User-centric privacy management for federated identity management, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), pp.187-195, 2007. ,
DOI : 10.1109/COLCOM.2007.4553829
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.4406
A Cryptographic Framework for the Controlled Release of Certified Data, Security Protocols Workshop, pp.20-42, 2004. ,
DOI : 10.1007/3-540-45682-1_31
Authenticated Encryption: Relations among Notions and??Analysis of the Generic Composition Paradigm, Journal of Cryptology, vol.13, issue.3, pp.469-491, 2008. ,
DOI : 10.1007/978-3-540-30556-9_27
Understanding windows cardspace: an introduction to the concepts and challenges of digital identities, 2007. ,
Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005. ,
DOI : 10.1145/1102486.1102491
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5681
Federated Identity Management, FOSAD, 2008. ,
DOI : 10.1002/cpe.1313
URL : https://hal.archives-ouvertes.fr/hal-01489959
A conceptual model for attribute aggregation, Future Generation Computer Systems, vol.26, issue.7, 2010. ,
DOI : 10.1016/j.future.2009.12.004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.8396
User centric identity management, Asia Pacific Information Technology Security Conference, 2005. ,
Federated security : The shibboleth approach, EDUCAUSE Quarterly, 2004. ,
Privacy features of European eID card specifications, Network Security, vol.2008, issue.8, 2009. ,
DOI : 10.1016/S1353-4858(08)70097-7
Portable credentials via proxy certificates in web environments, Public Key Infrastructures, Services and Applications, 2011. ,
DOI : 10.1007/978-3-642-22633-5_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.9058
OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006. ,
DOI : 10.1145/1179529.1179532
A user-centric federated single sign-on system, Journal of Network and Computer Applications, vol.32, 2009. ,
DOI : 10.1109/icnpcw.2007.4351466
URL : http://eprints.qut.edu.au/13122/1/13122a.pdf
User-centric identity management using trusted modules, Public Key Infrastructures, Services and Applications, 2011. ,
DOI : 10.1007/978-3-642-22633-5_11