XML Security Introduction*
- There is a requirement to ensure the integrity (via signature) and
confidentiality (via encryption) of parts of XML
- Operating on a "bucket of bits" is easy. Operating on parts of XML
documents requires the identification and processing of XML in both an
abstract (data model) and consistently serialized (octets) manner.
- These activities are not only applications using XML, they also must
address questions about XML, such as selecting subsets of a document, and
then canonicalizing them.
- This is different from access control, authentication and authorization
which have fewer issues with XML, but face tricky questions about