W3C

Test cases for XMLSig Interoperability

W3C Working document July 2007

This version:
Author:
Juan Carlos Cruellas, UPC<cruellas@ac.upc.es>
Editors:
Juan Carlos Cruellas, UPC<cruellas@ac.upc.es>
more editors names to be added HERE
Contributor:

Abstract

This working document defines test cases for interoperability tests for [XMLDSIG] in the light of two areas that have suffered changes since its publication of XMLSig, namely: xml namespace attributes management in canonicalization and the encoding as strings of Distinguished Names in X.509 certificates. This document also includes references to testcases already developed by the [XMLDSIG] working group.

Status of this Document

This document is a working document of the World Wide Web Consortium XML Security Specifications Maintenance Working Group. For further details of the activity of this group, please see XML Security Specifications Maintenance Working Group.

Table of Contents

1 Introduction
    1.1 Test cases notation
    1.2 Codes for Recommendation References
    1.3 Codes for Issues and Sub-Issues
2 Test cases specification
    2.1 Legacy XMLSig Working Group test cases
    2.2 Test cases on Canonicalization 1.1
        2.2.1 Test cases for xml:lang attribute
        2.2.2 Test cases for xml:space attribute
        2.2.3 Test cases for xml:id attribute
        2.2.4 Test cases for xml:base attribute
    2.3 Test cases on implicit/explicit rules for canonicalization
    2.4 Test cases on String encoding of Distinguished Names
3 References

Appendix

A Author's Adress (Non-Normative)


1 Introduction

Test cases will consist in signed XML documents. XML signatures will be generated according to the details specified in the present document.

There will be positive (signatures that will be valid) and negative (signatures created breaking some rules of the recommendations).

Applications will verify these signatures and check if both they verify valid signatures as valid and if they detect invalid signatures.

1.1 Test cases notation

This section summarizes the notation used for identification of test cases.

A test case identifier will match the following pattern:

RecommendationRef.SpecificIssue[.SpecificSub-Issue]#TestNumber-(positive | negative | caveat)

The RecommendationRef part identifies the source recommendation for the test case.

The SpecificIssue part identifies the issue to be tested by the test case. The optional SpecificSub-Issue part further refines the issue to be tested.

The TestNumber numbers the test case. It must be an integer number or an integer number followed by a lower letter.

The last part of the test case identifier will be one of the following three values:

  • positive: this indicates that the signature provided as test case is a valid signature. Applications must verify it as valid.

  • negative: this indicates that there is something wrong in the signature provided as test case that applications must detect and raise a result of signature invalid.

  • caveat:
    Editorial note: Juan Carlos Cruellas 
    the idea is that we could find some cases where some caveat should be made (think of some cases of DN encoded as strings when using attributes not presents in [RFC-4514]

Sub-sections below identify codes used throughout the present document

1.2 Codes for Recommendation References

The following codes are used for identifying the source recommendations for the test cases:

1.3 Codes for Issues and Sub-Issues

The following codes are used for identifying the issues and sub-issues for the test cases:

  • defCanXML: this code is used in all the test cases dealing with the [XMLDSIG] implicit and explicit rules managing the final canonicalization that precedes the digest computation..

  • xmllang: this code is used in all the test cases dealing with management of xml:lang attribute.

  • xmlspace: this code is used in all the test cases dealing with management of xml:space attribute.

  • xmlid: this code is used in all the test cases dealing with management of xml:id attribute.

  • xmlbase: this code is used in all the test cases dealing with management of xml:base attribute.

  • dnString: this code is used in all the test cases dealing with the string encoding of Distinguished Names in X.509 certificates.

2 Test cases specification

The following sub-sections contain the specification of the different test cases grouped by recommendation and issues.

2.1 Legacy XMLSig Working Group test cases

Editorial note: Juan Carlos Cruellas 
To be referenced from here

2.2 Test cases on Canonicalization 1.1

The set of test cases in this section deal with the canonicalization of a XML data object, which contains elements with attributes in the xml namespace just before computing its digest.

General rules for these test cases:

  • In all these test cases the ds:KeyInfo element will ONLY contain the X509 signing certificate.

  • In all these test cases the ds:Transforms element will contain a sequence of two transforms:

    • The first one will contain a XPath filter that depends on the test case.

    • The second one will reference the [XML-C14N].

2.2.1 Test cases for xml:lang attribute

The set of test cases in this section deal with the canonicalization of a XML data object, which contains elements with xml:lang attributes.

Test case canXML11.xmllang#1-positive
Input detailsRationaleLinks to test cases
To-Be-Signed (TBS henceforth) data object with ONLY a xml:lang attribute in a certain element e whose content includes other elements. The ds:Transform contains a XPath expression whose result is a node set that includes element e.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmllang#2-positive
Input detailsRationaleLinks to test cases
TBS data object with ONLY a xml:lang attribute in a certain element e whose content includes other elements. The ds:Transform contains a XPath expression whose result is a node set that DOES NOT include neither element e nor any of its children elements.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmllang#2-negative
Input detailsRationaleLinks to test cases
As canXML11.xmllang#1-positive but now the digest will have been computed on the outcome of the transformation manipulated for containing an element with a xml:lang attribute.Check that implementations of [XML-C14N1.1] do not give a false positive when an element in the output of the XPath filtering inherits an undesired xml:lang attribute from a discarded element.

Test case canXML11.xmllang#3-positive
Input detailsRationaleLinks to test cases
TBS with ONLY a xml:lang attribute in a certain element e whose content includes a sequence of only one element. The ds:Transform contains a XPath expression whose result is a node set that DOES NOT include element e but includes its child element.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmllang#3-negative
Input detailsRationaleLinks to test cases
As canXML11.xmllang#3-positive but now the digest will have been computed on the outcome of the transformation manipulated for containing the child from e element without a xml:lang attribute.Check that implementations of [XML-C14N1.1] do not give false positive results.

Test case canXML11.xmllang#4-positive
Input detailsRationaleLinks to test cases
TBS with ONLY a xml:lang attribute in a certain element e whose content includes a sequence of more than one element (these children may in turn contain children elements). The ds:Transform contains a XPath expression whose result is a node set that DOES NOT include element e but includes more than one of its children elements.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmllang#4-negative
Input detailsRationaleLinks to test cases
As canXML11.xmllang#1-positive but now the digest will have been computed on the outcome of the transformation manipulated for containing more than one e element children without the xml:lang attribute.Check that implementations of [XML-C14N1.1] do not give false positive results.

2.2.2 Test cases for xml:space attribute

The set of test cases in this section deal with the canonicalization of a XML data object, which contains elements with xml:space attributes.

Test case canXML11.xmlspace#1-positive
Input detailsRationaleLinks to test cases
TBS data object with ONLY a xml:space attribute in a certain element e whose content includes other elements. The ds:Transform contains a XPath expression whose result is a node set that includes element e.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmlspace#2-positive
Input detailsRationaleLinks to test cases
TBS data object with ONLY a xml:space attribute in a certain element e whose content includes other elements. The ds:Transform contains a XPath expression whose result is a node set that DOES NOT include neither element e nor any of its children elements.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmlspace#2-negative
Input detailsRationaleLinks to test cases
As canXML11.xmlspace#1-positive but now the digest will have been computed on the outcome of the transformation manipulated for containing an element with a xml:space attribute.Check that implementations of [XML-C14N1.1] do not give a false positive when an element in the output of the XPath filtering inherits an undesired xml:space attribute from a discarded element.

Test case canXML11.xmlspace#3-positive
Input detailsRationaleLinks to test cases
TBS with ONLY a xml:space attribute in a certain element e whose content includes a sequence of only one element. The ds:Transform contains a XPath expression whose result is a node set that DOES NOT include element e but includes its child element.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmlspace#3-negative
Input detailsRationaleLinks to test cases
As canXML11.xmlspace#3-positive but now the digest will have been computed on the outcome of the transformation manipulated for containing the child from e element without a xml:space attribute.Check that implementations of [XML-C14N1.1] do not give false positive results.

Test case canXML11.xmlspace#4-positive
Input detailsRationaleLinks to test cases
TBS with ONLY a xml:space attribute in a certain element e whose content includes a sequence of more than one element (these children may in turn contain children elements). The ds:Transform contains a XPath expression whose result is a node set that DOES NOT include element e but includes more than one of its children elements.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmlspace#4-negative
Input detailsRationaleLinks to test cases
As canXML11.xmlspace#1-positive but now the digest will have been computed on the outcome of the transformation manipulated for containing more than one e element children without the xml:space attribute.Check that implementations of [XML-C14N1.1] do not give false positive results.

2.2.3 Test cases for xml:id attribute

The set of test cases in this section deal with the canonicalization of a XML data object, which contains elements with xml:id attributes.

Test case canXML11.xmlid#1-positive
Input detailsRationaleLinks to test cases
TBS with ONLY a xml:id. attribute in a certain element e whose content includes other elements. The ds:Transform contains a XPath expression whose result is a node set that includes element e.Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmlid#1-negative
Input detailsRationaleLinks to test cases
As canXML11.xmlid#1-positive but now the digest will have been computed on the outcome of the transformation manipulated for containing the e element without the xml:id attribute.Check that implementations of [XML-C14N1.1] do not give false positive results.

Test case canXML11.xmlid#2-positive
Input detailsRationaleLinks to test cases
TBS with ONLY a xml:id. attribute in a certain element e whose content includes other elements. The ds:Transform contains a XPath expression whose result is a node set that DOES NOT include the element e but some of the children of the element e..Check that implementations of [XML-C14N1.1] keep behavior as defined in [XML-C14N]

Test case canXML11.xmlid#2-negative
Input detailsRationaleLinks to test cases
As in canXML11.xmlid#2-positive but now the digest will have been computed on the outcome of the transformation manipulated for including in one of the e children element the xml:id attribute.Check that implementations of [XML-C14N1.1] do not give false positive results.

2.2.4 Test cases for xml:base attribute

The set of test cases in this section deal with the canonicalization of a XML data object, which contains elements with xml:base attributes.

Editorial note: Juan Carlos Cruellas 
To be completed. The idea is to have two sets of test cases: one that checks that the attribute is inherited by children. The second set will check that the processing of the relative URIs is correctly performed.

2.3 Test cases on implicit/explicit rules for canonicalization

The set of test cases in this section deal with the [XMLDSIG] Sig implicit and explicit rules that manage the contents of the ds:Transforms element concerning the default/not default canonicalization of a XML data object just before computing its digest.

General rules for these test cases:

  • In all these test cases the ds:KeyInfo element will ONLY contain the X509 signing certificate.

  • Test cases will contain a ds:Transforms element with one child, containing a XPath filter that depends on the test case.

Test case xmlSig.defCan#1-positive
Input detailsRationaleLinks to test cases
TBS with a xml:lang attribute in a certain element e whose content includes other elements. ds:Transforms contains only one child: a ds:Transform with only one child. This child contains a XPath expression whose result is a node set that includes some of the children of e but not e itself. The signing application will apply [XML-C14N]. This recommendation correctly deals with xml:lang attribute.Check that implementations of [XML-C14N1.1] work correctly with default canonicalization behavior and take [XML-C14N].

Test case xmlSig.defCan#2-positive
Input detailsRationaleLinks to test cases
TBS with a xml:space attribute in a certain element e whose content includes other elements. ds:Transforms contains only one child: a ds:Transform with only one child. This child contains a XPath expression whose result is a node set that includes some of the children of e but not e itself. The signing application will apply [XML-C14N]. This recommendation correctly deals with xml:space attribute.Check that implementations of [XML-C14N1.1] work correctly with default canonicalization behavior and take [XML-C14N].

Test case xmlSig.defCan#3-negative
Input detailsRationaleLinks to test cases
TBS with a xml:id attribute in a certain element e whose content includes other elements. ds:Transforms contains only one child: a ds:Transform with only one child. This child contains a XPath expression whose result is a node set that includes some of the children of e but not e itself. The signing application will apply [XML-C14N]. This recommendation mandates that children of e inherit xml:id, which is uncorrect.Check that implementations of [XMLDSIG] identify the problem.

Test case xmlSig.defCan#4-negative
Input detailsRationaleLinks to test cases
TBS with a xml:base attribute in a certain element e whose content includes other elements. ds:Transforms contains only one child: a ds:Transform with only one child. This child contains a XPath expression whose result is a node set that includes some of the children of e but not e itself. The signing application will apply [XML-C14N]. This recommendation mandates that children of e inherit xml:base, which is uncorrect.Check that implementations of [XMLDSIG] identify the problem.

Editorial note: Juan Carlos Cruellas 
What should be done in case a Signature is computed in the following conditions?: The TBS data object contains an element with a xml namespace attribute other than xml:id. and with one or more children elements in its content. Before computing the digest, the following transforms are applied: first a XPath transform that generates an output that inclues some of the children of e but not e itself; and secondly a base64 encoding. In this situation situation no canonicalization is done as the input to the digest computation is a byte stream. Furthermore the xml namespace attribute in e is lost from what is digested and signed. Is this a desired or undesired behavior? Should the applications detect this loss and react?.

2.4 Test cases on String encoding of Distinguished Names

The set of test cases in this section deal with the representation of Distinguished Names as Strings.

The following rules apply in all the test cases specified in the present section:

  • The TBS data object to be will be a binary object.

  • The signature will be enveloping (not interferences of canonicalization issues).

  • The ds:KeyInfo element will contain ONLY one element ds:X509Data whose contents will be as follows:

    • One ds:X509SubjectName element with the distinguished name encoded as a String.

    • Two ds:X509Certificate elements containing: the signing certificate and a self-signed certificate of a CA that applications will consider trusted root CA. This is to force applications to look for the signing certificate comparing the subject name in the certificate with the subject name appearing in the X509SubjectName element.

      Note that there are two ways of doing this:

      1. Take the ds:X509SubjectName and convert to a Distinguished Name BER encoded, and compare with the BER encoded Distinguished Name in the X509 certificates. This may bring to the problems identified in [RFC-4514] (the tags of the specific string type are lost in the string encoding).

      2. Take the certificates and convert their subjectName fields into strings as per [RFC-4514]. This might bring interoperability problems with attributes with short name not tabulated in the standards if a private short name is used instead of dot-notation/hexadecimal encoding.

Each test case needs a different certificate, as it is the subjectName field encoding what is being tested.

Test case xmlSig.dnString#1-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514] section 3.

  • None of the RelativeDistinguishedNames attribute values contain any character that [RFC-4514] mandates to escape.

Check that implementations interoperate with easy situations.

Test case xmlSig.dnString#2-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4512].

  • None of the RelativeDistinguishedNames attribute values contain any character that [RFC-4514] mandates to escape.

Check that implementations incorporate descriptors tabulated in [RFC-4514] AND descriptors specified in [RFC-4512].

Test case xmlSig.dnString#3-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one starting space character (U+0020). The escaping mechanism will be space character preceded by the backslash character (‘\’ U+005C).

Check that implementations correctly manage escaping of starting space character.

Test case xmlSig.dnString#4-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one trailing space character (U+0020). The escaping mechanism will be ‘\20’.

Check that implementations correctly manage escaping of trailing space characters.

Test case xmlSig.dnString#5-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one escaped null characters (U+00). The escaping mechanism will be a backslash followed of a by a two digit hex number showing its Unicode point number.

Check that implementations correctly manage escaping of the null character (starting character of the ASCII control characters group).

Test case xmlSig.dnString#5-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one null character (U+00) not escaped as specified by [XMLDSIG]

Check that implementations catch the escaping error.

Test case xmlSig.dnString#6-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one escaped ASCII control characters U+1d. The escaping mechanism will be a backslash followed of a by a two digit hex number showing its Unicode point number.

Check that implementations correctly manage escaping of an ASCII control character that is neither the first nor the final character of the group.

Test case xmlSig.dnString#6-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one ASCII control characters U+1d not escaped as specified by [XMLDSIG].

Check that implementations catch the escaping error.

Test case xmlSig.dnString#7-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one escaped ASCII control characters U+1f. The escaping mechanism will be a backslash followed of a by a two digit hex number showing its Unicode point number.

Check that implementations correctly manage escaping of the last ASCII control characters group.

Test case xmlSig.dnString#7-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will have one or more than one not-escaped ASCII control characters U+1f.

Check that implementations catch the error.

Test case xmlSig.dnString#8-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters in the following group: '+', ',', ';', and '\.'

Check that implementations correctly manage escaping of all the special characters (except '"', ‘<’ and ‘>’)..

Test case xmlSig.dnString#8a-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters '+' not escaped.

Check that implementations catch the error.

Test case xmlSig.dnString#8b-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters ';' not escaped.

Check that implementations catch the error.

Test case xmlSig.dnString#8c-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters ',' not escaped.

Check that implementations catch the error.

Test case xmlSig.dnString#8d-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters '\' not escaped.

Check that implementations catch the error.

Test case xmlSig.dnString#9-positive
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters in the following group: '"', '<', and '>'.

Check that implementations correctly manage escaping the sub-group of special characters '"', ‘<’ and ‘>’.

Test case xmlSig.dnString#9a-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters '"' not escaped.

Check that implementations catch the error.

Test case xmlSig.dnString#9b-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters '<' not escaped.

Check that implementations catch the error.

Test case xmlSig.dnString#9c-negative
Input detailsRationaleLinks to test cases
The signing certificate will have a SubjectName field with the following restrictions:
  • All the RelativeDistinguishedNames attribute types have a short name (descriptor) tabulated in [RFC-4514].

  • Some RelativeDistinguishedNames attribute value will contain one or more special characters '>' not escaped.

Check that implementations catch the error.

3 References

RFC 4512
RFC 4512: Lightweight Directory Access Protocol (LDAP): Directory Information Models. K. Zeilenga, Ed. June 2006. http://www.ietf.org/rfc/rfc4512txt

RFC 4514
RFC 4514: Lightweight Directory Access Protocol (LDAP): String Representation of Distinguished Names. K. Zeilenga, Ed. June 2006. http://www.ietf.org/rfc/rfc4514.txt

URI
RFC 2396: Uniform Resource Identifiers (URI): Generic Syntax. T. Berners-Lee, R. Fielding, U.C. Irvine, L. Masinter. August 1998. http://www.ietf.org/rfc/rfc2396.txt

XML
Extensible Markup Language (XML) 1.0 (Second Edition). W3C Recommendation. T. Bray, E. Maler, J. Paoli, C. M. Sperberg-McQueen. October 2000. http://www.w3.org/TR/2000/REC-xml-20001006

XML-C14N
Canonical XML. Version 1.0. W3C Recommendation. John Boyer. March 2001. http://www.w3.org/TR/2001/REC-xml-c14n-20010315://www.w3.org/TR/2000/REC-xml-20001006

XML-C14N1.1
Canonical XML. Version 1.1. W3C Candidate Recommendation. John Boyer, Glenn Marcy. June 2007. http://www.w3.org/TR/2001/REC-xml-c14n-20010315://www.w3.org/TR/2000/REC-xml-2000100

XMLDSIG
XML-Signature Syntax and Processing. W3C Recommendation. Donald Eastlake, Joseph Reagle, David Solo. February 2002. http://www.w3.org/TR/xmldsig-core/

XML-schema-part-1
XML-Schema Part 1: Structures. W3C Recommendation. D. Beech, M. Maloney, N. Mendelsohn, H. Thompson. May 2001. http://www.w3.org/TR/2001/REC-xmlschema-1-20010502/

XML-schema-part-2
XML-Schema Part 2: Datatypes. W3C Recommendation. P. Biron, A. Malhotra. May 2001. http://www.w3.org/TR/2001/REC-xmlschema-2-20010502/

XMLSECMAINT
XML Security Specifications Maintenance Working Group.http://www.w3.org/2007/xmlsec/

X509v3
ITU-T Recommendation X.509 version 3 (1997). "Information Technology - Open Systems Interconnection - The Directory Authentication Framework" ISO/IEC 9594-8:1997.

X509Prof
RFC 2459: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. R. Housley, W. Polk, D. Solo. January 1999. http://www.ietf.org/rfc/rfc2459.txt

A Author's Adress (Non-Normative)

Juan Carlos Cruellas Ibarz

Universitat Politecnica de Catalunya (UPC)

Departament de Arquitectura de Computadors (DAC)

c/ Jordi Girona 1-3, Modul D6.103, Barcelona

Spain

Phone: +34 93 4016790

Email: mailto:cruellas@ac.upc.es