Home TOC |
Search
Feedback |
Glossary
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.
- The acronym for the four properties guaranteed by transactions: atomicity, consistency, isolation, and durability.
- The process of transferring an enterprise bean from secondary storage to memory. (See passivation.)
- A component that typically executes in a web browser, but can execute in a variety of other applications or devices that support the applet programming model.
- A container that includes support for the applet programming model.
- A vendor that provides the Java classes that implement components' methods, JSP page definitions, and any required deployment descriptors.
- A person that combines components and modules into deployable application units.
- A first-tier client component that executes in its own Java virtual machine. Application clients have access to some (JNDI, JDBC, RMI-IIOP, JMS) J2EE platform APIs.
- A container that supports application client components.
- A software unit that consists of one or more classes and an application client deployment descriptor.
- The process by which an entity proves to another entity that it is acting on behalf of a specific identity. The J2EE platform requires three types of authentication: basic, form-based, and mutual, and supports digest authentication.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- The process by which access to a method or resource is determined. Authorization in the J2EE platform depends upon the determination of whether the principal associated with a request through authentication is in a given security role. A security role is a logical grouping of users defined by an Application Component Provider or Assembler. A Deployer maps security roles to security identities. Security identities may be principals or groups in the operational environment.
- An authentication mechanism in which a web server authenticates an entity with a user name and password obtained using the web client's built-in authentication mechanism.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- The code that implements the functionality of an application. In the Enterprise JavaBeans model, this logic is implemented by the methods of an enterprise bean.
- Component methods called by the container to notify the component of important events in its life cycle.
- The point in a transaction when all updates to any resources involved in the transaction are made permanent.
- An application-level software unit supported by a container. Components are configurable at deployment time. The J2EE platform defines four types of components: enterprise beans, web components, applets, and application clients.
- The contract between a component and its container. The contract includes: life cycle management of the component, a context interface that the instance uses to obtain various information and services from its container, and a list of services that every container must provide for its components.
- A standard extension mechanism for containers to provide connectivity to enterprise information systems. A connector is specific to an enterprise information system and consists of a resource adapter and application development tools for enterprise information system connectivity. The resource adapter is plugged in to a container through its support for system-level contracts defined in the connector architecture.
- An architecture for integration of J2EE products with enterprise information systems. There are two parts to this architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this resource adapter to plug in. This architecture defines a set of contracts that a resource adapter has to support to plug in to a J2EE product, for example, transactions, security, and resource management.
- An entity that provides life cycle management, security, deployment, and runtime services to components. Each type of container (EJB, web, JSP, servlet, applet, and application client) also provides component-specific services.
- Data transfer between an entity bean's variables and a resource manager managed by the entity bean's container.
- A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions.
- The field values of a session bean plus the transitive closure of the objects reachable from the bean's fields. The transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is, the fields that would be stored by serializing the bean instance.
- Common Object Request Broker Architecture. A language independent, distributed object model specified by the Object Management Group.
- A method defined in the home interface and invoked by a client to create an enterprise bean.
- The information describing the security attributes of a principal.
- Cascading Style Sheet. A stylesheet used with HTML and XML documents to add a style to all elements marked with a particular tag, for the direction of browsers or other presentation mechanisms.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- Compatibility Test Suite. A suite of compatibility tests for verifying that a J2EE product complies with the J2EE platform specification.
- An act whereby one principal authorizes another principal to use its identity or privileges with some restrictions.
- An XML file provided with each module and application that describes how they should be deployed. The deployment descriptor directs a deployment tool to deploy a module or application with specific container options and describes specific configuration requirements that a Deployer must resolve.
- A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point messaging system, publish/subscribe messaging system.
- An authentication mechanism in which a web client authenticates to a web server by sending the server a message digest along its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation of the HTTP request message and the client's password. The digest is typically much smaller than the HTTP request, and doesn't contain the password.
- An application made up of distinct components running in separate runtime environments, usually on different platforms connected via a network. Typical distributed applications are two-tier (client-server), three-tier (client-middleware-server), and multitier (client-multiple middleware-multiple servers).
- Document Object Model. A tree of objects with interfaces for traversing the tree and writing an XML version of it, as defined by the W3C specification.
- Document Type Definition. A description of the structure and properties of a class of XML files.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- In a JMS publish/subscribe messaging system, a subscription that continues to exist whether or not there is a current active subscriber object. If there is no active subscriber, JMS retains the subscription's messages until they are received by the subscription or until they expire.
- See Enterprise JavaBeans.
- A container that implements the EJB component contract of the J2EE architecture. This contract specifies a runtime environment for enterprise beans that includes security, concurrency, life cycle management, transaction, deployment, naming, and other services. An EJB container is provided by an EJB or J2EE server.
- An object that allows an enterprise bean to invoke services provided by the container and to obtain the information about the caller of a client-invoked method.
- An object that provides the life cycle operations (create, remove, find) for an enterprise bean. The class for the EJB home object is generated by the container's deployment tools. The EJB home object implements the enterprise bean's home interface. The client references an EJB home object to perform life cycle operations on an EJB object. The client uses JNDI to locate an EJB home object.
- An object whose class implements the enterprise bean's remote interface. A client never references an enterprise bean instance directly; a client always references an EJB object. The class of an EJB object is generated by a container's deployment tools.
- Software provides services to an EJB container. For example, an EJB container typically relies on a transaction manager that is part of the EJB server to perform the two-phase commit across all the participating resource managers. The J2EE architecture assumes that an EJB container is hosted by an EJB server from the same vendor, so does not specify the contract between these two entities. An EJB server may host one or more EJB containers.
- A component that implements a business task or business entity and resides in an EJB container; either an entity bean, session bean, or message-driven bean.
- The applications that comprise an enterprise's existing system for handling company-wide information. These applications provide an information infrastructure for an enterprise. An enterprise information system offers a well defined set of services to its clients. These services are exposed to clients as local and/or remote interfaces. Examples of enterprise information systems include: enterprise resource planning systems, mainframe transaction processing systems, and legacy database systems.
- An entity that provides enterprise information system-specific functionality to its clients. Examples are: a record or set of records in a database system, a business object in an enterprise resource planning system, and a transaction program in a transaction processing system.
- An application programmer who produces enterprise bean classes, remote and home interfaces, and deployment descriptor files, and packages them in an EJB JAR file.
- A component architecture for the development and deployment of object-oriented, distributed, enterprise-level applications. Applications written using the Enterprise JavaBeans architecture are scalable, transactional, and secure.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- An enterprise bean that represents persistent data maintained in a database. An entity bean can manage its own persistence or it can delegate this function to its container. An entity bean is identified by a primary key. If the container in which an entity bean is hosted crashes, the entity bean, its primary key, and any remote references survive the crash.
- An object that can transform the header and/or content of a request or response. Filters differ from web components in that they usually do not themselves create a response. A filter should not have any dependencies on a web resource for which it is acting as a filter so that it can be composable with more than one type of web resource.
- A method defined in the home interface and invoked by a client to locate an entity bean.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- An authentication mechanism in which a web container provides an application-specific form for logging in.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- An object that identifies an enterprise bean. A client may serialize the handle, and then later deserialize it to obtain a reference to the enterprise bean.
- One of two interfaces for an enterprise bean. The home interface defines zero or more methods for managing an enterprise bean. The home interface of a session bean defines create and remove methods, while the home interface of an entity bean defines create, finder, and remove methods.
- An object that can be used to obtain a reference of the home interface. A home handle can be serialized and written to stable storage and deserialized to obtain the reference.
- Hypertext Markup Language. A markup language for hypertext documents on the Internet. HTML enables the embedding of images, sounds, video streams, form fields, references to other objects with URLs and basic text formatting.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- Hypertext Transfer Protocol. The Internet protocol used to fetch hypertext objects from remote hosts. HTTP messages consist of requests from client to server and responses from server to client.
- An act whereby one entity assumes the identity and privileges of another entity without restrictions and without any indication visible to the recipients of the impersonator's calls that delegation has taken place. Impersonation is a case of simple delegation.
- Interface Definition Language. A language used to define interfaces to remote CORBA objects. The interfaces are independent of operating systems and programming languages.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- Internet Inter-ORB Protocol. A protocol used for communication between CORBA object request brokers.
- Any deployable unit of J2EE functionality. This can be a single module or a group of modules packaged into an .ear file with a J2EE application deployment descriptor. J2EE applications are typically engineered to be distributed across multiple computing tiers.
- An environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered, web-based applications.
- A highly optimized Java runtime environment targeting a wide range of consumer products, including pagers, cellular phones, screenphones, digital set-top boxes and car navigation systems.
- Sun's implementation of the J2EE platform. This implementation provides an operational definition of the J2EE platform.
- Specifies the implementation of a transaction manager which supports JTA and implements the Java mapping of the OMG Object Transaction Service (OTS) 1.1 specification at the level below the API.
- A Java class that can be manipulated in a visual builder tool and composed into applications. A JavaBeans component must adhere to certain property and event interface conventions.
- A technology that provides CORBA interoperability and connectivity capabilities for the J2EE platform. These capabilities enable J2EE applications to invoke operations on remote network services using the OMG IDL and IIOP.
- An extensible web technology that uses template data, custom elements, scripting languages, and server-side Java objects to return dynamic content to a client. Typically the template data is HTML or XML elements, and in many cases the client is a web browser.
- An API for database-independent connectivity between the J2EE platform and a wide range of data sources.
- See Java Message Service.
- A preconfigured JMS object (a resource manager connection factory or a destination) created by an administrator for the use of JMS clients and placed in a JNDI namespace.
- One or more JMS clients that exchange messages.
- A Java language program that sends and/or receives messages.
- A messaging system that implements the Java Message Service as well as other administrative and control functionality needed in a full-featured messaging product.
- A single-threaded context for sending and receiving JMS messages. A JMS session can be non-transacted, locally transacted, or participating in a distributed transaction.
- See JavaServer Pages.
- A JSP element that can act on implicit objects and other server-side objects or can define new scripting variables. Actions follow the XML syntax for elements with a start tag, a body and an end tag; if the body is empty it can also use the empty tag syntax. The tag must use a prefix.
- An action described in a portable manner by a tag library descriptor and a collection of Java classes and imported into a JSP page by a taglib directive. A custom action is invoked when a JSP page uses a custom tag.
- An action that is defined in the JSP specification and is always available to a JSP file without being imported.
- A stand-alone web application, written using the JavaServer Pages technology, that can contain JSP pages, servlets, HTML files, images, applets, and JavaBeans components.
- A container that provides the same services as a servlet container and an engine that interprets and processes JSP pages into a servlet.
- A JSP container that can run a web application that is tagged as distributable and is spread across multiple Java virtual machines that might be running on different hosts.
- A JSP element that gives an instruction to the JSP container and is interpreted at translation time.
- A portion of a JSP page that is recognized by a JSP translator. An element can be a directive, an action, or a scripting element.
- A scripting element that contains a valid scripting language expression that is evaluated, converted to a String, and placed into the implicit out object.
- A file that contains a JSP page. In the Servlet 2.2 specification, a JSP file must have a .jsp extension.
- A text-based document using fixed template data and JSP elements that describes how to process a request to create a response.
- A JSP declaration, scriptlet, or expression, whose tag syntax is defined by the JSP specification, and whose content is written according to the scripting language used in the JSP page. The JSP specification describes the syntax and semantics for the case where the language page attribute is "java".
- A JSP scripting element containing any code fragment that is valid in the scripting language used in the JSP page. The JSP specification describes what is a valid scriptlet for the case where the language page attribute is "java".
- A piece of text between a left angle bracket and a right angle bracket that is used in a JSP file as part of a JSP element. The tag is distinguishable as markup, as opposed to data, because it is surrounded by angle brackets.
- A collection of custom tags identifying custom actions described via a tag library descriptor and Java classes.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- See Java Transaction API.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- The framework events of a component's existence. Each type of component has defining events which mark its transition into states where it has varying availability for use. For example, a servlet is created and has its init method called by its container prior to invocation of its service method by clients or other servlets who require its functionality. After the call of its init method it has the data and readiness for its intended use. The servlet's destroy method is called by its container prior to the ending of its existence so that processing associated with winding up may be done, and resources may be released. The init and destroy methods in this example are callback methods. Similar considerations apply to all J2EE component types: enterprise beans (EJBs), web components (servlets or JSP pages), applets, and application clients.
- In the Java Message Service, an asynchronous request, report, or event that is created, sent, and consumed by an enterprise application, not by a human. It contains vital information needed to coordinate enterprise applications, in the form of precisely formatted data that describes specific business actions.
- An object created by a JMS session that is used for receiving messages sent to a destination.
- An object created by a JMS session that is used for sending messages to a destination.
- An enterprise bean that is an asynchronous message consumer. A message-driven bean has no state for a specific client, but its instance variables may contain state across the handling of client messages, including an open database connection and an object reference to an EJB object. A client accesses a message-driven bean by sending messages to the destination for which the message-driven bean is a message listener.
- An authorization rule that determines who is permitted to execute one or more enterprise bean methods.
- A software unit that consists of one or more J2EE components of the same container type and one deployment descriptor of that type. There are three types of modules: EJB, web, and application client. Modules can be deployed as stand-alone units or assembled into an application.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- An authentication mechanism employed by two parties for the purpose of proving each other's identity to one another.
- A mechanism that allows a component to be customized without the need to access or change the component's source code. A container implements the component's naming environment, and provides it to the component as a JNDI naming context. Each component names and accesses its environment entries using the java:comp/env JNDI context. The environment entries are declaratively specified in the component's deployment descriptor.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- A messaging client program that uses a message system's native client API instead of the Java Message Service.
- Object Request Broker. A library than enables CORBA objects to locate and communicate with one another.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- Object Transaction Service. A definition of the interfaces that permit CORBA objects to participate in transactions.
- The process of transferring an enterprise bean from memory to secondary storage. (See activation.)
- The protocol for transferring the state of an entity bean between its instance variables and an underlying database.
- Portable Object Adapter. A CORBA standard for building server-side applications that are portable across heterogeneous ORBs.
- A messaging system built around the concept of message queues. Each message is addressed to a specific queue; clients extract messages from the queue(s) established to hold their messages.
- A security attribute that does not have the property of uniqueness and that may be shared by many principals.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- A messaging system in which clients address messages to a specific node in a content hierarchy. Publishers and subscribers are generally anonymous and may dynamically publish or subscribe to the content hierarchy. The system takes care of distributing the messages arriving from a node's multiple publishers to its multiple subscribers.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- See security policy domain. Also, a string, passed as part of an HTTP request during basic authentication, that defines a protection space. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme and/or authorization database.
- An entity bean that can handle multiple simultaneous, interleaved, or nested invocations which will not interfere with each other.
- One of two interfaces for an enterprise bean. The remote interface defines the business methods callable by a client.
- Method defined in the home interface and invoked by a client to destroy an enterprise bean.
- A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system. A resource adapter is typically specific to an enterprise information system. It is available as a library and is used within the address space of the server or client using it. A resource adapter plugs in to a container. The application components deployed on the container then use the client API (exposed by adapter) or tool generated high-level abstractions to access the underlying enterprise information system. The resource adapter and EJB container collaborate to provide the underlying mechanisms-transactions, security, and connection pooling-for connectivity to the enterprise information system.
- Provides access to a set of shared resources. A resource manager participates in transactions that are externally controlled and coordinated by a transaction manager. A resource manager is typically in different address space or on a different machine from the clients that access it. Note: An enterprise information system is referred to as resource manager when it is mentioned in the context of resource and transaction management.
- Remote Method Invocation. A technology that allows an object running in one Java virtual machine to invoke methods on an object running in a different Java virtual machine.
- A version of RMI implemented to use the CORBA IIOP protocol. RMI over IIOP provides interoperability with CORBA objects implemented in any language if all the remote interfaces are originally defined as RMI interfaces.
- The function performed by a party in the development and deployment phases of an application developed using J2EE technology. The roles are: Application Component Provider, Application Assembler, Deployer, J2EE Product Provider, EJB Container Provider, EJB Server Provider, Web Container Provider, Web Server Provider, Tool Provider, and System Administrator.
- An abstract logical grouping of users that is defined by the Application Assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment.
- The process of associating the groups and/or principals recognized by the container to security roles specified in the deployment descriptor. Security roles have to be mapped by the Deployer before the component is installed in the server.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- The point in a transaction when all updates to any resources involved in the transaction are reversed.
- Simple API for XML. An event-driven, serial-access mechanism for accessing XML documents.
- A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol and/or by a J2EE Product Provider.
- A declarative way to annotate the intended protection of web content. A security constraint consists of a web resource collection, an authorization constraint, and a user data constraint.
- A mechanism, defined by J2SE, used by the J2EE platform to express the programming restrictions imposed on Application Component Providers.
- The minimum set of security permissions that a J2EE Product Provider must provide for the execution of each component type.
- A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well defined authentication protocol(s) for authenticating users (or principals), and may have groups to simplify setting of security policies.
- See role (security).
- A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.
- A Java program that extends the functionality of a web server, generating dynamic content and interacting with web clients using a request-response paradigm.
- A container that provides the network services over which requests and responses are sent, decodes requests, and formats responses. All servlet containers must support HTTP as a protocol for requests and responses, but may also support additional request-response protocols such as HTTPS.
- A servlet container that can run a web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.
- An object that contains a servlet's view of the web application within which the servlet is running. Using the context, a servlet can log events, obtain URL references to resources, and set and store attributes that other servlets in the context can use.
- Defines an association between a URL pattern and a servlet. The mapping is used to map requests to servlets.
- An object used by a servlet to track a user's interaction with a web application across multiple HTTP requests.
- An enterprise bean that is created by a client and that usually exists only for the duration of a single client-server session. A session bean performs operations, such as calculations or accessing a database, for the client. While a session bean may be transactional, it is not recoverable should a system crash occur. Session bean objects can be either stateless or they can maintain conversational state across methods and transactions. If a session bean maintains state, then the EJB container manages this state if the object must be removed from memory. However, the session bean object itself must manage its own persistent data.
- Secure Socket Layer. A security protocol that provides privacy over the Internet. The protocol allows client-server applications to communicate in a way that cannot be eavesdropped or tampered with. Servers are always authenticated and clients are optionally authenticated.
- Structured Query Language. The standardized relational database language for defining database objects and manipulating data.
- A set of standards that includes specifications for embedding SQL statements in methods in the Java programming language and specifications for calling Java static methods as SQL stored procedures and user-defined functions. An SQL checker can detects errors in static SQL statements at program development time, rather than at execution time as with a JDBC driver.
- A session bean with no conversational state. All instances of a stateless session bean are identical.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- The person responsible for configuring and administering the enterprise's computers, networks, and software systems.
- An atomic unit of work that modifies data. A transaction encloses one or more program statements, all of which either complete or roll back. Transactions enable multiple users to access the same data concurrently.
- A value specified in an enterprise bean's deployment descriptor that is used by the EJB container to control the transaction scope when the enterprise bean's methods are invoked. A transaction attribute can have the following values: Required, RequiresNew, Supports, NotSupported, Mandatory, Never.
- The degree to which the intermediate state of the data being modified by a transaction is visible to other concurrent transactions and data being modified by other transactions is visible to it.
- Provides the services and management functions required to support transaction demarcation, transactional resource management, synchronization, and transaction context propagation.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- An organization or software vendor that provides tools used for the development, packaging, and deployment of J2EE applications.
- Uniform Resource Identifier. A compact string of characters for identifying an abstract or physical resource. A URI is either a URL or a URN. URLs and URNs are concrete entities that actually exist; A URI is an abstract superclass.
- Uniform Resource Locator. A standard for writing a textual reference to an arbitrary piece of data in the World Wide Web. A URL looks like protocol://host/localinfo where protocol specifies a protocol for fetching the object (such as HTTP or FTP), host specifies the Internet name of the targeted host, and localinfo is a string (often a file name) passed to the protocol handler on the remote host.
- The URL passed by a HTTP request to invoke a servlet. The URL consists of the Context Path + Servlet Path + Path Info, where
- Context Path is the path prefix associated with a servlet context that this servlet is a part of. If this context is the default context rooted at the base of the web server's URL namespace, the path prefix will be an empty string. Otherwise, the path prefix starts with a / character but does not end with a / character.
- Servlet Path is the path section that directly corresponds to the mapping which activated this request. This path starts with a / character.
- Path Info is the part of the request path that is not part of the Context Path or the Servlet Path.
- Uniform Resource Name. A unique identifier that identifies an entity, but doesn't tell where it is located. A system can use a URN to look up an entity locally before trying to find it on the web. It also allows the web location to change, while still allowing the entity to be found.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- Indicates how data between a client and a web container should be protected. The protection can be the prevention of tampering with the data or prevention of eavesdropping on the data.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- An application written for the Internet, including those built with Java technologies such as JavaServer Pages and servlets, as well as those built with non-Java technologies such as CGI and Perl.
- A web application that uses J2EE technology written so that it can be deployed in a web container distributed across multiple Java virtual machines running on the same host or different hosts. The deployment descriptor for such an application uses the distributable element.
- A container that implements the web component contract of the J2EE architecture. This contract specifies a runtime environment for web components that includes security, concurrency, life cycle management, transaction, deployment, and other services. A web container provides the same services as a JSP container and a federated view of the J2EE platform APIs. A web container is provided by a web or J2EE server.
- A web container that can run a web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- Software that provides services to access the Internet, an intranet, or an extranet. A web server hosts web sites, provides support for HTTP and other protocols, and executes server-side programs (such as CGI scripts or servlets) that perform certain functions. In the J2EE architecture, a web server provides services to a web container. For example, a web container typically relies on a web server to provide HTTP message handling. The J2EE architecture assumes that a web container is hosted by a web server from the same vendor, so does not specify the contract between these two entities. A web server may host one or more web containers.
- Extensible Markup Language. A markup language that allows you to define the tags (markup) needed to identify the content, data, and text, in XML documents. It differs from HTML the markup language most often used to present information on the internet. HTML has fixed tags that deal mainly with style or presentation. An XML document must undergo a transformation into a language with style tags under the control of a stylesheet before it can be presented by a browser or other presentation mechanism. Two types of style sheets used with XML are CSS and XSL. Typically, XML is transformed into HTML for presentation. Although tags may be defined as needed in the generation of an XML document, a Document Type Definition ( DTD) may be used to define the elements allowed in a particular type of document. A document may be compared with the rules in the DTD to determine its validity and to locate particular elements in the document. J2EE deployment descriptors are expressed in XML with DTDs defining allowed elements. Programs for processing XML documents use SAX or DOM APIs. J2EE deployment descriptors are expressed in XML.
- Extensible Stylesheet Language. An XML transformation language used for transforming XML documents into documents with flow object tags for presentation purposes. The transformation aspect of XSL has been abstracted into XSLT with the XSL name now used to designate the presentation flow language. XSL is a direct descendent of the DSSSL style language for SGML (Standard Generalized Markup Language), the language from which XML was subsetted. It was designed to have all the capabilities of CSS, the stylesheet often used with HTML. XSL flow objects can be presented by specialized browsers, and themselves transformed into PDF documents.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- XSL Transformation. An XML file that controls the transformation of an XML document into another XML document or HTML. The target document often will have presentation related tags dictating how it will be rendered by a browser or other presentation mechanism. XSLT was formerly part of XSL, which also included a tag language of style flow objects.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Home TOC |
Search
Feedback |