URL: http://www.oasis-open.org/committees/download.php/6539/sstc-saml-authn-context-2.0-draft-04a-diff.pdf
URL: http://xml.coverpages.org/ws-policyV11.pdf
URL: http://xml.coverpages.org/ws-policyassertionsV11.pdf
URL: http://xml.coverpages.org/ws-policyattachmentV11.pdf
URL: http://xml.coverpages.org/xacml-schema-policy-v15.pdf
URL: http://www.w3.org/TR/xkms2/
There
is no single technology that can be called Secure XML. In general, this
aggregate technology addresses the use of XML to perform policy exchange,
perform authentication, and perform key management in a robust and secure
fashion.
Most
of these XML exchanges would typically be performed with SOAP and encryption
would be supplied by TLS or HTTPS (not listed in the URLs).
Keywords:
|