An operation to terminate a transaction in such a way that the values assigned to all protected resources are unchanged from the beginning of the transaction.

Access Control List (ACL)

The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.

ACID properties

The acronym for the four properties guaranteed by transactions: atomicity, consistency, isolation, and durability.


The process of transferring an enterprise bean from secondary storage to memory.

See also [passivation]

A software component that provides an interface from the enterprise application to an enterprise information system (EIS), ...

Get Sams Teach Yourself EJB in 21 Days now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.