Propose text for requirements for ISSUE-45 Action-387 - Completed

Propose text for requirements for ISSUE-45  - ACTION-387 completed

The XML Security use Cases and Requirements document 
( http://www.w3.org/TR/2009/WD-xmlsec-reqs-20090226/ )
Section 3.3.3 states:

2. Any or all of messages may be signed and/or encrypted zero or more times in any order. Signatures and encryptions may overlap. A receiver must be able to properly verify signatures and decrypt data in the proper order (assuming access to the necessary secrets or trust points) based on nothing but the message.

3. It must be possible to determine whether the correct portions of the message have been signed and encrypted with the correct keys according to policy.



I believe this existing requirement addresses multiple or layered signatures of ISSUE-45
No changes are needed to the requirements document is needed.

Gerald Edgar, CISSP
Enterprise Architecture & Information Security

Received on Friday, 9 October 2009 22:30:12 UTC