R. Clarke, A sufficiently rich model of (id)entity, authentication and authorisation, 2010.

J. Camenisch and E. V. Herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586114

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.7938

D. J. Lutz and R. D. , bridging the gap between privacy and security in multi-domain federations with identity tokens, Third Annual International Conference on Mobile and Ubiquitous Systems, pp.1-3, 2006.

G. Peterson, Introduction to identity management risk metrics, IEEE Security & Privacy Magazine, vol.4, issue.4, pp.88-91, 2006.
DOI : 10.1109/MSP.2006.94

D. Solove, A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, p.477, 2006.
DOI : 10.2307/40041279

I. C. Office, Privacy impact assessment handbook -version 2, 2009.

D. J. Lutz, Secure AAA by Means of Identity Tokens in Next Generation Mobile Environments, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07), p.57, 2007.
DOI : 10.1109/ICWMC.2007.79

C. Ardagna, L. Bussard, S. De-capitani-di-vimercati, G. Neven, and S. Paraboschi, Pedrini: PrimeLife Policy Language, W3C Workshop on Access Control Application Scenarios, 2009.

M. Hansen, Concepts of Privacy-Enhancing Identity Management for Privacy- Enhancing Security Technologies: PRISE conference proceesings: Towards privacy enhancing security technologies -the next steps, pp.91-103, 2009.

M. Iwaihara, K. Murakami, G. J. Ahn, and M. Yoshikawa, Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology, Conceptual Modelling -ER 2008, pp.183-198, 2008.
DOI : 10.1145/1247480.1247531

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.8012

A. Pfitzmann and M. Hansen, Anonymity, Unlinkability, Undetectability, Unobservability , Pseudonymity, and Identity Management A Consolidated Proposal for Terminology -v0, 2007.
DOI : 10.1007/3-540-44702-4_1

L. A. Bygrave, Data Protection Law Approaching Its Rationale, Logic and Limits, 2002.

L. Fritsch, Profiling and Location-Based Services Profiling the European Citizen -Cross-Disciplinary Perspectives, pp.147-160, 2008.

M. Hansen, A. Schwartz, and A. Cooper, Privacy and Identity Management, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.38-45, 2008.
DOI : 10.1109/MSP.2008.41

URL : https://hal.archives-ouvertes.fr/hal-01559639

M. Gregor, W. Dutcher, W. Khan, and J. , An Ontology of Identity Credentials -Part 1: Background and Formulation, National Institute of Standard and Technology, 2006.

J. Camenisch, D. Sommer, S. Fischer-hübner, M. Hansen, H. Krasemann et al., Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005.
DOI : 10.1145/1102486.1102491

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5681

P. Bramhall, M. Hansen, K. Rannenberg, and T. Roessler, User-Centric Identity Management: New Trends in Standardization and Regulation, IEEE Security & Privacy Magazine, vol.5, issue.4, pp.84-87, 2007.
DOI : 10.1109/MSP.2007.99

O. Bar-or and B. Thomas, Openid explained, 2010.

S. R. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H. C. Choi, D-FOAF: Distributed Identity Management with Access Rights Delegation, Lecture Notes in Computer Science, vol.4185, pp.140-154, 2006.
DOI : 10.1007/11836025_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.332.1

M. C. Mont and F. Beato, On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.51-55, 2007.
DOI : 10.1109/POLICY.2007.30

R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2001.

M. T. Siponen and H. Oinas-kukkonen, A review of information security issues and respective research contributions, ACM SIGMIS Database, vol.38, issue.1, pp.60-80, 2007.
DOI : 10.1145/1216218.1216224