1. Bhargavan, K., Fournet, C., Gordon, A.D.: Verifying policy based security for web services. In: Proceedings of the 11th ACM conference on Computer and communications security, pp. 268–277 (2004)
2. McIntosh, M., Austel, P.: XML signature element wrapping attacks and countermeasures. In: Proceedings of the 2005 Workshop on Secure Web Services, pp. 20–27 (2005)
3. Jensen, M., Meyer, C., Somorovsky J., Schwenk, J.: On the effectiveness of XML schema validation for countering XML signature wrapping attacks. In: 1st International Workshop on Securing Services on the Cloud (IWSSC), pp. 7–13 (2007)
4. Benameur, A., Kadir, F.A., Fenet, S.: XML rewriting attacks: existing solutions and their limitations. IADIS Appl. Comput. 812(1), 4181–4190 (2008)
5. Bhargavan, K., Fournet, C., Gordon, A.D., O’Shea, G.: An advisor for web services security policies. In: Proceedings of the 2005 Workshop on Secure Web Services, pp. 1–9 (2005)