Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

C# programming language

     consuming Web services, porting .NET applications to Java EE

     defining data classes

     rewriting code in Java

C# Web service, porting .NET applications to Java EE

callback [See automatic callback strategy (asynchronous Web services).]

CAS (Code Access Security) 2nd

CertPath API

Chain of Responsibility pattern

channels (.NET Remoting)

class libraries

     .NET Framework

     porting .NET application to Java

class loader (Java security)

client-activated objects in .NET Remoting

clients

     Dynamic Invocation Interface client

     Dynamic Proxy client

     JAX-RPC client types

closing connections

     .NET database connectivity

     Java database connectivity

CLR (Common Language Runtime)

     security in

clustering

CMP (Container-Managed Persistence)

CMT (Container-Managed Transaction) demarcation

Coarse-Grained Transaction Facade pattern

Code Access Security (CAS) 2nd

code level interoperability

code source (Java security)

code-access permissions

COM Interop

COM, disadvantages of

Common Language Runtime (CLR)

     security in

communication (asynchronous Web services)

Compensating Asynchronous Request Handler pattern

Compensating Transaction Handler pattern

compiling Java programs

compliance, security interoperability for

confidentiality (security threat)

configuration management

     bridging solutions

     example scenario

     integration strategy comparison

     platform unification strategy 2nd

     Web services management strategy

configuration-based programming

connected model (ADO.NET)

connection pooling

     .NET database connectivity

     Java database connectivity

Connector Architecture (Java EE)

consistency (transactions)

consumer-centric reliability

consuming Web services

Container Managed Persistence (CMP)

container-based security in Java

container-managed persistence

Container-Managed Transaction (CMT) demarcation

CORBA [See also IIOP.NET.]

     benefits of

     limitations of

custom mappings (IIOP.NET)

Категории