Summary
In this chapter you learned that the InfoPath security model is based on that of Internet Explorer. You learned about the distinctions between URL-based forms and URN-based trusted forms, and how to create trusted forms, using both scripting and the Form Registration tool, and also how to install them. You also saw how InfoPath provides other types of security measures, including protecting form design, along with managing operations such as form merging and submission.XML Signature is an important standard for developing validated business communication. You should now have a grasp of its purpose and functions and how it is implemented in InfoPath.