XML Security Threats and Holes
I. Introduction
a. What is XML?
b. Where XML is used and why.
c. Emerging XML developments.
II. XML Security Requirements
a. Encryption
b. Digital Signatures
a. Why there is a high risk?
b. How security is bypassed.
c. Code sharing and open source code.
d. What can be done?
IV. Conclusion