(Minus Sign) in Class Diagrams, 15 * (Asterisk) As Wildcard, 58 ? (Question

(Minus Sign) in Class Diagrams, 15 * (Asterisk) As Wildcard, 58 ? (Question

Index - (minus sign) in class diagrams, 15 AOP module (Spring), 34, 37 * (asterisk) as wildcard, 58 Apache Axis web services framework, 210 ? (question mark) for positional bind Apache Maven, 280–285 variables, 187 Apache Struts framework, 23 + (plus sign) in class diagrams, 15 Apache Tiles framework, 122, 278 Apache Tomcat, 257 ■ A APF (Authentication Processing Filter), AbstractCachingViewResolver class, 60 233–243 AbstractCommandController class, 74–78 application contexts (Spring), 33 AbstractController class, 71–74 Application Controller pattern AbstractEnterpriseBean class, 158, 200 action/command handling, 52–56 AbstractHandlerMapping, 54 action handlers, using, 56–58 AbstractMessageDrivenBean class, 200 for action-view management, 50–52 AbstractProcessingFilter, 234 background, 50–51 AbstractStatelessSessionBean, 158 benefits and concerns, 68 AbstractTemplateViewResolver class, strategies with Spring framework, 52 60–61 view handlers, 59–62, 62–68 AbstractWizardFormController class, 89 application server transactions, 261 access decision manager (Spring application servers, 138 Security), 228 application service implementation class, accessDecisionManager property, 164 246–247 Application Service pattern Acegi Security, 223–224 benefits and concerns, 167 action/command handling (application to concentrate business logic in POJO controller), 52–56 classes, 162–163 action handlers strategies with Spring framework, page controllers and, 51 164–167 sequence, 54 applicationContext-security.xml, 229 using (application controller), 56–58 applicationScope object, 128 advices, audit interceptor, 249 architecture AffirmativeBased access decision container, 6–8 manager, 247 layered, 10 afterCompletion callback method, 104 OMS application, 272–275 aggregation relationship (UML), 17 architecture, Java EE Alur, Deepak, 1, 223 n-tier, 4–5 ANPF (Anonymous Processing Filter), overview, 5–6 243–244 single-tier, 2 311 312 ■INDEX three-tier, 4 BeanNameUrlHandlerMapping, 54, two-tier, 3 56–57, 127 aspect-oriented programming (AOP), 33 BeanNameUrlHandlerMapping class, association relationship (UML), 16 48 asynchronous report processing, 204 BeanNameViewResolver class, 60 asynchronous service requests, 199–200 defined, 29 audit interceptors entity, 135 to apply auditing of business service factory bean, defined, 140 invocations, 248–249 form, 74–76 benefits and concerns, 256 Beck, Kent, 41 strategies with Spring framework, bind variables, 187–188 249–256 Blazon ezJEE 1.0.0 development AuditEvent class, 253 environment, 280 AuditLog interface, 254 Burlap protocol, remoting with, 217–220 AuditRules class, 252–253 BurlapServiceExporter, 219 authentication business Authentication Processing Filter (APF), interfaces, 274 233–243 layers, 2 authenticationEntryPoint property, 245 logic, 195 authenticationManager property, 246 service layer (OMS application), 275 AuthenticationProvider interface, 238 Business Delegate pattern defined, 224 as adapter to invoke business objects, manager (Spring Security), 228, 236–237 151 Authentication and Authorization benefits and concerns, 154–155 Enforcer pattern business delegate object, 131 high-level components of, 226 strategies with Spring framework, OMS application and, 277 151–154 Spring Security framework Business Interface pattern components, 228 benefits and concerns, 176 strategies with Spring framework, 226 to consolidate business methods, to verify user identity, 224–226 168–169 authorization, defined, 225 strategies with Spring framework, automatic proxy creator bean, 255–256 169–175 business tier design patterns ■ B Application Service pattern. See BasicProcessingFilter, 234 Application Service pattern BEA WebLogic Server, 260 Business Delegate pattern. See Business beans Delegate pattern bean factory (Spring), 29–32 Business Interface pattern. See Business BeanFactoryLocator implementation, Interface pattern 160 business tier method invocation, beanNameHandlerMapping, 106 auditing, 248 ■INDEX 313 business tier (Spring application), 37–38 controller component (MVC), 8 OMS application, 274–275 Controller interface (Spring framework), overview, 135 71–72 Service Locator pattern. See Service controller layers, 8 Locator pattern Core J2EE Design Pattern (Prentice Hall), 1, Session Facade pattern. See Session 11–12, 223 Facade pattern Core module (Spring) application contexts, 33 ■ C bean factory, 29–32 cache, service locator, 161 DI (Dependency Injection), 26–29 callbacks, Spring DAO, 188–194 IOC (Inversion of Control), 25–26 CasProcessingFilter, 234 Core Security Patterns (Prentice Hall), catalog, Java EE design pattern, 12–14 223–224 Central Authentication Service (CAS) SSO createBinder method, 96–97 solution, 234 crosscutting design patterns Chedgey, Chris, 22 audit interceptors. See audit class diagrams, UML, 15–17 interceptors Clickstream (Open Symphony), 102 Authentication and Authorization command classes, 74 Enforcer pattern. See compile-time checks, 169–171 Authentication and Authorization components, code, 22 Enforcer pattern Composite GOF design pattern, 118–119 defined, 14 composite view domain service owner transactions. See Apache Tiles framework, 122 domain service owner transactions benefits and concerns, 123 overview, 223–224 to group and deploy subview Crupi, John, 223 components, 117–118 custom queries with aliases (security), 242 OMS application, 278 SiteMesh web page layout, 119 ■D strategies with Spring framework, DAO, Spring, 38, 34 118–122 DaoAuthenticationProvider, 239 composition relationship (UML), 17 data access layers, 2 ConnectionFactory object, 204 Data Access Object (DAO) pattern constructor injection, 32 benefits and concerns, 194 container architecture, 6–8 bind variables, 187–188 Context Object pattern to encapsulate data access logic, benefits and concerns, 98 180–183 to encapsulate and share form data, OMS application, 275 90–91 Spring DAO callbacks, 188–194 strategies with Spring framework, 91–98 strategies with Spring framework, ContextJndiBeanFactoryLocator class, 160 183–186 ContextLoaderListener, 229, 231 data transfer objects (DTOs), 180 Continuum, 280 DataSourceTransactionManager, 258 314 ■INDEX declarative container-managed doFilter method, 103, 234 transaction (CMT) support, 156 domain service owner transactions declarative transactions, 261–265 application server transactions, 261 declarative validators (Spring MVC), 85 benefits and concerns, 267 declareParameter method, 197 declarative transactions, 261–265 DefaultMessageListenerContainer, 208 to declaratively apply transactions, dependencies, adding (OMS application), 256–257 285–287 Hibernate transactions, 259 Dependency Injection (DI). See DI JDBC transactions, 258–259 (Dependency Injection), Spring JPA transactions, 259–260 deployment, OMS application, 297–309 JTA transactions, 260–261 design patterns strategies with Spring framework, 258 business tier. See business tier design doSubmitAction method, 82 patterns ■ crosscutting. See crosscutting design E patterns Eclipse IDE, 280 design pattern directive, Spring Java EE, EJB (Enterprise Java Beans) 38–39 deploying business components with, Elements of Reusable Object-Oriented 11 Software (Addison Wesley), 11 EJB 2.0, 157 Java EE, 11–14 EJB 3 lookup, 144 presentation tier. See presentation tier EJB containers, 7 design patterns ejb-jar.xml deployment descriptor, Destination object, 204 159–160 DI (Dependency Injection), Spring, 26–29 EJBObject/EJBLocalObject interfaces, diagrams, UML, 14–18 168 DigestProcessingFilter, 234 local EJB 2.x lookup, 143–144 direct instantiation, 26 remote EJB 2.x lookup, 140–142 Dispatcher View pattern session beans, 136 benefits and concerns, 130 endpoints, SOAP-based, 210 to process static/semistatic views, entity beans, 135 123–124 EntityManager, 260 strategies with Spring framework, ETF (Exception Translation Filter), 124–128 244–245 DispatcherServlet, 46–49, 274 evolutionary architecture, 272 display, form, 78–80 Exception Translation Filter (ETF), Displaytag tag library, 116 244–245 distributed computing, 2–10 Expert One-on-One J2EE Design and distributed objects, design of, 11 Development (Wrox), 21 documented business requirements (OMS Expert Spring MVC and Web Flow (Apress), application), 270–271 79 doDispatch method, 55 extreme programming (XP), 269 ■INDEX 315 ■F GOF (Gang of Four) factory bean, defined, 140 command pattern, 46 factory helper, 27–28 Decorator design pattern, 119 filters patterns, 11 filter chaining in Spring Security, 232 Strategy GOF design pattern, 118–119 Filter Security Interceptor (FSI), Template Method design pattern, 204 245–247 ■H FilterChainProxy bean, 229, 231 filterInvocationDefinitionSource HandlerAdapter interface, 54 property, 232 handleRequest method, 48–49 filterProcessesUrl property, 236 HandlerExecutionChain, 54 FilterToBeanProxy servlet filter class, HandlerInterceptor interface, 103–106 228 HandlerInterceptorAdapter class, 104 servlet, 99–103 HandlerMapping interface, 48, 54 Spring Security, 291 Headway Software, 22 forms Helm, Richard, 11 beans, 74–76 Hessian remoting protocol, 217, 274–275 display, 78–80 Hibernate submission, 81–83 and container support, 23 tags, Spring, 278 HibernateDaoSupport base class, validation, 85–89 193–194 Foundations of AOP for J2EE Development HibernateTransactionManager, 259 (Apress), 34, 224 SessionFactory, 192 Fowler, Martin, 41 transactions, 259 Front Controller pattern home interface (session beans), 157 benefits and concerns, 49 HTTP (HyperText Transfer Protocol) front controller servlet, 42–46 exposing services over, 217 strategies with

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us