The identity crisis. security, privacy and usability issues in identity management. arXiv preprint, pp.1-15, 2011. ,
On identity assurance in the presence of federated identity management systems, Proc. of the 2007 ACM workshop on Digital identity management, pp.1-19, 2007. ,
Security for Web Services and Service-Oriented Architectures, p.1, 2010. ,
DOI : 10.1007/978-3-540-87742-4
The laws of identity, Microsoft Corp, 2005. ,
Attribute Aggregation in Federated Identity Management, Computer, vol.42, issue.5, pp.33-40, 2009. ,
DOI : 10.1109/MC.2009.143
The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management, 2013 International Conference on Availability, Reliability and Security, pp.285-290, 2013. ,
DOI : 10.1109/ARES.2013.38
A conceptual model for attribute aggregation, Future Generation Computer Systems, vol.26, issue.7, pp.1043-1052, 2010. ,
DOI : 10.1016/j.future.2009.12.004
Privacy-enhancing identity management, Information Security Technical Report, vol.9, issue.1, pp.35-44, 2004. ,
DOI : 10.1016/S1363-4127(04)00014-7
Comparing Identity Management Frameworks in a Business Context ,
DOI : 10.1109/ARES.2008.116
Identity Management Lifecycle -Exemplifying the Need for Holistic Identity. Information and Communication Technology pp, pp.343-352, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01480241
Trust requirements in identity management, Proceedings of the 2005 . . . pp, pp.99-108, 2005. ,
myIdP-The Personal Attribute Hub, The Fifth International Conferences on Advanced Service Computing, pp.1-5, 2013. ,
myIdP-The Personal Attribute Hub: Prototype and Quality of Claims, International Journal On Advances in Intelligent Systems, vol.7, issue.1, pp.1-10, 2014. ,
Authentication and authorization infrastructures (AAIs): a comparative survey, Computers & Security, vol.23, issue.7, pp.578-590, 2004. ,
DOI : 10.1016/j.cose.2004.06.013
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.201-212, 2008. ,
DOI : 10.1109/PST.2008.28
Business Models for the Data Economy, 2013. ,
Digital Identity and Access Management: Technologies and Frameworks: Technologies and Frameworks, 2011. ,
DOI : 10.4018/978-1-61350-498-7
User-centric identity as a service-architecture for eIDs with selective attribute disclosure, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, 2014. ,
DOI : 10.1145/2613087.2613093
Strengthening and Formally Verifying Privacy in Identity Management Systems, 2010. ,
Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims, 2009 IEEE International Conference on Services Computing, pp.243-250, 2009. ,
DOI : 10.1109/SCC.2009.66
An Attribute Assurance Framework to Define and Match Trust in Identity Attributes, 2011 IEEE International Conference on Web Services, pp.580-587, 2011. ,
DOI : 10.1109/ICWS.2011.80