M. Rundle, B. Blakley, J. Broberg, A. Nadalin, D. Olds et al., At a crossroads: "Personhood" and digital identity in the information society, 2008.

R. Halperin and J. Backhouse, A roadmap for research on identity in the information society, Identity in the information society, pp.71-87, 2008.

C. J. Bennett and D. Lyon, Playing the identity card -surveillance, security and identification in global perspective, 2008.

H. Kubicek and T. Noack, The path dependency of national electronic identities, Identity in the Information Society, vol.33, issue.67, 2010.
DOI : 10.1007/978-3-642-01820-6_6

H. Kubicek, Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries, Identity in the Information Society, vol.33, issue.6/7, 2010.
DOI : 10.1007/978-3-531-90673-7

D. Lyon, Identifying citizens -ID cards as Surveillance, 2009.

C. C. Hood and H. Z. Margetts, The Tools of Government in the Digital Age, Public Policy and Politics Hampshire, 2007.
DOI : 10.1007/978-1-137-06154-6

G. Aichholzer and S. Strauß, Electronic identity management in e-Government 2.0: Exploring a system innovation exemplified by Austria, Information Polity, vol.15, issue.12, pp.139-152, 2010.

M. Lips and C. Pang, Identity Management in Information Age Government Exploring Concepts, Definitions, Approaches and Solutions, Research Report, 2008.

A. Pfitzmann and M. Hansen, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management ? A Consolidated Proposal for Terminology version 0.33, 2010.
DOI : 10.1007/3-540-44702-4_1

D. Hert and P. , Identity management of e-ID, privacy and security in Europe. A human rights view, Information Security Technical Report, vol.13, issue.2, pp.71-75, 2008.
DOI : 10.1016/j.istr.2008.07.001

A. Roßnagel, Datenschutz im 21. Jahrhundert In: Aus Politik und Zeitgeschichte Band 5-6 (Digitalisierung und Datenschutz, pp.9-15, 2006.

A. Pfitzmann, K. Borcea-pfitzmann, M. Bezzi, P. Duquenoy, S. Fischer-hübner et al., Lifelong Privacy: Privacy and Identity Management for Life, Privacy and Identity Management for Life, pp.1-17, 2010.
DOI : 10.1007/978-3-642-14282-6_1

URL : https://hal.archives-ouvertes.fr/hal-01061067

I. Naumann and G. Hobgen, Privacy features of European eID card specifications, Network Security, vol.2008, issue.8, 2009.
DOI : 10.1016/S1353-4858(08)70097-7

S. Priglinger, Auswirkungen der EU-DL Richtlinie auf die E-Gov-Welt, Jahrbuch Datenschutzrecht und E-Government. Neuer wissenschaftl, pp.267-283, 2008.

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

P. Eckersley, How Unique Is Your Web Browser? Electronic Frontier Foundation, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.9914

C. N. Pounder, Nine principles for assessing whether privacy is protected in a surveillance society, Identity in the information society, IDIS), vol.1, issue.1, pp.1-22, 2008.

D. Lyon, Surveillance as social sorting -privacy, risk and digital discrimination, Routledge, 2003.

V. Mayer-schönberger, Delete: The Virtue of Forgetting in the Digital Age, 2009.

R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, Vanish: Increasing Data Privacy with Self-Destructing Data, Proceedings of the USENIX Security Symposium, 2009.

S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman et al., Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs, 2009.

M. Hildebrandt, Profiling and the rule of law, Identity in the Information Society, vol.8, issue.11, pp.55-70, 2008.
DOI : 10.4337/9781847204301

T. Mendel, Freedom of information ? a comparative legal survey, UNESCO, 2008.