This document specifies XML (Extensible Markup Language) digital signature processing rules and syntax. XML Signatures provide integrity, message authentication, and/or signer authentication services for data of any type, whether located within the XML that includes the signature or elsewhere.
RFC Downloads
Cited By
- Magdy A, Mohamed A, Quirchmayr G and Schikuta E Towards a security and privacy protection model for semantic query engines Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, (198-207)
- Meyer C, Feldmann F and Schwenk J Sometimes it's better to be STUCK! SAML transportation unit for cryptographic keys Proceedings of the 15th international conference on Information Security and Cryptology, (110-125)
- Bengtson J, Bhargavan K, Fournet C, Gordon A and Maffeis S (2011). Refinement types for secure implementations, ACM Transactions on Programming Languages and Systems (TOPLAS), 33:2, (1-45), Online publication date: 1-Jan-2011.
- Rönnau S, Pauli C and Borghoff U Merging changes in XML documents using reliable context fingerprints Proceedings of the eighth ACM symposium on Document engineering, (52-61)
- Boyer J Interactive office documents Proceedings of the eighth ACM symposium on Document engineering, (8-17)
- López G, Cánovas O, Gómez A, Jiménez J and Marín R (2007). A network access control approach based on the AAA architecture and authorization attributes, Journal of Network and Computer Applications, 30:3, (900-919), Online publication date: 1-Aug-2007.
- Camenisch J, Gross T and Sommer D Enhancing privacy of federated identity management protocols Proceedings of the 5th ACM workshop on Privacy in electronic society, (67-72)
- Backes M and Groβ T Tailoring the Dolev-Yao abstraction to web services realities Proceedings of the 2005 workshop on Secure web services, (65-74)
- Lopez G, Gomez A, Marin R and Canovas O A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
- Bhargavan K, Fournet C and Gordon A A semantics for web services authentication Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (198-209)
- Bhargavan K, Fournet C and Gordon A (2004). A semantics for web services authentication, ACM SIGPLAN Notices, 39:1, (198-209), Online publication date: 1-Jan-2004.
- Boyer J Bulletproof business process automation Proceedings of the 2003 ACM workshop on XML security, (104-111)
- Perrin T Public key distribution through "cryptoIDs" Proceedings of the 2003 workshop on New security paradigms, (87-102)
- Kuo C and Humenn P Dynamically authorized role-based access control for secure distributed computation Proceedings of the 2002 ACM workshop on XML security, (97-103)
- Geuer-Pollmann C XML pool encryption Proceedings of the 2002 ACM workshop on XML security, (1-9)
- Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G and Stubblebine S Flexible authentication of XML documents Proceedings of the 8th ACM conference on Computer and Communications Security, (136-145)
Recommendations
Dual syntax for XML languages
XML is successful as a machine processable data interchange format, but it is often too verbose for human use. For this reason, many XML languages permit an alternative more legible non-XML syntax. XSLT stylesheets are often used to convert from the XML ...