M. Hansen, H. Krasemann, C. Krause, and M. Rost, Identity management systems IMS): identification and comparison study, 2003.

M. Hansen, A. Pfitzmann, and S. Steinbrecher, Identity management throughout one's whole life, Information Security Technical Report, vol.13, issue.2, pp.83-94, 2008.
DOI : 10.1016/j.istr.2008.06.003

M. Ostdjk, Using the ePassport for online authentication, Telematica Institute, 2009.

B. P. Bruegger, D. Huehnlein, and J. Schwenk, TLS federation ? a secure and relying partyfriendly approach for federated identity management, pp.93-106, 2008.

G. Bottoni and . Dini, Improving authentication of remote card transactions with mobile personal trusted devices, Computer Communications, vol.30, issue.8, pp.1697-1712, 2007.
DOI : 10.1016/j.comcom.2007.02.006

S. Arora, National e-ID card schemes: A European overview, Information Security Technical Report, vol.13, issue.2, pp.46-53, 2008.
DOI : 10.1016/j.istr.2008.08.002

A. Abdul-rahman and S. Hailes, Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000.
DOI : 10.1109/HICSS.2000.926814

A. Josang, Prospectives for modelling trust in information security, Proceedings of the 1997 Australasian Conference on Information Security and Privacy (ACISP)
DOI : 10.1007/BFb0027928

N. Ragouzis, Security Assertion Markup Language (SAML) V2.0 Technical Overview. OASIS Committee Draft Document ID sstc-saml-tech-overview- 2.0-cd-02 http, 2008.