Book Home

Java™ Distributed Computing Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: I

identifiers, message: 6.1. Messages Defined
identity, agent: 5.3. Identities and Access Control
9.3.1. Building the Infrastructure with Message Passing
collaboration and: 9.2.2. Maintaining Agent Identities
managing: 5.2.2. The Core Security API
verifying: 5.1. Security Issues and Concerns
5.5.5. Distributing Certified Public Keys
Identity class (example): 5.3. Identities and Access Control
9.3.1. Building the Infrastructure with Message Passing
IDL (Interface Definition Language): 3.5.2. The Interface Definition Language (IDL)
Solver interface (example): 3.5.5.1. The IDL interface
IIOP (Internet Inter-ORB Protocol): 3.5. CORBA
implementation-neutral interfaces: 1.3.2. Abstract Interfaces
implementation of object classes: 3.3. Features of Distributed Object Systems
import statement: 2.3. The ClassLoader
imposter agents: 5.1. Security Issues and Concerns
in keyword (IDL): 3.5.2. The Interface Definition Language (IDL)
InetAddress class: 2.1.1. IP Addressing
initEncrypt( ): 5.6.1. Ciphers for Secure Data Transfers
initialize( ): 5.4.3. Keys in the Java Security API
initSign( ): 5.5.2. Public Key Signatures for Authentication
initStream( ): 2.3.1. Loading Classes from the Network
initVerify( ): 5.5.2. Public Key Signatures for Authentication
inout keyword (IDL): 3.5.2. The Interface Definition Language (IDL)
3.5.5.2. The client stubs
InputStream classes: 2.1.4. Streams, Readers, and Writers for Input and Output
4.2.1. Implementing Runnable
InputStreamReader class: 2.1.4. Streams, Readers, and Writers for Input and Output
interactive chat system (example): 10.1. A Simple Chat System
Interface Definition Language (IDL): 3.5.2. The Interface Definition Language (IDL)
Solver interface (example): 3.5.5.1. The IDL interface
interfaces, abstract (implementation-neutral): 1.3.2. Abstract Interfaces
Internet Inter-ORB Protocol (IIOP): 3.5. CORBA
Internet Protocol (IP): 2.1. Sockets and Streams
intruders: 5.1. Security Issues and Concerns
invoke( ): D.3. The java.rmi.server Package
IP (Internet Protocol): 2.1. Sockets and Streams
isAuthorized( ): 5.5.3. An Authenticating Credit Agent


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.