4Eastlake D, Reagle J, Imamura T. XML Encryption Syntax and Processing[EB/OL].W3C Working Draft. http://www.w3.org/TR/xmlenc-core/,2001.
5AES Home Page[EB/OL]. FIPS 197. http://csrc.nist.gov/encryption/aes/,2001.
6Douglas R Stinson. Cryptography Theory and Practice(2nd Edition)[M]. CRC-Press, 2002.114-116.
7Eastlake D, Reagle D, Solo D. XML-Signature Syntax and Proces-sing,RFC 3075[EB/OL]. http://www.w3.org/TR/xmldsig-core/,2002-02.
8Barkley JF, Kuhn R, Rosenthal LS. Role-based Access Control for the Web[EB/OL]. http://csrc.nist.gov/rbac/cals-paper.html,1996.
9Kudo, Hada. XML Document Security Based on Provisional Authorization[C]. Athens:Proceedings of the 7th ACM Conference on Computer and Communications Security, 2000.87-96.
10Secure Hash Standard Specification (SHA-1)[EB/OL]. FIPS PUBS 180-1, http://www.itl.nist.gov/fipspubs/fip180-1.htm,1995-04.