G. Ahn and M. Ko, User-centric privacy management for federated identity management, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), pp.187-195, 2007.
DOI : 10.1109/COLCOM.2007.4553829

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.4406

E. Bangerter, J. Camenisch, and A. Lysyanskaya, A Cryptographic Framework for the Controlled Release of Certified Data, Security Protocols Workshop, pp.20-42, 2004.
DOI : 10.1007/3-540-45682-1_31

M. Bellare and C. Namprempre, Authenticated Encryption: Relations among Notions and??Analysis of the Generic Composition Paradigm, Journal of Cryptology, vol.13, issue.3, pp.469-491, 2008.
DOI : 10.1007/978-3-540-30556-9_27

V. Bertocci, G. Serack, and C. Baker, Understanding windows cardspace: an introduction to the concepts and challenges of digital identities, 2007.

J. Camenisch, D. Sommer, S. Fischer-hübner, M. Hansen, H. Krasemann et al., Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005.
DOI : 10.1145/1102486.1102491

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5681

D. W. Chadwick, Federated Identity Management, FOSAD, 2008.
DOI : 10.1002/cpe.1313

URL : https://hal.archives-ouvertes.fr/hal-01489959

D. W. Chadwick, G. Inman, and N. Klingenstein, A conceptual model for attribute aggregation, Future Generation Computer Systems, vol.26, issue.7, 2010.
DOI : 10.1016/j.future.2009.12.004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.8396

A. Jøsang and S. Pope, User centric identity management, Asia Pacific Information Technology Security Conference, 2005.

R. L. Morgan, S. Cantor, S. Carmody, W. Hoehn, and K. Klingenstein, Federated security : The shibboleth approach, EDUCAUSE Quarterly, 2004.

I. Naumann and G. Hogben, Privacy features of European eID card specifications, Network Security, vol.2008, issue.8, 2009.
DOI : 10.1016/S1353-4858(08)70097-7

M. Pala, S. Sinclair, and S. Smith, Portable credentials via proxy certificates in web environments, Public Key Infrastructures, Services and Applications, 2011.
DOI : 10.1007/978-3-642-22633-5_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.9058

D. Recordon and D. Reed, OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006.
DOI : 10.1145/1179529.1179532

S. Suriadi, E. Foo, and A. Jøsang, A user-centric federated single sign-on system, Journal of Network and Computer Applications, vol.32, 2009.
DOI : 10.1109/icnpcw.2007.4351466

URL : http://eprints.qut.edu.au/13122/1/13122a.pdf

J. Vossaert, J. Lapon, B. D. Decker, and V. Naessens, User-centric identity management using trusted modules, Public Key Infrastructures, Services and Applications, 2011.
DOI : 10.1007/978-3-642-22633-5_11