O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

14.5. Security Considerations

Many complex security considerations apply to operating or using an XML key management service with capabilities along the lines of those described in this chapter. Attention should be paid to the security considerations given in the other chapters of this book as well as the considerations raised in [XKMS].

Anyone seriously interested in these questions should at least monitor and perhaps become active in the W3C XKMS working group [XKMS WG].

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required