Requirements: CryptoProcessing

Requirements: Format Table-of-Contents Requirements: Coord
Change-size

Cryptography

  1. The solution shall provide indifferently for digital signature and message authentication codes, considering symmetric and asymmetric authentication schemes as well as dynamic negotiation of keying material. [Brown]

Processing

  1. In the event of redundant attributes within the XML Signature syntax and relevant cryptographic blobs, XML Signature applications prefer the XML Signature semantics. [Reagle]

Joseph Reagle, XML Signature Co-Chair

W3C Logo IETF Logo

10 of 11