D. Hardt, Oauth 2.0 authorization protocol, 2012.

I. Iec, ISO/IEC 24760-1:2011 Information technology ? Security techniques ? A framework for identity management ? Part 1: Terminology and concepts, First edition, pp.2011-2023, 2011.

K. Rannenberg, Multilateral security a concept and examples for balanced security, Proceedings of the 2000 workshop on New security paradigms , NSPW '00, pp.151-162, 2000.
DOI : 10.1145/366173.366208

S. Brands, Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy, 2000.

J. Camenisch and E. Van-herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002.
DOI : 10.1145/586110.586114

P. Bichsel, J. Camenisch, M. Dubovitskaya, R. R. Enderlein, S. Krenn et al., Architecture for Attribute-based Credential Technologies -Final Version, 2014.