[1] Bertino E, Castano S, Ferrari E. On specifying security policies for Web documents with an XML-based, language [J]. ACM Symposium on Access Control Models and Technologies, Fairfax, VA, May 2001.
[2] W3C. XML 1.0 Recommendation[EB/OL]. http://www.w3.org/TR/1998/REC-xml-19980210, February 1998.
[3] W3C. XML-Signature Syntax and Processing[EB/OL]. http://www.w3.org/TR/2001/, August 2001.
[4] Frank Boumphrey. Professional XML applications [M]. WROX, 1999.
[5] Elisa bertino, Barbara carminat. XML security [EB/OL]. Report http://www.elsevier.com, 2001.
[6] Dr. Shimshon Berkovits. Public key infrastructure study [EB/OL]. Final Report, 1994.
[7] Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978.
[8] ElGamal T. A public-key cryptosystem and a signature scheme based on discrete [J]. Communications of the ACM, April 1985.
[9] Microsoft. SDK cryptography, smart card cryptography[EB/OL]. http://www.micosoft.com. August 1999.
[10] Schneier B. Applied cryptography [M]. Wiley, 1996.