Appendix A. Glossary
- Access control:
Determining who or what can go where, when, and how.
- ACID:
Atomicity, Consistency, Isolation, and Durability, the main requirements for proper transaction processing.
- Adapter:
A software module added to an application or system that allows access to its capabilities via a standards-compliant services interface.
- AES:
Advanced Encryption Standard, an encryption algorithm developed in Belgium and adopted by the U.S. government as a standard to replace the older DES (Data Encryption Standard). AES is the only published encryption algorithm that the United States government uses to protect Top Secret information.
- AJAX:
A hot new technology for producing highly interactive Web applications. AJAX stands for Asynchronous JavaScript and XML.
- API:
Application Programming Interface, a collection of subroutine calls that allow computer programs to use a software system.
- Architecture:
In information processing, the design approach taken for developing a program or system.
- Authentication:
The process by which the identity of a person or computer process is verified.
- B2B:
Business to Business, typically used to refer to a kind of commerce (or trade). When a company sells primarily to other companies (businesses), its business is said to be B2B. IBM is a good example.
- B2C:
Business to Consumer, typically used to refer to a kind of commerce (or trade). When a company sells primarily to consumers (ordinary people just shopping, you know) its business is said to be B2C.
Amazon.com ...
Get Service Oriented Architecture For Dummies® now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.