1[1]Rich Salz. Securing Web Services[C].In:O'Reilly Emerging Technology Conference, 2003-04
2[2]Martin Naedele. Standards for XML and Web Services Security[J].Computer, 2003; 36 (4)
3[3]Mark Bartel,John Boyer,Barb Fox et al.XML-Signature Syntax and Processing. W3C Recommendation, http://www.w3 .org/TR/2002/RECxmldsig-core-20020212/
4[4]Takeshi Imamura,Blair Dillaway,Ed Simon. XML Encryption Syntax and Processing. W3C Recommendation, http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/
5[5]OASIS Security Services TC.Assertions and Protocol for the OASIS Security Assertion Markup Language(SAML)[S].OASIS Standard,http://www.oasis-open.org/committees/security / , 2002-11
6[6]OASIS Access Control Markup Language TC.eXtensible Access Control Markup Language(XACML)Version 1.0[S].OASIS Standard,http://www.oasis-open.org/committees/xacml/, 2003-02
7[7]OASIS Rights Language TC.eXtensible rights Markup Language(XrML)Core 2.1 Specification.http://www.oasis-open.org/committees/rights/,2002-05
8[8]XML Key Management Specification(XKMS)Version 2.0.W3C Working Draft.http://www.w3.org/TR/2oo3/WD-xkms2-200304 18/, 2003-04
9[9]IBM,Microsoft,VeriSign. Web Services Security(WS-Security)Version 1.0.http://www.ibm.com/developerworks/library/ws-secure/, 2002-04