Index: A
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: A
- abstract object interfaces: 1.3.2. Abstract Interfaces
- acceptMove( ): 6.4. Fixed Protocols
- access control lists: 5.3.1. Access Control Lists
- AccessDecision class: B.3.2. Security Model
- AccessException: D.1. The java.rmi Package
- Acl interface: 5.3.1. Access Control Lists
- AclEntry class: 5.3.1. Access Control Lists
- activation, dynamic: 3.3.2. Object Manager
- adaptable message protocols: 6.5. Adaptable Protocols
- addAgent( ): 9.3.1. Building the Infrastructure with Message Passing
- addEntry( ): 5.3.1. Access Control Lists
- addHandler( ): 6.6.2. Distributed Events
- addMessageType( ): 6.5.4. An Adaptable Message Handler
- addPageElements( ): 8.5.2. Web Browsing
- addPermission( ): 5.3.1. Access Control Lists
- addresses, IP: 2.1.1. IP Addressing
- addSample( ): 8.4. Monitoring Bandwidth
- agents
- AgentConnection class (example): 9.3.1. Building the Infrastructure with Message Passing
- AgentHandler class (example): 9.3.1. Building the Infrastructure with Message Passing
- identities for: 5.3. Identities and Access Control
- 9.3.1. Building the Infrastructure with Message Passing
- collaboration and: 9.2.2. Maintaining Agent Identities
- managing: 5.2.2. The Core Security API
- verifying: 5.1. Security Issues and Concerns
- 5.5.5. Distributing Certified Public Keys
- imposter: 5.1. Security Issues and Concerns
- algorithms, cryptographic: 5.2.1.1. The User API
- 5.7. Choosing a Cryptographic Algorithm
- Diffie-Hellman technique: 5.4.2. Public Key Methods
- 5.4.2. Public Key Methods
- 5.7.2.1. Encryption techniques
- DSA: 5.2.1.1. The User API
- 5.7.2.1. Encryption techniques
- presently available: 5.7.2. Available Algorithms
- RSA public key encryption: 5.7.2.1. Encryption techniques
- AlreadyBoundException: D.1. The java.rmi Package
- applets: A. Using the Examples in Applets
- downloading support classes for: A.2. Class Downloads
- applications
- collaborative (see collaborative systems)
- distributed (see distributed applications)
- assignmentsFor( ): 7.2.4. JDBC-Enabled Data Objects
- asymmetric encryption techniques: 5.4.2. Public Key Methods
- 5.6.1. Ciphers for Secure Data Transfers
- asynchronous
- agents: 4.4.1. Asynchronous Agents
- communications, CORBA Event Service for: B.2. Event Service
- message handling: 6.3.1. Asychronous vs. Synchronous Message Handling
- message passing: 6.3.2. A Basic Message Processor
- audio, streaming (example): 8.5.1. Streaming Multimedia
- AudioConsumer class (example): 8.5.1. Streaming Multimedia
- AudioProducer class (example): 8.5.1. Streaming Multimedia
- AuditChannel interface: B.3.2. Security Model
- AuditDecision interface: B.3.2. Security Model
- auditing transactions (CORBA): B.3.1. Service Types
- audit_needed( ): B.3.2. Security Model
- authenticate( ): 5.5.3. An Authenticating Credit Agent
- 5.6.2. Back to Our Credit Agent
- authentication: 1.3.6.2. Secure remote transactions
- AuthAgent client (example): 5.5.3. An Authenticating Credit Agent
- 5.6.2. Back to Our Credit Agent
- AuthCreditAgent client (example): 5.5.3. An Authenticating Credit Agent
- CORBA Security Service for: B.3.1. Service Types
- digital signatures (see digital signatures)
- one-, two-, many-way: 5.7.1.3. One-, two-, and many-way cryptography
- PGP for: 5.7.3.2. Pretty Good Privacy (PGP)
- presently available techniques for: 5.7.2.2. Certificates and authentication techniques
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.