Validating sax parser
No provision is made for an explicit version number in this syntax.If a future version is needed, it will use a different namespace.When specifically discussing authentication values based on symmetric secret key codes we use the terms authenticators or authentication codes.(See Check the Security Model, section 8.3.) This specification provides an XML Schema [XML-schema] and DTD [XML]. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this specification are to be interpreted as described in RFC2119 [KEYWORDS]: Consequently, we use these capitalized key words to unambiguously specify requirements over protocol and application features and behavior that affect the interoperability and security of implementations.More specifically, this specification defines an XML signature element type and an XML signature application; conformance requirements for each are specified by way of schema definitions and prose respectively.This specification also includes other useful types that identify methods for referencing collections of resources, algorithms, and keying and management information.This document has been reviewed by W3C Members and other interested parties and has been endorsed by the Director as a W3C Recommendation.
XML Signatures can be applied to any digital content (data object), including XML.
The XML Signature is a method of associating a key with referenced data (octets); it does not normatively specify how keys are associated with persons or institutions, nor the meaning of the data being referenced and signed.