The goal of this paper is to formalize various processing approaches to the process of verification of the web services integrity and to show its vulnerability to many attacks. After introducing the necessary terminology, several processing approaches are particularized and its security drawbacks concerning notably XML Signature W3C Recommendation are divided into several areas, analyzed, and the solutions are described and compared If the solution of the particular problem does not exist, or is not yet fully standardized, it is marked as an open problem and the solution is proposed.
展开▼