A sufficiently rich model of (id)entity, authentication and authorisation, 2010. ,
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586114
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.7938
bridging the gap between privacy and security in multi-domain federations with identity tokens, Third Annual International Conference on Mobile and Ubiquitous Systems, pp.1-3, 2006. ,
Introduction to identity management risk metrics, IEEE Security & Privacy Magazine, vol.4, issue.4, pp.88-91, 2006. ,
DOI : 10.1109/MSP.2006.94
A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, p.477, 2006. ,
DOI : 10.2307/40041279
Privacy impact assessment handbook -version 2, 2009. ,
Secure AAA by Means of Identity Tokens in Next Generation Mobile Environments, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07), p.57, 2007. ,
DOI : 10.1109/ICWMC.2007.79
Pedrini: PrimeLife Policy Language, W3C Workshop on Access Control Application Scenarios, 2009. ,
Concepts of Privacy-Enhancing Identity Management for Privacy- Enhancing Security Technologies: PRISE conference proceesings: Towards privacy enhancing security technologies -the next steps, pp.91-103, 2009. ,
Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology, Conceptual Modelling -ER 2008, pp.183-198, 2008. ,
DOI : 10.1145/1247480.1247531
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.8012
Anonymity, Unlinkability, Undetectability, Unobservability , Pseudonymity, and Identity Management A Consolidated Proposal for Terminology -v0, 2007. ,
DOI : 10.1007/3-540-44702-4_1
Data Protection Law Approaching Its Rationale, Logic and Limits, 2002. ,
Profiling and Location-Based Services Profiling the European Citizen -Cross-Disciplinary Perspectives, pp.147-160, 2008. ,
Privacy and Identity Management, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.38-45, 2008. ,
DOI : 10.1109/MSP.2008.41
URL : https://hal.archives-ouvertes.fr/hal-01559639
An Ontology of Identity Credentials -Part 1: Background and Formulation, National Institute of Standard and Technology, 2006. ,
Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005. ,
DOI : 10.1145/1102486.1102491
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5681
User-Centric Identity Management: New Trends in Standardization and Regulation, IEEE Security & Privacy Magazine, vol.5, issue.4, pp.84-87, 2007. ,
DOI : 10.1109/MSP.2007.99
Openid explained, 2010. ,
D-FOAF: Distributed Identity Management with Access Rights Delegation, Lecture Notes in Computer Science, vol.4185, pp.140-154, 2006. ,
DOI : 10.1007/11836025_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.332.1
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.51-55, 2007. ,
DOI : 10.1109/POLICY.2007.30
Security Engineering: A Guide to Building Dependable Distributed Systems, 2001. ,
A review of information security issues and respective research contributions, ACM SIGMIS Database, vol.38, issue.1, pp.60-80, 2007. ,
DOI : 10.1145/1216218.1216224