O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. XML Security Implementations

The existence of numerous independent, interoperable implementations shows the vitality of a protocol. In fact, the existence of such implementations is a key criterion for advancing beyond the first rung of the IETF standardization ladder.

Explicit interoperability testing has been performed for Canonical XML, XMLDSIG, XML Encryption, and Exclusive XML Canonicalization. Furthermore, several sources have indicated the availability of toolkits, software development kits (SDKs), source code, or test vectors for these standards and XKMS.

The latest Canonical XML interoperability matrix is found at

http://www.w3.org/Signature/2000/10/10-c14n-interop.html

and is linked off the XMLDSIG Working Group site [XMLDSIG ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required