Appendix A. Glossary

Access control:

Determining who or what can go where, when, and how.

ACID:

Atomicity, Consistency, Isolation, and Durability, the main requirements for proper transaction processing.

Adapter:

A software module added to an application or system that allows access to its capabilities via a standards-compliant services interface.

AES:

Advanced Encryption Standard, an encryption algorithm developed in Belgium and adopted by the U.S. government as a standard to replace the older DES (Data Encryption Standard). AES is the only published encryption algorithm that the United States government uses to protect Top Secret information.

AJAX:

A hot new technology for producing highly interactive Web applications. AJAX stands for Asynchronous JavaScript and XML.

API:

Application Programming Interface, a collection of subroutine calls that allow computer programs to use a software system.

Architecture:

In information processing, the design approach taken for developing a program or system.

Authentication:

The process by which the identity of a person or computer process is verified.

B2B:

Business to Business, typically used to refer to a kind of commerce (or trade). When a company sells primarily to other companies (businesses), its business is said to be B2B. IBM is a good example.

B2C:

Business to Consumer, typically used to refer to a kind of commerce (or trade). When a company sells primarily to consumers (ordinary people just shopping, you know) its business is said to be B2C. Amazon.com ...

Get Service Oriented Architecture For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.