G. Alpár, J. Hoepman, and J. Siljee, The identity crisis. security, privacy and usability issues in identity management. arXiv preprint, pp.1-15, 2011.

. Baldwin, A. Baldwin, M. Mont, M. Mont, S. Shiu et al., On identity assurance in the presence of federated identity management systems, Proc. of the 2007 ACM workshop on Digital identity management, pp.1-19, 2007.

E. Bertino, L. Martino, F. Paci, and A. Squicciarini, Security for Web Services and Service-Oriented Architectures, p.1, 2010.
DOI : 10.1007/978-3-540-87742-4

K. Cameron, The laws of identity, Microsoft Corp, 2005.

D. W. Chadwick and G. Inman, Attribute Aggregation in Federated Identity Management, Computer, vol.42, issue.5, pp.33-40, 2009.
DOI : 10.1109/MC.2009.143

D. W. Chadwick and G. Inman, The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management, 2013 International Conference on Availability, Reliability and Security, pp.285-290, 2013.
DOI : 10.1109/ARES.2013.38

D. W. Chadwick, G. Inman, and N. Klingenstein, A conceptual model for attribute aggregation, Future Generation Computer Systems, vol.26, issue.7, pp.1043-1052, 2010.
DOI : 10.1016/j.future.2009.12.004

M. Hansen, P. Berlich, J. Camenisch, S. Clauß, A. Pfitzmann et al., Privacy-enhancing identity management, Information Security Technical Report, vol.9, issue.1, pp.35-44, 2004.
DOI : 10.1016/S1363-4127(04)00014-7

J. H. Hoepman, R. Joosten, and J. Siljee, Comparing Identity Management Frameworks in a Business Context
DOI : 10.1109/ARES.2008.116

J. Jensen, Identity Management Lifecycle -Exemplifying the Need for Holistic Identity. Information and Communication Technology pp, pp.343-352, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01480241

A. Jøsang, J. Fabre, and B. Hay, Trust requirements in identity management, Proceedings of the 2005 . . . pp, pp.99-108, 2005.

A. Laube and S. Hauser, myIdP-The Personal Attribute Hub, The Fifth International Conferences on Advanced Service Computing, pp.1-5, 2013.

A. Laube and S. Hauser, myIdP-The Personal Attribute Hub: Prototype and Quality of Claims, International Journal On Advances in Intelligent Systems, vol.7, issue.1, pp.1-10, 2014.

J. Lopez, R. Oppliger, and G. Pernul, Authentication and authorization infrastructures (AAIs): a comparative survey, Computers & Security, vol.23, issue.7, pp.578-590, 2004.
DOI : 10.1016/j.cose.2004.06.013

A. Mohan and D. M. Blough, AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.201-212, 2008.
DOI : 10.1109/PST.2008.28

Q. Ethan-mccallum and K. G. , Business Models for the Data Economy, 2013.

R. Sharman, Digital Identity and Access Management: Technologies and Frameworks: Technologies and Frameworks, 2011.
DOI : 10.4018/978-1-61350-498-7

D. Slamanig, K. Stranacher, and B. Zwattendorfer, User-centric identity as a service-architecture for eIDs with selective attribute disclosure, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, 2014.
DOI : 10.1145/2613087.2613093

S. Suriadi, Strengthening and Formally Verifying Privacy in Identity Management Systems, 2010.

I. Thomas and C. Meinel, Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims, 2009 IEEE International Conference on Services Computing, pp.243-250, 2009.
DOI : 10.1109/SCC.2009.66

I. Thomas and C. Meinel, An Attribute Assurance Framework to Define and Match Trust in Identity Attributes, 2011 IEEE International Conference on Web Services, pp.580-587, 2011.
DOI : 10.1109/ICWS.2011.80