote Method Invocation (RMI)
- A protocol that is used to communicate method invocations over a network.
Java Remote Method Invocation is a distributed object model in which the methods
of remote objects written in the Java programming language can be invoked
from other Java virtual machines, possibly on different hosts.
- Remote Method Invocation over Internet Inter-ORB Protocol (RMI/IIOP)
- Part of the Java 2 Platform, Standard Edition (J2SE) model that developers
can use to program in the Java language to work with RMI interfaces, but use
IIOP as the underlying transport.
- Remote OSE
- The use of the Open Servlet Engine (OSE) protocol as a transport mechanism
to communicate between two separate machines in the WebSphere Application
Server environment.
- remote procedure call (RPC)
- A protocol that allows a program on a client computer to run a program
on a server.
- remove method
- In enterprise beans, a method that is defined in the home interface and
invoked by a client to destroy an enterprise bean.
- repertoire
- Configuration information that contains the details necessary for building
a Secure Sockets Layer (SSL) connection.
- replication
- The process of copying objects from one node in a cluster to one or more
other nodes in the cluster, which makes the objects on all the systems identical.
- replication entry
- A run-time component that handles the transfer of internal WebSphere Application
Server data.
- repository
- A persistent storage area for source code and other application resources.
- request consumer binding
- A definition of the security requests for the request message that is
received by a Web service.
- request generator binding
- A definition of the security requests for the request message that is
sent to a Web service.
- request metrics
- A mechanism to monitor and troubleshoot performance bottlenecks in the
system at an individual request level.
- request receiver binding
- A definition of the security requirements for the request message that
is received from a request to a Web service.
- request sender binding
- A definition of the security requirements for the request message that
is sent to a Web service.
- Resource Access Control Facility (RACF)
- An IBM licensed program that provides access control by identifying users
to the system; verifying users of the system; authorizing access to protected
resources; logging detected, unauthorized attempts to enter the system; and
logging detected access to protected resources.
- resource adapter
- A system-level software driver that is used by an EJB container or an
application client to connect to an enterprise information system (EIS). A
resource adapter plugs in to a container; the application components deployed
on the container then use the client API (exposed by adapter) or tool-generated,
high-level abstractions to access the underlying EIS. (Sun).
- resource adapter archive (RAR)
- A Java archive (JAR) file that is used to package a resource adapter for
the Java 2 Connector (J2C) architecture for WebSphere Application Server.
- resource environment reference
- A reference that maps a logical name used by the client application to
the physical name of an object.
- resource manager local transaction (RMLT)
- A resource manager view of a local transaction that represents a unit
of recovery on a single connection that is managed by the resource manager.
- resource property
- A property for a Java DataBase Connectivity (JDBC) data source in a server
configuration; for example the server name, user ID, or password.
- Resource Recovery Services (RRS)
- A z/OS facility that provides two-phase synchronization point support
across participating resource managers.
- response consumer binding
- A definition of the security requests for the response message that is
received by a Web service
- response generator binding
- A definition of the security requests for the response message that is
sent to a Web service.
- response receiver binding
- A definition of the security requirements for the response message that
is received from a request to a Web service.
- response sender binding
- A definition of the security requirements for the response message that
is sent to a Web service.
- reverse proxy
- An IP-forwarding topology where the proxy is on behalf of the back-end
HTTP server. It is an application proxy for servers using HTTP.
- ripplestart
- An action where the system waits for each member in a cluster to start
before starting the next member of the cluster.
- RMI
- See Remote Method Invocation.
- RMI/IIOP
- See Remote Method Invocation over Internet Inter-ORB Protocol.
- RMLT
- See resource manager local transaction.
- role
- A logical group of principals that provide a set of permissions. Access
to operations is controlled by granting access to a role.
- role-based authorization
- The use of authorization information to determine whether a caller has
the necessary privilege to request a service.
- role mapping
- The process of associating groups and principals recognized by the container
to security roles specified in the deployment descriptor.
- routing policy
- A set of rules that determine how the server routes incoming requests.
- RPC
- See remote procedure call.
- RRS
- See Resource Recovery Services.
- run time
- The time period during which a computer program is running.
- RunAs role
- A role used by a servlet or an enterprise bean component to invoke and
delegate a role to another enterprise bean.
- SAAJ
- See SOAP with attachments API for Java.
- SAF
- See System Authorization Facility.
- SAML
- See Security Assertion Markup Language.
- SAS
- See Secure Association Service.
- scalability
- The ability of hardware, software, or a distributed system to continue
to function well as it is changed in size or volume. For example, the ability
to retain performance levels when adding processors, memory, and storage.
- scheduler
- A service that provides time-dependent services.
- schema
- (1) A collection of database objects such as tables, views, indexes, or
triggers that define a database. A database schema provides a logical classification
of database objects.
(2) In XML, a mechanism for describing and constraining
the content of XML files by indicating which elements are allowed and in which
combinations. XML schemas are an alternative to the document type definition
(DTD) and can be used to extend functionality in the areas of data typing,
inheritance, and presentation.
- scope
- A specification of the boundary within which system resources can be used.
- script
- A series of commands, combined in a file that carry out a particular function
when the file is run. Scripts are interpreted as they are run.
- scripting
- A style of programming that reuses existing components as a base for building
applications.
- SDO
- See Service Data Objects.
- SDO repository
- A database that the service integration bus for Web services enablement
uses for storing and serving Web Services Description Language (WSDL) definitions
- Secure Association Service (SAS)
- An authentication protocol used to communicate securely for the client
principal by establishing a secure association between the client and server.
- Secure Sockets Layer (SSL)
- A security protocol that provides transport layer security: authenticity,
integrity, and confidentiality, for a secure connection between a client and
a server. The protocol runs above TCP/IP and below application protocols.
- Security Assertion Markup Language (SAML)
- An XML framework for exchanging authentication and authorization information.
- security attribute propagation
- The transportation of security attributes from one server to another server
in a WebSphere Application Server configuration.
- security constraints
- A declaration of how to protect Web content, and how to protect data that
is communicated between the client and the server.
- security domain
- The set of all the servers that are configured with the same user registry
realm name.
- security permission
- Authorization granted to access a system resource.
- security policy
- A written document that defines the security controls that you institute
for your computer systems. A security policy describes the risks that you
intend these controls to minimize and the actions that should be taken if
someone breaches your security controls.
- security role reference
- A role that defines the access levels a user has and the specific resources
they can modify at those levels.
- security token
- A representation of a set of claims that are made by a client that can
include a name, password, identity, key, certificate, group, privilege, and
so on.
- sequence grouping
- The specification of the order in which entity beans update relational
database tables.
- servant region
- A contiguous area of virtual storage that is dynamically started as load
increases and automatically stopped as load eases.
- server
- In a network, hardware or software that provides facilities to other stations.
Examples of a server include a file server, a printer server, and a mail server.
- server cluster
- A group of servers that are typically on different physical machines and
have the same applications configured within them, but operate as a single
logical server.
- server implementation object
- Enterprise beans that client applications require to access and implement
the services that support those objects.
- server-side include
- A facility for including dynamic information in documents sent to clients,
such as current date, the last modification date of a file, and the size or
last modification of other files.
- service class
- A subset of a workload having the same service goals or performance objectives,
resource requirements, or availability requirements. For workload management,
you assign a service goal to a service class.
- service context
- Part of a General Inter-ORB Protocol (GIOP) message that is identified
with an ID and contains data used in specific interactions, such as security
actions, character codeset conversion, and Object Request Broker (ORB) version
information.
- Service Data Objects (SDO)
- An open standard for enabling applications to handle data from heterogeneous
data sources in a uniform way.
- service description
- The description of a Web service, which can be defined in any format such
as WSDL, UDDI, or HTML.
- service destination
- A specialization of a service integration bus destination. Each service
destination can directly represent a Web service implementation or can indirectly
represent the service through a Web Services Definition Language (WSDL) document.
- service integration bus
- A managed communication mechanism that supports service integration through
synchronous and asynchronous messaging. A bus consists of interconnecting
messaging engines that manage bus resources.
- service integration bus Web services enablement
- A software component that enables Web services to use IBM service integration
technologies. This capability provides a quality of service choice and message
distribution options for Web services, with mediations that support message
rerouting or modification.
- service type definition
- In Universal Description Discovery and Integration (UDDI), a description
of specifications for services or taxonomies.
- servlet
- A Java program that runs on a Web server and extends the capabilities
of a Web server by generating dynamic content in response to Web client requests.
Servlets are commonly used to connect databases to the Web.
- servlet filtering
- The process of transforming a request or modifying a response without
exposing the resource used by the servlet engine.
- servlet mapping
- A correspondence between a client request and a servlet that defines their
association.
- session
- A series of requests to a servlet originating from the same user at the
same browser.
- session affinity
- A method of configuring applications in which a client is always connected
to the same server. These configurations disable workload management after
an initial connection by forcing a client request to always go to the same
server.
- session bean
- An enterprise bean that is created by a client and that usually exists
only for the duration of a single client/server session. (Sun)
- setter method
- A method whose purpose is to set the value of an instance or class variable.
With this capability, another object can set the value of one of its variables.
- SHA-1
- A Secure Hash Algorithm for computing a condensed representation of a
message or data file.
- shared library file
- A file that consists of a symbolic name, a Java class path and a native
path for loading Java Native Interface (JNI) libraries. Applications that
are deployed on the same node as this file can access this information.
- short name
- In personal communications, the one-letter name (A through Z) of the presentation
space or emulation session.
- signer certificate
- The trusted certificate entry that is usually in a truststore file.
- Simple Object Access Protocol (SOAP)
- A lightweight, XML-based protocol for exchanging information in a decentralized,
distributed environment. SOAP can be used to query and return information
and invoke services across the Internet.
- simple type
- In XML, a type that cannot have element content and cannot carry attributes.
Elements that contain numbers (and strings, and dates, and so on) but do not
contain any sub-elements are said to have simple types.
- single signon
- An authentication process in a client and server relationship in which
the user can enter one name and password, and have access to more than one
application.
- smart card
- An intelligent token that is embedded with an integrated circuit chip
that provides memory capacity and computational capabilities.
- SOAP
- See Simple Object Access Protocol .
- SOAP with attachments API for Java (SAAJ)
- An application programming interface (API) that is used to send XML documents
over the Internet from a Java base.
- socket
- A method of communication between two processes. A socket is an identifier
that the application uses to uniquely identify an end point of communications.
The user associates a protocol address with the socket by associating a socket
address with the socket.
- SOCKS
- A client/server architecture that transports TCP/IP traffic through a
secure gateway. A SOCKS server performs many of the same services that a proxy
server does.
- special-subject
- Generalization of a particular class of users; a product-defined entity
independent of the user registry.
- SQL
- See Structured Query Language.
- SQLJ
- See Structured Query Language for Java.
- SSL
- See Secure Sockets Layer.
- SSL channel
- A type of channel within a transport chain that associates a Secure Sockets
Layer (SSL) configuration repertoire with the transport chain.
- SSO
- See single signon.
- stateful session bean
- A session enterprise bean that acts on behalf of a single client and maintains
client-specific session information (called conversational state) across multiple
method calls and transactions.
- stateless session bean
- A session bean that is a collection of operations. The server can optimize
resources by reusing bean instances on every method call.
- static
- A Java programming language keyword that is used to define a variable
as a class variable.
- static cluster
- A backup cluster that is defined statically to handle requests if the
primary cluster fails.
- stored procedure
- A block of procedural constructs and embedded SQL statements that is stored
in a database and can be called by name. Stored procedures allow an application
program to be run in two parts, one on the client and the other on the server,
so that one call can produce several accesses to the database.
- stream decryption
- A symmetric algorithm that decrypts data one bit or byte of data at a
time.
- stream encryption
- A symmetric algorithm that encrypts data one bit or byte of data at a
time.
- string
- In programming languages, the form of data that is used for storing and
manipulating text.
- Structured Query Language (SQL)
- A standardized language for defining and manipulating data in a relational
database.
- Structured Query Language for Java (SQLJ)
- A standard set of programming extensions that allows embedded SQL statements
in a Java program.
- Struts
- An open source framework for building Java Web applications.
- Struts module
- A Struts configuration file and a set of corresponding actions, form beans,
and Web pages. A Struts application comprises at least one Struts module.
- stub
- A small program routine that substitutes for a longer, possibly remote,
program. For example, a stub might be a program module that transfers procedure
calls (RPCs) and responses between a client and a server. In Web services,
a stub is an implementation of a Java interface generated from a Web Services
Definition Language (WSDL) document.
- symmetric algorithm
- An algorithm where the encryption key can be calculated from the decryption
key and vice versa. In most symmetric algorithms, the encryption key and the
decryption key are the same.
- syntax
- The rules for the construction of a command or statement.
- sysplex
- A set of MVS or OS/390 systems communicating and cooperating with each
other through certain multisystem hardware components and software services
to process customer workloads.
- System Authorization Facility (SAF)
- An interface defined by MVS that enables programs to use system authorization
services to protect access to resources such as data sets and MVS commands.
The IBM Resource Access Control Facility (RACF) is a product that uses the
SAF interface.
- system logger
- A central logging facility provided by MVS/ESA SP 5.2. The MVS system
logger provides an integrated MVS logging facility that can be used by system
and subsystem components. For example, it is used by the CICS log manager.
- tag library
- In JSP technology, a collection of tags identifying custom actions described
using a taglib descriptor and Java classes. A JSP tag library can be imported
into any JSP file and used with various scripting languages. (Sun)
- TAI
- See trust association interceptor.
- target service
- A service that exists outside of the gateway.
- TCP channel
- A type of channel within a transport chain that provides client applications
with persistent connections within a local area network (LAN).
- temporary file system (TFS)
- A temporary, in-memory physical file system that supports in-storage mountable
file systems. Normally, a TFS runs in the kernel address space, but it can
be run in a logical file system (LFS) colony address space.
- TFS
- See temporary file system.
- thin application client
- A lightweight, downloadable Java application run time capable of interacting
with enterprise beans.
- thin client
- A client that has little or no installed software, but has access to software
that is managed and delivered by network servers that are attached to it.
A thin client is an alternative to a full-function client, such as a workstation.
- thread
- A stream of computer instructions that is in control of a process. A multithread
process begins with one stream of instructions (one thread) and might later
create other instruction streams to perform tasks.
- throughput
- The measure of the amount of work performed by a device, such as a computer
or printer, over a period of time; for example, number of jobs per day.
- Time Sharing Option (TSO)
- An option of the MVS operating system that provides interactive time sharing
from remote terminals.
- Tivoli Performance Viewer
- A Java client that retrieves the Performance Monitoring Infrastructure
(PMI) data from an application server and displays it in various formats.
- TLS
- See Transport Layer Security.
- token
- A particular message or bit pattern that signifies permission or temporary
control to transmit on a network.
- transaction
- A specific set of input data that triggers execution of a specific processor
job; a message destined for an application program.
- transaction class
- An interface class that defines all of the methods that a business object
implements and that an application can use.
- transform algorithm
- A procedure that is used to transform the message for Web services security
message processing, such as the C14N (canonicalization) transform that is
used for XML digital signatures.
- transport
- The request queue between a WebSphere Application Server plug-in for Web
servers and a Web container in which the Web modules of an application reside.
When a user at a Web browser requests an application, the request is passed
to the Web server, then along the transport to the Web container.
- transport channel chain
- A specification of the transport channels that are used by a server for
receiving information. Transport channel chains contain end points.
- transport chain
- A representation of a network protocol stack that is operating within
an application server
- Transport Layer Security (TLS)
- An Internet Engineering Task Force (IETF)-defined security protocol that
is based on Secure Sockets Layer (SSL) and is specified in RFC 2246.
- trust anchor
- A trusted keystore file that contains a trusted certificate or a trusted
root certificate that is used to assert the trust of a certificate.
- trust association
- An integrated configuration between the security server of the product
and third-party security servers. A reverse proxy server acts as a front-end
authentication server, while the product applies its own authorization policy
onto the resulting credentials passed by the proxy server.
- trust association interceptor (TAI)
- The mechanism by which trust is validated in the product environment for
every request received by the proxy server. The method of validation is agreed
upon by the proxy server and the interceptor.
- trust file
- A file that contains signer certificates.
- trust relationship
- An established and trusted communication path through which a computer
in one domain can communicate with a computer in the other domain. Users in
a trusted domain can access resources in the trusting domain.
- trusted identity (ID) evaluator
- A mechanism that is used by a server to determine whether to trust a user
identity during identity assertion.
- truststore file
- A key database file that contains the public keys for that target server.
- TSO
- See Time Sharing Option.
- type
- (1) In Java programming, a class or interface. (2) In a Web Services Definition
Language (WSDL) document, a container for data type definitions using some
type system (such as XSD).
- type hierarchy
- The complete context for a Java class or interface including its superclasses
and subclasses.
- UDDI node
- A set of Web services that supports at least one of the Universal Description,
Discovery, and Integration (UDDI) APIs. A UDDI node consists of one or more
instances of a UDDI application running in an application server or a cluster
of application servers with an instance of the UDDI database.
- UDDI node initialization
- The process by which values are set in the Universal Description, Discovery,
and Integration (UDDI) database and the behavior of the UDDI node is established.
- UDDI node state
- A description of the current status of the Universal Description, Discovery,
and Integration (UDDI) node.
- UDDI policy
- A statement of the required and expected behavior of a Universal Description,
Discovery, and Integration (UDDI) registry that is specified through policy
values that are defined in the UDDI specification.
- UDDI property
- A characteristic or attribute that controls the behavior of a Universal
Description, Discovery, and Integration (UDDI) node.
- UML
- See Unified Modeling Language.
- Unified Modeling Language (UML)
- A standard notation for the modeling of a real-world object as a first
step in developing an object-oriented design methodology.
- Uniform Resource Identifier (URI)
- A compact string of characters for identifying an abstract or physical
resource.
- Uniform Resource Locator (URL)
- The unique address of a file that is accessible in a network such as the
Internet. The URL includes the abbreviated name of the protocol used to access
the information resource and the information used by the protocol to locate
the information resource.
- Universal Description Discovery and Integration (UDDI) registry
- A distributed registry of businesses and their service descriptions that
adhere to the Universal Description, Discovery, and Integration (UDDI) standard
for managing the discovery of Web services. UDDI registries come in two forms,
public and private, both of which are implemented in a common XML format.
- universally unique identifier (UUID)
- The 128-bit numerical identifier that is used to ensure that two components
do not have the same identifier. The identifier is unique for all space and
time.
- unmanaged node
- A node that is defined in the cell topology that does not have a node
agent that manages the process. An unmanaged node is typically used to manage
Web servers.
- URI
- See Uniform Resource Identifier.
- URL
- See Uniform Resource Locator.
- URL scheme
- The identification of an electronically accessible resource, the path
to that resource, and the resource name.
- user name token
- A type of token that is represented by a user name and optionally, by
a password.
- user registry
- A database of known users and user-provided information that is used for
authentication purposes.
- validation
- The checking of data or code for correctness or for compliance with applicable
standards, rules, and conventions.
- variable
- A configuration property that provides a parameter for any value in the
system. It has a name and a value to use in place of that name wherever the
variable name is located within the configuration files.
- vertical scaling
- The process of setting up multiple application servers on one machine,
usually by creating cluster members.
- view synchronous high-availability manager group
- A special class of high availability (HA) group that can be created and
used by components that require a certain virtual synchrony (VS) quality of
service (QoS) for group communication.
- virtual host
- A configuration enabling a single host machine to resemble multiple host
machines. Resources associated with one virtual host cannot share data with
resources associated with another virtual host, even if the virtual hosts
share the same physical machine.
- virtual machine
- An abstract specification for a computing device that can be implemented
in different ways in software and hardware.
- virtual private network (VPN)
- An extension of a company intranet over the existing framework of either
a public or a private network. A VPN ensures that the data that is sent between
the two endpoints of its connection remains secure.
- virtual synchrony (VS)
- A property of group communication that guarantees how messages are delivered
when the view changes, for example, when existing members fail or new members
join.
- VPN
- See virtual private network.
- VS
- See virtual synchrony.
- waiter
- A thread waiting for a connection.
- WAR
- See Web archive.
- WCCM
- See WebSphere Common Configuration Model.
- Web application
- An application that consists of one or more related servlets, JavaServer
Pages technology, and HyperText Markup Language (HTML) files that are managed
as a unit.
- Web archive (WAR)
- A compressed file format, defined by the J2EE standard for storing all
the resources required to install and run a Web application in a single file.
- Web browser
- A client program that initiates requests to a Web server and displays
the information that the server returns.
- Web component
- A servlet, JavaServer Pages (JSP) file, or a HyperText Markup Language
(HTML) file. One or more Web components make up a Web module.
- Web container
- A container that implements the Web component contract of the J2EE architecture.
(Sun).
- Web container channel
- A type of channel within a transport chain that creates a bridge in the
transport chain between an HTTP inbound channel and a servlet or JavaServer
Pages (JSP) engine.
- Web module
- A unit that consists of one or more Web components and a Web deployment
descriptor. (Sun)
- Web property extension (WPX)
- IBM extensions to the standard deployment descriptors for Web applications.
These extensions include Multipurpose Internet Mail Extensions (MIME) filtering
and servlet caching.
- Web resource
- Any one of the resources that are created during the development of a
Web application; for example, Web projects, HTML pages, JavaServer Pages (JSP)
files, servlets, custom tag libraries, and archive files.
- Web resource collection
- A list of URL patterns and HTTP methods that describe a set of resources
to be protected. (Sun)
- Web server plug-in
- A software module that supports the Web server in communicating requests
for dynamic content, such as servlets, to the application server.
- Web server separation
- A topology where the Web server is physically separated from the application
server.
- Web service
- A software system designed to support interoperable machine-to-machine
interaction over a network. It has an interface described in a machine-processable
format, specifically Web Services Description Language (WSDL).
- Web Services Description Language (WSDL)
- An XML-based specification for describing networked services as a set
of endpoints operating on messages containing either document-oriented or
procedure-oriented information.
- Web Services Invocation Framework (WSIF)
- A Java API that supports dynamic invoking of Web services, regardless
of the format in which the service is implemented or the access mechanism.
- WebSphere Common Configuration Model (WCCM)
- A model for programmatic access to configuration data used by the WebSphere
Application Server tooling, run time, and administrative console.
- wizard
- An active form of help that guides users through each step of a particular
task.
- work manager
- A thread pool for Java 2 Platform Enterprise Edition (J2EE) applications.
- work object
- A type of asynchronous bean that applications implement to run code blocks
asynchronously.
- workflow
- The sequence of activities performed in accordance with the business processes
of an enterprise.
- workload management
- The optimization of the distribution of incoming work requests to the
application servers, enterprise beans, servlets and other objects that can
effectively process the request.
- workspace
- A temporary repository of configuration information that administrative
clients use.
- World Wide Web Consortium (W3C)
- An international industry consortium set up to develop common protocols
to promote evolution and interoperability of the World Wide Web.
- WPX
- See Web property extension.
- wrapper
- An alternate and supported interface that hides unsupported data types
required by a server object behind a thin intermediate server object.
- WSDL
- See Web Services Description Language.
- WSIF
- See Web Services Invocation Framework.
- X.509 certificate
- A certificate that contains information that is defined by the X.509 standard.
- X/Open XA
- The X/Open Distributed Transaction Processing XA interface. A proposed
standard for distributed transaction communication. The standard specifies
a bidirectional interface between resource managers that provide access to
shared resources within transactions, and between a transaction service that
monitors and resolves transactions.
- XML
- See Extensible Markup Language.
- XML digital signature
- A specification that defines the XML syntax and the processing rules to
sign and verify the digital signatures for the digital content.
- XML encryption
- A specification that defines how to encrypt the content of an XML element.
- XML parser
- A program that interprets the contents of an XML file and determines what
to do with the input.
- XML token
- A security token that is in an XML format, such as a Security Assertion
Markup Language (SAML) token.
- zip
- One or more files compressed and stored in a single file with a name ending
in .zip.
Various Java definitions reprinted with permission from SUN Microsystems,
Inc.