XML Encryption, Requirements and design considerations

I think it is our responsibility to start the discussion.  The motivation
of XML encryption originally came from the needs for transcoding,
where an intermediary ("transcoding proxy") modifies the contents
according to the client's profile, such as the screen size of the client
device and the end-user's preference.  However, it turned out through
many discussions with customers, we found that it is common that
some part of a document need access control and encryption is the
natural way to achieve such access control.

Based our experiences in XML parser, XML signature, and customer
engagements, we wrote a short paper (attached below) on the
requirements and design considerations of XML encryption.  I hope
this will stimuate the discussion!

Hiroshi

(See attached file: xmlenc.html)


--
Hiroshi Maruyama
Manager, Internet & Language Technology, Tokyo Research Laboratory
+81-46-273-4576 (will be changed to +81-46-215-4576 from April 24)
maruyama@jp.ibm.com

Received on Tuesday, 18 April 2000 19:51:38 UTC