Glossary
— A —
abort
Terminate a transaction in such a way that the values assigned to all protected resources, such as database records, are unchanged from the beginning of the transaction.
absolute OID
(CORBA) An object identifier (OID) that specifies a unique path to a managed object from the root of the OID tree.
Abstract Syntax Notation One (ASN.1)
A formal notation used to define data types and encode data values. A language that describes the data structures that make up an abstract syntax. ITU-T (formerly CCITT) specification X.409 is equivalent to ASN.1. ASN.1 Distinguished Encoding Rules (DER) object identifiers are used in public key interface (PKI) security programming.
access control list (ACL)
A BEA Tuxedo security feature that controls client access to services, objects, and methods by means of lists of clients that are authorized to receive specific services or invoke specific objects and methods. When ACL security is being used, the BEA Tuxedo system checks the appropriate list whenever a client requests a service, to determine whether the client is authorized to access the service.
Access Decision object
(CORBA) The object in the security infrastructure of a CORBA application that enforces the checking of authorized access before a request to the target object is delivered.
access machine
The processor within the administrative domain of an application at which a client first accesses the system. For a native client, this is the processor on which it is running. For a Workstation client, this is the site at which it contacts the application.
ACID properties
The essential characteristics of transaction processing systems include the following:
ACL
See access control list (ACL).
activate
(ATMI) To move a server from the inactive (unavailable) state to the state in which it is up and running (active).
(CORBA) To prepare an object for execution.
activation policy
(CORBA) The policy that determines the in-memory activation duration for a CORBA object.
See also activate, CORBA object, and policy.
active object
(CORBA) A running instance of an object interface.
See also active object map, client application, CORBA object, object ID (OID), object reference, Portable Object Adapter (POA), and servant.
active object map
(CORBA) A table maintained by a POA and the TP Framework that maps the association of object IDs to servants.
See also object ID (OID), Portable Object Adapter (POA), and servant.
active server
A BEA Tuxedo server that is either processing a service request or is available to do so.
ActiveX
(CORBA) ActiveX controls are components that use Component Object Model (COM) technologies to provide interoperability with other COM services and components.
See Component Object Model (COM).
ActiveX client
(CORBA) A component that provides interoperability between a CORBA domain and the ActiveX object system. The ActiveX Client translates into ActiveX methods the interfaces of CORBA objects that are located in the CORBA domain.
The ActiveX Client has two components: the BEA Application Builder and the Object Bridge.
See also ActiveX, BEA Application Builder, domain, and Object Bridge.
ADE
See application development environment (ADE).
AdminAPI
administrative API
An application programming interface for writing programs that configure and control a BEA Tuxedo application by setting and changing attribute values in the Management Information Base (MIB). It can be used by both ATMI and CORBA programmers.
administrative domain
That portion of an application that is actively administered at run time by a Bulletin Board Liaison (BBL) process. It does not include workstations or host processors.
administrator
The person who installs the BEA Tuxedo system, configures and monitors a BEA Tuxedo application, and updates application information, such as computer names and locations.
advertised
A service is advertised when a service table entry exists for it in the BEA Tuxedo bulletin board. When a Domains gateway server is booted, it advertises all the remote services that it is importing from remote domains in the bulletin board of the local domain (that is, the domain on which the gateway server is booted). After a remote service is advertised by a domain gateway server, it remains advertised until either an unadvertise command is issued or a MIB request removes the service.
AEQ
See application entity qualifier (AEQ).
AET
See application entity title (AET).
agent
agent-manager model
A model where a manager communicates with many distributed agents through a system management protocol.
alarm
A means of reporting that a managed object is in an abnormal state (that is, a managed object has passed a predefined threshold).
allocation
The assignment of various types of programs and record categories for system storage locations, such as main storage or disk storage.
alternate facility
In distributed transaction programming, a session that a transaction obtains by means of an ALLOCATE command.
alternate remote domain
A remote domain that is used when a primary remote domain is unavailable.
AP
API
See application programming interface (API).
applet
An interactive Java program that can be run via a Web page displayed by a Java-capable browser. An applet enhances the Web page's display or enables the user to complete a task.
application
A business program, built around the BEA Tuxedo system, that is defined and controlled by a single BEA Tuxedo configuration file, and that is administered as a single entity. Such an application may comprise one or more clients (local or remote), one or more servers, and one or more machines. At a minimum, a BEA Tuxedo application includes one machine, one server, and one client. Also referred to as a BEA Tuxedo domain.
Multiple BEA Tuxedo applications can communicate with each other through a domain gateway group.
Note: In this context, the term business program is defined as a set of one or more programs that work together. Similarly, in conversation the term application is often used loosely: it may refer to a standalone program or to a set of programs that work together to accomplish a particular business objective.
See TUXCONFIG file and UBBCONFIG file.
application association
The association between a process and a BEA Tuxedo application (domain). A multicontexted process may have associations with multiple BEA Tuxedo domains. It may also have multiple associations with the same domain.
application code
Code that is written by the user, as opposed to system code that is provided by BEA Systems, Inc.
application context
(ATMI) A reference to a particular application association. In the BEA Tuxedo system, an application context is set via an explicit call and is then used implicitly by subsequent ATMI calls. Thus, in an implicit context interface, the terms application context and default context are often used interchangeably.
application context name (ACN)
A set of rules that govern associations between application entities.
application-controlled deactivation
(CORBA) A feature used with the process activation policy to keep an object active in memory until the application explicitly deactivates the object by invoking the TP::deactivateEnable() operation on that object.
application development environment (ADE)
A set of tools (often presented or accessed via a GUI) to help programmers build applications.
application entity
A set of software components that make up a distributed transaction processing application on one computer system.
application entity qualifier (AEQ)
The locally unique component of a title that is used to identify an OSI TP application entity.
application entity title (AET)
The globally unique component of the title that is used to identify an OSI TP application entity.
application framework
The software that provides the infrastructure that makes it possible for sets of applications or other software components to work together.
application program (AP)
A single instance of a user program that performs one or more specific tasks. An AP defines transaction boundaries and accesses resources within those boundaries; it interacts with other system components using interfaces specified in the X/Open Distributed Transaction Processing model. An AP is a single thread of control involved in, at most, one global transaction at any time.
application programming interface (API)
Application-to-Transaction Monitor Interface (ATMI)
The Application-to-Transaction Monitor Interface is the application programming interface to the BEA Tuxedo system. It includes transaction routines, message handling routines, service interface routines, and buffer management routines.
architecture
ASN.1
See Abstract Syntax Notation One (ASN.1).
asymmetric algorithm
An encryption algorithm that has two keys: a public key and a private key. The public key can be distributed openly while the private key is kept secret. Asymmetric algorithms may be capable of a number of operations, including encryption, digital signatures, and key agreements.
asymmetric outbound IIOP
asynchronous
An event that occurs at a time that is unrelated to the time at which another event occurs. The two events are mutually asynchronous. The relationship between the times at which they occur is unpredictable.
asynchronous connections
Virtual circuits set up to execute independently of each other, that is, asynchronously. An asynchronous connection does not block the processing of working circuits while attempts are being made to reconnect failed circuits. The BRIDGE allows the use of nonfailing network paths by listening and transferring data using multiple network address endpoints.
asynchronous process
A process that executes independently of another process. When a request is processed asynchronously, the client application continues to perform other operations while it waits for the service request to be filled.
asynchronous request
A request that lets the client do other work while the request is being processed, enhancing parallelism within an application.
ATMI
See Application-to-Transaction Monitor Interface (ATMI).
atomic set
A behavior of SNMP agents that operates as follows: When an SNMP agent receives an SNMP set request that contains more than one variable, the agent either sets all requested objects or sets none. This behavior is a requirement of the SNMP standard.
attribute
(CORBA) An identifiable association between an object and a value.
When using OMG IDL, that part of an OMG IDL interface that is similar to a public class field or data member. The compiler maps an OMG IDL attribute to accessor and modifier methods in either the C++ or Java programming language. For example, an interface ball might include the attribute color. The idltojava compiler would generate a C++ or Java programming language method to get the color, and, unless the attribute is read-only, would generate a method to set the color. CORBA attributes correspond closely to JavaBeans properties.
See CORBA object and object.
auditing
A security mechanism that involves saving a secure, tamper-resistant record of requested system operations, along with the identity of the requesting party.
audit trail
A manual or computerized means for tracing the transactions affecting the contents of a record.
authentication
The process used by the server to verify the identity of an entity, such as a user or a process, before allowing that user or process to join an application. This process relies on the use of passwords and other security mechanisms.
authorization
The process of determining which services may be accessed by a particular entity, such as a user or a process, and giving the entity permission to access those services.
autoinstall
A method of creating and installing terminal definitions dynamically (that is, as terminals log on) and deleting them when logging off.
auto-spawning
The creation, by a BEA Tuxedo application server, of new threads to handle messages as they are received. The number of new threads that can be created is restricted by a configurable limit.
availability
Features of transaction processing systems that contribute to the smooth, continued systems operation in the presence of failures.
— B —
backup
The act of a resource manager in using a log to restore resources to some predetermined state by applying log entries sequentially to the resource until the desired state has been achieved.
bandwidth
The transmission capacity of a computer or communications channel.
BBL
See Bulletin Board Liaison (BBL).
BEA ActiveX Client
BEA Administration Console
A Web-based, graphical user interface for the remote administration of BEA Tuxedo applications (running in either ATMI or CORBA environments). It is delivered as a Java applet that you can download into your Internet browser.
BEA Application Builder
(CORBA) A feature that creates ActiveX bindings for CORBA interfaces.
See also ActiveX, binding, and conversation.
BEA Transaction Processing
See transaction processing (TP).
BEA Tuxedo-ASP Connectivity
(ATMI) Formerly JoltWAS for IIS.
BEA Tuxedo-JSE Connectivity
(ATMI) Formerly JoltWAS for Servlet.
BEA Tuxedo-WebLogic Connectivity
Formerly JoltWAS for WebLogic. A customized version of BEA Tuxedo-JSE Connectivity for WebLogic.
BEA Tuxedo application
BEA Tuxedo Bulletin Board
BEA Tuxedo client
BEA Tuxedo domain
A BEA Tuxedo domain consists of a BEA Tuxedo application running one or more business applications. A single domain is defined in one configuration file and is administered as a single entity. A domain can be connected to other BEA Tuxedo domains through the Domains feature.
See also domain, TUXCONFIG file, and UBBCONFIG file.
BEA Tuxedo Domains
A BEA Tuxedo component that extends the BEA Tuxedo system client/server model to provide transaction interoperability across TP domains. This extension preserves the client/server model and the ATMI interface by making access to services on a remote domain (and service requests from a remote domain) transparent to both the application programmer and user.
BEA Tuxedo server
A program that performs a task requested of it by a client application.
BEA Tuxedo system
A robust e-commerce platform from BEA Systems, Inc. for developing and deploying business-critical client/server applications. It handles distributed transaction processing, application messaging, and the full complement of services necessary to build and run enterprise-wide applications.
BEA Wrapper Callbacks API
(CORBA) An application programming interface designed to simplify the implementation of callback objects for CORBA joint client/server applications. The API provides specific methods for defining, starting, stopping, and destroying callbacks objects.
See also application programming interface (API), Callbacks Wrapper object, CORBA callback object, and joint client/server application.
bidirectional outbound IIOP
bind
(CORBA) The process of associating a name with an application object or a naming context object. Also used to describe the process of connecting a client application to an application object.
binding
(CORBA) In the BEA ActiveX Client, the association of the interface of a CORBA object to another object system, such as an ActiveX object system.
See ActiveX, BEA ActiveX Client, CORBA object, and object.
bitmap
In temporary storage, a control block used by intrapartition transient data to show the VSAM control intervals that have been used and are available. It is updated whenever a control interval or track is assigned to or released from a destination.
blocking
The process of combining two or more records into one block.
blocking mode
A synchronous style of message delivery, where a program must wait for an action to complete before the program can proceed. Contrast with nonblocking mode.
Bootstrap environmental object
(CORBA) The object that brings a CORBA application into a BEA Tuxedo domain and provides initial object references to that application. Every CORBA client or server application that interacts with a BEA Tuxedo domain needs a Bootstrap environmental object.
See environmental object, object, object reference, and CORBA domain.
bootstrapping
(CORBA) The process of setting up an application to interact with CORBA objects that are located within a BEA Tuxedo domain.
See also Bootstrap environmental object, CORBA object, and CORBA domain.
BRIDGE
The BEA Tuxedo system process that maintains virtual circuits to other nodes participating in an application for the purpose of transferring application messages between the nodes.
broadcast
To send the same message to every node on a network.
broker
A system-level entity whose role is to maintain subscriptions and to cause subscribers' actions to occur when events are posted.
buffer types
An abstract name for a message type. BEA Tuxedo provides predefined types for message communication: FML, VIEW, STRING, CARRAY, and XML. These buffer types are transparently encoded and decoded across a network of heterogeneous machines. Applications can define additional types.
bulletin board
A collection of shared data structures designed to keep track of a running BEA Tuxedo system application. It contains information about servers, services, clients, and transactions pertaining to a BEA Tuxedo application. The bulletin board is replicated on each logical native (non-foreign) machine in the application.
Bulletin Board Liaison (BBL)
A BEA Tuxedo administrative process responsible for maintaining a copy of the bulletin board on a particular processor. When the system is running, one BBL process runs continuously on each logical machine in the application.
business object
(CORBA) An application-level component that can be used in combinations that may not be defined ahead of time. A business object is independent of any single application and represents a recognizable, everyday-life entity, such as a document processor. A business object is a self-contained deliverable that has a user interface and a state, and that can cooperate with other separately developed business objects to perform a desired task.
byte
A sequence of eight adjacent bits that are operated on as a unit.
— C —
C++
An object-oriented programming language developed at AT&T Bell Laboratories in the early 1980s. C++ is a "hybrid" language based on the non-object-oriented C language.
cache
A subset of memory that contains copies of the frequently accessed parts of a larger memory.
callback method
A method that is implemented by application code and that is invoked by system code when needed to perform a specific function. Callback methods are never intended to be invoked directly by application code.
See also application code and metadata interface.
Callbacks Wrapper object
(CORBA) An object implemented to support callbacks on CORBA joint client/server applications using the BEA Wrapper Callbacks API.
See BEA Wrapper Callbacks API, callback method, CORBA callback object, joint client/server application, and object.
CARRAY buffer
A data structure that is an array of characters any of which can be the null character. The interpretation of the array is entirely application dependent.
catalog
CCR
The Commitment, Concurrency, and Recovery OSI standard.
certificate
A digital statement that associates a particular public key with a name or other attributes. The statement is digitally signed by a certificate authority (CA). By trusting that authority to sign only true statements, you can trust that the public key belongs to the person named in the certificate.
See also certificate authority (CA).
certificate authentication
A method that provides confident identification of a client by a server through the use of digital certificates. Certificate-based authentication is generally preferred over password-based authentication because it is based on what the user has (the private key) as well as what the user knows (the password that protects the private key).
See authentication and certificate.
certificate authority (CA)
A well-known and trusted entity that issues public key certificates. A certificate authority attests to a user's real-world identity, somewhat like a notary public.
channel
A functional unit, controlled by a processor, that handles the transfer of data between the processor and local input/output devices.
cipher
In cryptography, a coding system used to create encrypted messages.
cipher suite
An SSL encryption method that includes the key exchange algorithm, the symmetric encryption algorithm, and the secure hash algorithm used to protect the integrity of the communication.
See also Secure Sockets Layer (SSL).
ciphertext
In cryptography, text that is encrypted.
class
(CORBA) In Java, a type that defines the implementation of a particular kind of object. A class definition defines instances and class variables and methods, and specifies the interfaces and class implementations and the immediate superclass of the class. If the superclass is not explicitly specified, the superclass will implicitly be Object.
See also IDL interface, instance, Java, metadata interface, and object.
class library
A set of client programming tools. These tools can be used in a Java or C++ program or Web page-embeddable Java applet.
client
(ATMI) A program that performs the following steps:
1. Collects, through a user interface, requests for services from users.
2. Transmits those requests to servers.
3. Receives the servers' responses and passes them to the users.
If a client is located on a machine that is part of the domain to which the target servers belong, then the client is called a native client. If the client is located on a machine that is outside that domain, then the client is called a remote client or a Workstation client. Remote clients communicate with servers through the BEA Tuxedo Workstation component.
(CORBA) Any code that invokes an operation on a distributed object.
See also application, server, and Workstation.
client application
A program, written for use with the BEA Tuxedo software, that requests services from other applications.
Client Data Caching design pattern
(CORBA) The design pattern that provides increased performance for client applications by caching server application data on the machine on which the client application resides, thereby avoiding repeated remote calls to retrieve data.
client naming
A BEA Tuxedo feature that enables client programs to carry both usernames and client name values.
client program
client/server
client/server computing
A programming model in which application programs are structured as clients or servers to achieve distributed processing. A client program is an application program that requests services to be performed. A server program is an entity that dispatches service routines to satisfy requests from client programs. A service routine is an application program module that performs one or more specific functions on behalf of client programs.
Client/server computing can be configured in a 2-tier or a 3-tier structure. A 2-tier configuration consists of only the client and the server. A 3-tier configuration includes a client, a server, and an intermediate level that acts as a router or a broker.
closed framework
A software infrastructure in which developers cannot remove and replace software components easily in a plug-and-play fashion.
CMIP
See Common Management Interface Protocol (CMIP).
columnar object
A MIB leaf object—that is, a MIB object that does not have any objects below it in the OID tree—which can have zero or more instances. A columnar object represents one column in a table.
COM
See Component Object Model (COM).
COM view
(CORBA) A representation of an object that conforms to the Component Object Model (COM) standards, including implementations of all necessary interfaces.
See also Component Object Model (COM), interface, and object.
command-line interface
A style of user interface that allows user interaction by entering commands at a system prompt.
commit
Common Management Interface Protocol (CMIP)
An protocol for network management defined by ISO standards.
Common Object Request Broker Architecture
compact disc-read only memory (CD-ROM)
A disk from which data is read optically by laser and on which the data cannot be modified except under special conditions.
component
Part of an application.
Component Object Model (COM)
(CORBA) A collection of services that let software components interoperate in a networked environment.
See also COM view, conversation, and object.
concurrency
The simultaneous execution of more than one function or process.
concurrent
Pertaining to the occurrence of two or more activities within a given interval of time. Concurrent processes can alternately use shared common resources.
configuration
The set of hardware, hardware options, software, and software setup on a computer or on a network.
configuration set
The name or the number used to reference a particular configuration in a configuration partition. Each configuration set describes the services to be used when the configuration is active.
configure
To customize hardware and software for a computer or for a network.
connection
A half-duplex communication channel between processes.
connection-oriented communication
Communication between two BEA Tuxedo system processes over a connection.
consistent state
A condition in which shared data is correct and valid.
constructor
(CORBA) A pseudo-method that creates an object. In Java, constructors are instance methods with the same name as their class. Java constructors are invoked using the new keyword.
See also class, instance, Java, metadata interface, and object.
conversation
A dialog over a connection.
conversational
Communication characterized by one or more messages exchanged by a requestor and a server such that the server remains dedicated to the communication until the termination of the exchange.
conversational communication
conversational server
A server that offers services that require a connection to have a conversation with the requester. The conversation follows an application-established protocol. A conversational service must conform to the startup and termination rules of BEA Tuxedo system services.
conversational service
A service routine that is invoked by means of conversational communication from a client program. When the connection is established and the service is invoked, the client and service exchange data in a manner specific to the application. When the service returns, the connection ends.
CORBA
(CORBA) Common Object Request Broker Architecture. A multivendor standard published by the Object Management Group for distributed object-oriented computing.
CORBA callback object
(CORBA) A CORBA object supplied as a parameter in a client application's invocation on a target object. The target object can make invocations on the callback object either during the execution of the target object or at some later time (even after the invocation on the target object has been completed). A callback object might be located inside or outside a BEA Tuxedo domain.
See also client application, CORBA object, and BEA Tuxedo domain.
CORBA client stub
When using CORBA objects, a file created by the IDL compiler when you compile an application's OMG IDL statements. The client stub contains code that is generated during the client application build process. The client stub maps OMG IDL operation definitions for an object type to the methods in the server application that the BEA Tuxedo domain calls when it invokes a request. The code is used to send the request to the CORBA server application.
When using OMG IDL, a C++ or Java programming language class created by the compiler and used transparently by the client ORB during object invocation. The remote object reference held by the client points to the client stub. This stub is specific to the IDL interface from which it was generated, and contains the information needed for the client to invoke a method on the CORBA object defined in the IDL interface.
See also metadata interface, OMG IDL, skeleton, and BEA Tuxedo domain.
CORBA domain
A collection of CORBA or ATMI servers, services, interfaces, machines, and associated resource managers defined by a single UBBCONFIG (ASCII version) or TUXCONFIG (binary version) configuration.
See also TUXCONFIG file and UBBCONFIG file.
CORBA foreign client application
(CORBA) A client application that is implemented on an ORB that is not a product of BEA Systems, Inc. The ActiveX Client component of the CORBA software is not a foreign client application. Although the client is implemented on a Microsoft product, the ORB is provided by BEA Systems, Inc.
See BEA ActiveX Client and ORB.
CORBA interface
(CORBA) A set of operations and attributes. A CORBA interface is defined by using OMG IDL statements to create an interface definition. The definition contains operations and attributes that can be used to manipulate an object.
See also attribute, interface, object, OMG IDL, and operation.
CORBA native client application
(CORBA) A client application that invokes operations defined in OMG IDL statements to talk to CORBA server applications. Relative to the CORBA domain to which the server applications belong, a client application is either native (that is, local) or remote. Remote and native client applications are the same. Their requests are handled differently and transparently, depending on whether or not the applications are collocated on a machine that is running in the CORBA domain. CORBA native client applications are always collocated on a machine in the CORBA domain.
See also CORBA domain, CORBA foreign client application, CORBA remote client application, CORBA server application, and OMG IDL.
CORBA object
(CORBA) An entity that complies with the CORBA standard upon which operations are performed. An object is defined by its interface.
See also interface, object, and operation.
CORBA ORB
(CORBA) Any Object Request Broker (ORB) that complies with the CORBA standard. A CORBA ORB is a communications intermediary between client and server applications that are distributed across a network. The ORB used in BEA Tuxedo applications is a CORBA ORB.
CORBA remote client application
(CORBA) A client application that invokes operations defined in OMG IDL statements to talk to remote CORBA server applications using IIOP. Remote and native client applications are the same. Their requests are handled differently and transparently, depending on whether or not the applications are collocated on a machine that is running in the CORBA domain. CORBA remote client applications are typically not located on a machine that is running in the CORBA domain. In particular, the ActiveX Client component of the CORBA software is a remote client application.
See BEA ActiveX Client, IIOP, OMG IDL, CORBA domain, CORBA foreign client application, and CORBA native client application.
CORBA server application
(CORBA) A program that performs a task requested of it by a client application and that is written to be used with the BEA Tuxedo CORBA software.
CORBA TP framework
(CORBA) Run-time library of default implementations that the CORBA server application build procedure links to the server application executable image. The Transaction Processing (TP) Framework consists of a set of convenience functions that make it easy for you to write code that does the following:
Initializes the server application and executes startup and shutdown routines.
Ties the server application to CORBA domain resources.
Manages objects, bringing them into memory when needed, flushing them from memory when no longer needed, and managing reading and writing of data for persistent objects.
Performs object housekeeping.
See CORBA domain and CORBA server application.
CORBAfacilities
(CORBA) The adopted OMG Common Facilities. Common Facilities provide horizontal end-user-oriented frameworks that are applicable to most applications, and are defined in OMG IDL.
CORBAservices
(CORBA) A set of system services for objects that were developed for the programmer. These services, defined in OMG IDL by the OMG, can be used to create objects, control access to objects, track objects and object references, and control the relationship between types of objects. Programmers can call object service functions instead of writing and calling their own private object service functions.
See also CORBA object, CORBAservices Life Cycle Service, CORBAservices Naming Service, CORBAservices Object Transaction Service (OTS), CORBAservices Security Service, object, object reference, and OMG IDL.
CORBAservices Life Cycle Service
(CORBA) The CORBAservice that defines conventions for creating, deleting, copying, and moving objects.
See also CORBAservices and object.
CORBAservices Naming Service
(CORBA) The CORBAservice that provides the ability to associate a name to an object relative to a naming context.
See also CORBAservices and object.
CORBAservices Object Transaction Service (OTS)
(CORBA) The CORBAservice that provides transaction semantics to ensure the integrity of data in the system.
CORBAservices Security Service
(CORBA) The CORBAservice that defines identification and authentication of principals, authorization and access control, security auditing, security of communication between objects, nonrepudiation, and administration of security information.
See also authentication, authorization, Callbacks Wrapper object, and object.
core class
(CORBA) A public class (or interface) that is a standard member of the Java platform. The intent is that the Java core classes, at a minimum, are available on all operating systems on which the Java platform runs.
See also class, interface, and Java.
credentials
Information that describes the security attributes (identity and/or privileges) of a user or other principal. Credentials are claimed through authentication or delegation and are used by access control.
Credentials object
(CORBA) The object that holds the security attributes of a principal. These security attributes include the principal's authenticated or unauthenticated identities. The Credentials object also contains information for establishing security associations. The Credentials object provides methods to obtain the security attributes of the principals it represents.
See also attribute, metadata interface, and object.
cryptography
The art of protecting information by transforming it (encrypting it) into an unreadable format, called ciphertext. Only those who possess a secret key can decipher (or decrypt) the message into plaintext.
See also ciphertext and plaintext.
CSI
The API for the BEA TOP END system.
current context
(ATMI) Clients may initialize to multiple contexts; however, at any given time, in any particular thread, only one of these contexts may be the current context.
(CORBA) A special type of ORB object that is used to communicate between a user application and a specialized built-in service.
See also CORBA ORB, object, SecurityCurrent, and TransactionCurrent.
Custom GUI element
(ATMI) A Java GUI class that communicates with JoltBeans. The means of communication can be JavaBeans events, methods, or properties offered by JoltBeans.
— D —
daemon
A system process that runs in the background.
DASD
See Direct Access Storage Device (DASD).
database
A collection of interrelated or independent data items stored together without redundancy to serve one or more applications.
database management system (DBMS)
A program or set of programs that lets users structure and manipulate the data in the tables of a database. A DBMS ensures privacy, recovery, and integrity of data in a multi-user environment.
data-dependent routing
Data Encryption Standard (DES)
A symmetric key algorithm adopted by the U.S. government in 1976 as a standard encryption-decryption system for unclassified data in the United States. Several types of DES are offered, including DES-CBC and two-key triple-DES.
data independence
The ability to request data by a high-level data-management method without concern as to how the data is stored or retrieved.
data transfer protocol
A set of rules for transforming data of a particular buffer type from one representation into another.
DB2
IBM relational database.
DBBL
See Distinguished Bulletin Board Liaison (DBBL).
DBMS
See database management system (DBMS).
DDE
See Dynamic Data Exchange (DDE).
DDE conversation
The sending and receiving of DDE messages between a client application and a server application.
deadlock
decoding
The conversion of encoded data back to the native format.
decryption
The process of restoring encrypted data to its original form.
decryption private key
An algorithm that reverses the work of the encryption algorithm.
default
The value assumed by a program if a value is not supplied by the user.
default context
A BEA Tuxedo application association that is referenced by subsequent ATMI calls if tpsetctxt() is not called. The default context may differ from thread to thread. This term is often used interchangeably with application context.
deferred synchronous communication
A form of asynchronous communication in which one piece of software can send a message to another piece of software, and then continue to work and retrieve the reply to the message at some later time.
deployment
The process of placing an application in a distributed environment and making the application available for use. Deployment can include such tasks as installation, configuration, and administration of various parts of the application.
DES
See Data Encryption Standard (DES).
design document
The document written by the system integrator that explains the overall design of the application or the framework to be built.
design pattern
A document that encapsulates, in a structured format, solutions to design problems. Design patterns are guides to good design practices.
See also Client Data Caching design pattern and Process-Entity design pattern.
desktop client
(CORBA) A CORBA client application that operates on a Microsoft desktop platform, such as Windows NT or Windows 95. Desktop client applications use the Component Object Model (COM) and communicate with the BEA Tuxedo domain by using the ActiveX Client to translate between COM and CORBA.
See also ActiveX client, Component Object Model (COM), conversation, and application.
dialog
A process of sending and receiving information.
digital certificate
An electronic file used to identify individuals and resources over networks such as the Internet. A digital certificate securely binds the identity of an individual or resource, as verified by a trusted third party known as a Certificate Authority, to a particular public key. Because no two public keys are ever identical, a public key can be used to identify its owner.
BEA Tuxedo public key security recognizes certificates that comply with X.509 version 3.0.
digital signature
A digital code, attached to an electronically transmitted message, that uniquely identifies the sender and that can, therefore, be used to authenticate the identity of the sender. When a message is authenticated, verification is provided that: (1) the message is genuine; (2) the message has arrived exactly as it was sent; and (3) the message has come from the stated source.
Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes. The recipient of signed data can use a digital signature to prove to a third party that the signature was, in fact, generated by the signatory. When such proof is provided, the signed data is protected by nonrepudiation: the signatory cannot, at a later time, deny authorship of the signature.
digital signature algorithm
An algorithm that transforms a message of any length to a digital signature in such a way that it is computationally infeasible to (1) find two messages with the same digital signature, (2) produce a message from a given, predetermined digital signature, or (3) find the digital signature of a given message without knowledge of the sender's private key. Typically, a digital signature algorithm is implemented by computing a message digest on the message, then encrypting the message digest with the sender's private key.
An example of a digital signature algorithm is DSA.
DII
See Dynamic Invocation Interface (DII).
Direct Access Storage Device (DASD)
A disk, disk drive, or group of disks or drives on an IBM machine.
Distinguished Bulletin Board Liaison (DBBL)
A BEA Tuxedo administrative process that runs on the MASTER node of the application and communicates with BBLs to coordinate updates to the bulletin board.
Distinguished Name (DN)
(CORBA) A distinguished name (DN) is an entry in the Directory Information Tree (DIT) that uniquely identifies an object in an X.500 directory.
distributed application
An application that is separated into two or more parts (such as a client and a server) on different computers that communicate through a network.
distributed computing
An application design and implementation strategy that separates an application into units that are executed on different computers and communicate through a network. For example, an application can be separated into three distributed units: a user interface unit, a processing unit, and a storage unit.
distributed object
(CORBA) An object that can live anywhere on a network. Distributed objects are packaged as independent pieces of code that can be accessed by remote clients via method invocations. The language and compiler used to create distributed objects are totally transparent to the clients. Clients do not need to know where the distributed object resides or what operating system executes on it.
Distributed Program Interface (DPI)
The Distributed Program Interface (DPI) protocol extension to SNMP agents. Permits end-users to dynamically add, delete or replace variables in the local MIB without recompiling the SNMP agent, by creating a subagent that communicates with the agent via the SNMP-DPI protocol.
distributed transaction
A transaction involving multiple transaction managers. In a distributed transaction environment, a client application may send requests to several servers resulting in resource updates at multiple resource managers. To complete the transaction, the transaction manager for each participant (client, servers, and resource managers) must be polled to coordinate the commit process for each participant within its domain.
distributed transaction processing (DTP)
A form of processing in which multiple application programs update multiple resources (such as databases) in a coordinated manner. Programs and resources can reside on one or more computers access a network.
DLL
See dynamic link library (DLL).
domain
Domain Configuration (DMCONFIG) File
The file that describes the relationship between the local domain (the domain in which the DMCONFIG file resides) and remote domains (any other domains). There is one DMCONFIG file per domain. The DMCONFIG file contains domain information for BEA Tuxedo domains.
See also Domains.
domain gateway
A highly asynchronous multitasking server provided by the BEA Tuxedo system to process service requests to and from remote domains. The gateway makes access to services on a remote domain (and service requests from a remote domain) transparent to both the application programmer and the user.
domain gateway group
Domains
A BEA Tuxedo system component that provides a framework for interoperability among multiple domains. The framework consists of the following:
Domains-level failback
The restoration of message traffic to a primary remote domain. The TDomain gateway always tries to use the primary domain or the highest-level alternate remote domain defined for a service. When these domains become unavailable (due to circuit failure or other reasons), the gateway transfers message traffic to a lower-priority alternate remote domain, and periodically checks the availability of the primary remote domain and the highest-level alternate remote domain. When possible, the gateway restores message traffic to the primary remote domain or the highest-level remote domain.
See domain gateway and TDomain gateway.
Domains-level failover
The transfer of message traffic to an alternate remote domain when a primary remote domain fails.
dotted-decimal notation
A convention for expressing IP addresses, consisting of a series of four decimal numbers (0-255), separated by periods. Example: 123.205.23.99.
DPI subagent