The application of the Data Origin Authentication pattern only provides message integrity.
Service A relies on a shared identity store. Service B has its own identity store. Service C also has its own identity store, but must also access the shared identity store used by Service A . Which service has the least reduction in autonomy as a result of its relationship with identity store mechanism(s)?
The requirement to defer security related state data at runtime relates directly to the application of which service-orientation principle?
The use of XML-Encryption supports the application of the Service Abstraction principle because the actual message remains hidden from the attacker.