M. Alsaleh and C. Adams, Enhancing consumer privacy in the liberty alliance identity federation and web servies frameworks, PET'06: Proceedings of the 6th international conference on Privacy Enhancing Technologies, 2006.

D. Balfanz, Sign-out from Google federated login api URL: https://groups.google.com/forum/?fromgroups=#!searchin/google-federated-login-api/sign- out/google-federated-login-api, Google API discussion forum, 2009.

C. P. Cahill, J. Martin, V. Phegade, A. Rajan, and M. W. Pagano, Client-based authentication technology, Proceedings of the 7th ACM workshop on Digital identity management, DIM '11, pp.83-92, 2011.
DOI : 10.1145/2046642.2046659

D. W. Chadwick, G. L. Inman, K. W. Siu, and M. S. Ferdous, Leveraging social networks to gain access to organisational resources, Proceedings of the 7th ACM workshop on Digital identity management, DIM '11, pp.43-52, 2011.
DOI : 10.1145/2046642.2046653

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.251.798

C. Center and . Science, Haka federation URL: http://www.csc.fi/english/institutions/haka, 2006.

R. Dhamija and L. Dusseault, The Seven Flaws of Identity Management: Usability and Security Challenges, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.24-29, 2008.
DOI : 10.1109/MSP.2008.49

. Facebook, Getting started with Facebook login URL: https://developers.facebook.com/ docs/technical-guides/login, p.2012

D. Florêncio and C. Herley, A largescale study of web password habits, Proceeding WWW '07 Proceedings of the 16th international conference on World Wide Web, 2007.

S. Gaw and E. W. Felten, Password management strategies for online accounts, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.44-55, 2006.
DOI : 10.1145/1143120.1143127

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.6196

. Ideelabor and . Openid-in-estonia, URL: http://openiddirectory.com/openid-providers-c-1.html, 2008.

M. Linden and I. Vilpola, An Empirical Study on the Usability of Logout in a Single Sign-on System, Proceedings of the 1st International Conference in Information Security Practice and Experience, 2005.
DOI : 10.1007/978-3-540-31979-5_21

. Microsoft, Windows live id web authentication sdk URL: http://msdn.microsoft.com/en- us/library/bb676633.aspx, 2012.

T. Mustafic, A. Messerman, S. A. Camtepe, A. Schmidt, and S. Albayrak, Behavioral biometrics for persistent single sign-on, Proceedings of the 7th ACM workshop on Digital identity management, DIM '11, pp.73-82, 2011.
DOI : 10.1145/2046642.2046658

O. Community, Openid authentication 2.0 -final URL: http://openid.net/specs/openid- authentication-2 0.html, 2007.

A. Pashalidis and C. J. Mitchell, A Taxonomy of Single Sign-On Systems, Information Security and Privacy -8th Australasian Conference number 2727 in LNCS, pp.249-264, 2003.
DOI : 10.1007/3-540-45067-X_22

J. Pennanen, Wiki nelli metalib URL: https://wiki.helsinki.fi/display, 2009.

N. Ragouzis, J. Hughes, R. Philpott, E. Maler, P. Madsen et al., Security assertion markup language (saml) v2.0 technical overview, OASIS, 2007.

S. Consortium and . Shibboleth, URL: http://shibboleth, p.2012

S. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov, A billion keys, but few locks, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010.
DOI : 10.1145/1900546.1900556

S. Sun, K. Hawkey, and K. Beznosov, OpenIDemail enabled browser, Proceedings of the 6th ACM workshop on Digital identity management, DIM '10, 2010.
DOI : 10.1145/1866855.1866868

S. Sun, E. Pospisil, I. Muslukhov, N. Dindar, K. Hawkey et al., Openidenabled browser: Towards usable and secure web single sign-on, CHI EA '11: Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, 2011.

S. Sun, E. Pospisil, I. Muslukhov, N. Dindar, K. Hawkey et al., What makes users refuce web signle sign-on? an empirical investigation of openid, SOUPS'11: Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011.

S. Suoranta, A. Andrade, and T. Aura, Strong Authentication with Mobile Phone, Information Security, 15th Internation Conference, ISC 2012, number 7483 in LNCS, pp.70-85, 2012.
DOI : 10.1007/978-3-642-33383-5_5

Y. Takeda, S. Kondo, Y. Kitayama, M. Torato, and T. Motegi, Avoidance of performance bottlenecks caused by HTTP redirect in identity management protocols, Proceedings of the second ACM workshop on Digital identity management , DIM '06, 2006.
DOI : 10.1145/1179529.1179535