7. Contents Requirements - Continue 7.13 The Incident Report should allow application of (external) mechanisms or assertions to assure its authenticity, integrity and non-repudiation can be verified. ------ Suggested use of the general XML security technology – may be applied to any (set of) part of the document XML Signature XML Encryption SAML (Security Assertion ML) for including AuthN/AuthZ tokens XML Web Services Security for possible needs to maintain FINE/IODEF Document status (including also security tokens) |