[03]<name>Jenny Smith</name>

[04]<cost>230.0</cost>

[05]<seats>4</seats>

[06]</passengers>

[07]<cardcard>

[08]<name>John Smith</name>

[09]<expirydate>02/2006</expirydate>

[10]<cardnumber>3760 234567 76547</cardnumber>

[11]</cardcard>

[12]<EncryptedData Id="enc1"xmlns="http://www.w3.org/2001/04/xmlenc#">...</EncryptedData> [13]</ticket>

After this user signs and encrypts this document, it would look like Example 2-13.

Example 2-13 The final XML document after encryption

[01] <Signature xmlns="http://www.w3.org/2000/09/xmldsig#">

[02]<SignedInfo>

[03]...

[04]<Reference URI="#order">

[05]<Transforms>

[06]<Transform

Algorithm="http://www.w3.org/2001/04/xmlenc#decryption">

[07]<DataReference URI="#enc1" xmlns="http://www.w3.org/2001/04/xmlenc#"/>

[08]</Transform>

[09]<Transform Algorithm="http://www.w3.org/TR/2000/CR-xml-c14n-20001026"/>

[10]</Transforms>

[11]...

[12]</Reference>

[13]</SignedInfo>

[14]<SignatureValue>...</SignatureValue>

[15]<Object>

[16]<ticket Id="EXTYGH">

[17]<passengers>

[18]<name>Jenny Smith</name>

[19]<cost>230.0</cost>

[20]<seats>4</seats>

[21]</passengers>

[22]<EncryptedData Id="enc2" xmlns="http://www.w3.org/2001/04/xmlenc#">

...</EncryptedData>

[23]<EncryptedData Id="enc1" xmlns="http://www.w3.org/2001/04/xmlenc#">

...</EncryptedData>

[24]</ticket>

[25]</Object>

Chapter 2. Technologies in XML 39

Page 55
Image 55
IBM Version 5 manual Example 2-13 The final XML document after encryption