Chapter 10: Security
The InfoPath security model is based on the Internet Explorer model, which attempts to protect your computer from unsafe operations by using security zones and levels.In this chapter you explore the model in more detail and see how InfoPath also allows for other form security measures, including protecting form design, managing operations such as form merging and submission, and installing trusted forms.You also review the way digital signatures are implemented in InfoPath and take a brief tour of the more important features of XML Digital Signature.