An organization has business logic implemented in EJB components. Current clients use
container-managed, role-based security to access the business logic using RMI. Management has
determined that the business logic must be made available to non-RMI clients using a Web
service.
Which container-managed Web service security mechanism would the development team? use to
allow Web service clients to use the current security model? (Choose one)
A.
XKMS
B.
XACML
C.
XML Digital Signature
D.
HTTP Basic Authentication
E.
annotations mapped to the JAX-WS runtime