The solution shall provide indifferently for digital signature and message
authentication codes, considering symmetric and asymmetric authentication schemes as well
as dynamic negotiation of keying material. [Brown]
In the event of redundant attributes within the XML Signature syntax and relevant
cryptographic blobs, XML Signature applications prefer the XML Signature semantics.
[Reagle]