D. Merrill, Mashups: The new breed of Web app, IBM developerWorks, 2006.

V. Hoyer and M. Fischer, Market Overview of Enterprise Mashup Tools. Service- Oriented Computing -ICSOC, pp.708-721, 2008.

F. D. Keukelaere, S. Bhola, M. Steiner, S. Chari, and S. Yoshihama, SMash, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.535-544, 2008.
DOI : 10.1145/1367497.1367570

C. Jackson and H. J. Wang, Subspace, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.611-620, 2007.
DOI : 10.1145/1242572.1242655

S. Crites, F. Hsu, and H. Chen, OMash, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.99-108, 2008.
DOI : 10.1145/1455770.1455784

S. Zarandioon, D. Yao, and V. Ganapathy, OMOS: A Framework for Secure Communication in Mashup Applications, 2008 Annual Computer Security Applications Conference (ACSAC), pp.355-364, 2008.
DOI : 10.1109/ACSAC.2008.25

T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, 2009.

D. H. Brown and N. Lockett, E-business, innovation and SMEs: the significance of hosted services and firm aggregations, International Journal of Entrepreneurship and Innovation Management, vol.7, issue.1, pp.92-112, 2007.
DOI : 10.1504/IJEIM.2007.012175

M. Hansen, P. Berlich, J. Camenisch, S. Clauß, A. Pfitzmann et al., Privacy-enhancing identity management, Information Security Technical Report, vol.9, issue.1, pp.35-44, 2004.
DOI : 10.1016/S1363-4127(04)00014-7

R. J. Ennals and M. N. Garofalakis, MashMaker, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.1116-1118, 2007.
DOI : 10.1145/1247480.1247626

T. Close, Web-key: Mashing with permission. W2SP 2008: Web 2.0 Security and Privacy, IEEE Computer Society, 2008.

R. Hasan, M. Winslett, R. Conlan, B. Slesinsky, and N. Ramani, Please Permit Me: Stateless Delegated Authorization in Mashups, 2008 Annual Computer Security Applications Conference (ACSAC), pp.173-182, 2008.
DOI : 10.1109/ACSAC.2008.24

B. Ives, K. R. Walsh, and H. Schneider, The domino effect of password reuse, Communications of the ACM, vol.47, issue.4, pp.75-78, 2004.
DOI : 10.1145/975817.975820

A. Whitten and J. D. Tygar, Why Johnny can't encrypt: a usability evaluation of PGP 5.0, Proceedings of the 8th conference on USENIX Security Symposium - 14 USENIX Association, 1999.

S. Zarandioon, D. Yao, and V. Ganapathy, Privacy-aware identity management for client-side mashup applications, Proceedings of the 5th ACM workshop on Digital identity management, DIM '09, pp.21-30, 2009.
DOI : 10.1145/1655028.1655036

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

A. Shamir, Identity-Based Cryptosystems and Signature Schemes Advances in Cryptology, pp.47-53, 1985.

Z. Guan, Z. Cao, X. Zhao, R. Chen, Z. Chen et al., WebIBC: Identity Based Cryptography for Client Side Security in Web Applications, 2008 The 28th International Conference on Distributed Computing Systems, pp.689-696, 2008.
DOI : 10.1109/ICDCS.2008.24

R. A. Kemmerer, Security issues in distributed software, ACM SIGSOFT Software Engineering Notes, vol.22, issue.6, pp.52-59, 1997.
DOI : 10.1145/267896.267902

J. A. Halderman, B. Waters, and E. W. Felten, A convenient method for securely managing passwords, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.471-479, 2005.
DOI : 10.1145/1060745.1060815

B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2, 2000.
DOI : 10.17487/rfc2898

M. Abadi, K. Bharat, and J. Marais, System and method for generating unique passwords

J. Zibuschka and H. Roßnagel, Implementing Strong Authentication Interoperability with Legacy Systems. Policies and Research in Identity Management, pp.149-160, 2008.
DOI : 10.1007/978-0-387-77996-6_12

R. Dhamija and L. Dusseault, The Seven Flaws of Identity Management: Usability and Security Challenges, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.24-29, 2008.
DOI : 10.1109/MSP.2008.49

J. De-clerq, Single Sign-On Architectures, Proceedings of Infrastructure Security , International Conference, pp.40-58, 2002.
DOI : 10.1007/3-540-45831-X_4

U. Erlingsson, B. Livshits, and Y. Xie, End-to-end Web Application Security, 11th Workshop on Hot Topics in Operating Systems. USENIX Association, 2007.