R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009.
DOI : 10.1145/1594977.1592585

S. Cantor, Shibboleth architecture, protocols and profiles, 2005.

D. Chadwick, Authorisation using attributes from multiple authorities WET- ICE'06, Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.326-331, 2006.
DOI : 10.1109/wetice.2006.22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.394.4320

D. Chadwick, G. Inman, and N. Klingenstein, Authorisation using attributes from multiple authorities?a study of requirements, European Institute for E-Learning (EIfEL), p.366, 2007.

D. Chadwick, G. Inman, and N. Klingenstein, A conceptual model for attribute aggregation, Future Generation Computer Systems, vol.26, issue.7, pp.1043-1052, 2010.
DOI : 10.1016/j.future.2009.12.004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.8396

D. Eastlake and J. S. , Randomness recommendations for security. https://ietf.org/rfc/rfc4086, 2005.
DOI : 10.17487/rfc1750

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.3363

P. S. For-android, Secure element evaluation kit for the android platform -the 'smartcard api'. http://tinyurl.com, 2011.

J. Gemmill, J. Robinson, T. Scavo, and P. Bangalore, Cross-domain authorization for federated virtual organizations using the myVocs collaboration environment, Concurrency and Computation: Practice and Experience, vol.5, issue.4, pp.509-532, 2009.
DOI : 10.1002/cpe.1350

G. D. Gmbh, Mobile security card ve 2.0, 2011.

T. Haaker, S. Smit, J. Vester, K. Shepherd, N. Ito et al., Business models for networked media services, Proceedings of the seventh european conference on European interactive television conference, EuroITV '09, pp.53-56, 2009.
DOI : 10.1145/1542084.1542094

E. Hammer-lahav, Introducing oauth 2.0, 2010. 14. Hammer-Lahav, E. The oauth 1.0 protocol (rfc5849)

I. Paterson and P. S. , Xep-0206: Xmpp over bosh, 2010.

G. Inman, C. , and D. , A privacy preserving attribute aggregation model for federated identity managements systems, Serbian Publication InfoReview joins UPENET, the Network of CEPIS Societies Journals and Magazines, 2010.

A. Jsang, P. , and S. , User-centric identity management, Proceedings of AusCERT 2005, 2005.

D. Recordon, R. , and D. , OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006.
DOI : 10.1145/1179529.1179532

P. Saint-andré, K. Smith, and R. Tronçon, XMPP: the definitive guide. Definitive Guide Series, 2009.

P. M. Schwartz, Property, Privacy, and Personal Data, Harvard Law Review, vol.117, issue.7
DOI : 10.2307/4093335

URL : http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1068&context=facpubs

D. Song and P. Bruza, Towards context sensitive information inference, Journal of the American Society for Information Science and Technology, vol.19, issue.4, pp.54-321334, 2003.
DOI : 10.1002/asi.10213

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.6317