XML Security, Implement security layers, Part 2
Core technologies -- XML encryption and XML signature
From the developerWorks archives
Date archived: December 6, 2016 | First published: October 30, 2003
A host of emerging technologies, such as Web services, use XML extensively for data exchange. As a result, the security of XML, while in transit as well as when in storage, assumes very high importance. This series explores the technologies that help make XML secure. Part 1 covered the basic plumbing technologies required for XML security. This article builds on that base, covering the core technologies required for XML security -- XML encryption and XML signature. It also goes through the step-by-step process of using these technologies to secure an XML message.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.