A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Jorge et al., From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?, Proc. IFIP SEC, 2011.
DOI : 10.1007/978-3-642-21424-0_6

E. Birrell and F. B. Schneider, Federated Identity Management Systems: A Privacy-Based Characterization, IEEE Security & Privacy, vol.11, issue.5, pp.36-48, 2013.
DOI : 10.1109/MSP.2013.114

A. Chaabane, G. Acs, and M. A. Kaafar, You are what you like! information leakage through users' interests, Proc. NDSS, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00748162

Y. Cheng, J. Park, and R. Sandhu, Preserving user privacy from third-party applications in online social networks, Proceedings of the 22nd International Conference on World Wide Web, WWW '13 Companion, 2013.
DOI : 10.1145/2487788.2488032

R. Dhamija and L. Dusseault, The Seven Flaws of Identity Management: Usability and Security Challenges, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.24-29, 2008.
DOI : 10.1109/MSP.2008.49

A. Felt and D. Evans, Privacy protection for social networking APIs, Proc. W2SP, 2008.

P. Gill, M. Arlitt, N. Carlsson, A. Mahanti, and C. Williamson, Characterizing Organizational Use of Web-Based Services, ACM Transactions on the Web, vol.5, issue.4, pp.1-1923, 2011.
DOI : 10.1145/2019643.2019646

O. Goga, H. Lei, S. H. Parthasarathi, G. Friedland, R. Sommer et al., Exploiting innocuous activity for correlating users across sites, Proceedings of the 22nd international conference on World Wide Web, WWW '13, 2013.
DOI : 10.1145/2488388.2488428

URL : https://hal.archives-ouvertes.fr/hal-00827649

D. Malandrino, A. Petta, V. Scarano, L. Serra, R. Spinelli et al., Privacy awareness about information leakage, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, 2013.
DOI : 10.1145/2517840.2517868

M. Pennacchiotti and A. Popescu, Democrats, republicans and starbucks afficionados, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, 2011.
DOI : 10.1145/2020408.2020477

M. Shehab, S. Marouf, and C. Hudel, ROAuth, Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, 2011.
DOI : 10.1145/2078827.2078842

S. Sun and K. Beznosov, The devil is in the (implementation) details, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382238

S. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov, A billion keys, but few locks, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010.
DOI : 10.1145/1900546.1900556

S. Sun, E. Pospisil, I. Muslukhov, N. Dindar, K. Hawkey et al., Investigating Users??? Perspectives of Web Single Sign-On, ACM Transactions on Internet Technology, vol.13, issue.1, pp.1-235, 2013.
DOI : 10.1145/2532639

A. Vapen, N. Carlsson, A. Mahanti, and N. Shahmehri, Third-Party Identity Management Usage on the Web, Proc. PAM, 2014.
DOI : 10.1007/978-3-319-04918-2_15

A. Vapen, N. Carlsson, A. Mahanti, and N. Shahmehri, Information sharing and user privacy in the third-party identity management landscape, Proc. ACM CODASPY, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01345104

R. Wang, S. Chen, and X. Wang, Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.30

R. Zafarani and H. Liu, Connecting users across social media sites, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, 2013.
DOI : 10.1145/2487575.2487648