[1]
Bertino, E., Ferrari, E., and Squicciarini, A. Trust negotiations: concepts, systems, and languages. Computing in Science and, (2004), 27-34.
DOI: 10.1109/mcse.2004.22
Google Scholar
[2]
Bhargav-Spantzel, A., Camenisch, J., Gross, T., and D. User centricity: a taxonomy and open issues. DIM '06: Proceedings of the second ACM workshop on Digital identity management, ACM Press (2007), 1-10.
DOI: 10.1145/1179529.1179531
Google Scholar
[3]
Bhargav-Spantzel, A., Squicciarini, A., and E. Establishing and protecting digital identity in federation systems. Journal of Computer Security 14, 3 (2006), 269-300.
DOI: 10.3233/jcs-2006-14303
Google Scholar
[4]
Cameron, K. The laws of identity. Microsoft Corp, 2005. http: /www. ict-21. ch/ICT. SATW. CH/IMG/Kim_Cameron_Law_of_Identity. pdf.
Google Scholar
[5]
Cameron, K. Windows CardSpace and Identity Meta System. proceedings of Internet2, (2007).
Google Scholar
[6]
Cantor, S., Kemp, J., Philpott, R., et al. Assertions and Protocols for the OASIS Security Assertion Markup Language. Language, 2005, 1-86.
Google Scholar
[7]
Castelluccia, C., Cristofaro, E.D., and Perito, D. Private Information Disclosure from Web Searches. arxiv. org, (2010), 1-16.
Google Scholar
[8]
Eckersley, P. How Unique Is Your Web Browser? panopticlick. eff. org, 2010. http: /panopticlick. eff. org/browser-uniqueness. pdf.
Google Scholar
[9]
Goldwasser, S., Micali, S., and Rackoff, C. The Knowledge Complexity of Interactive proof systems. In Proceedings of the seventeenth annual ACM symposium on Theory of computing. ACM, Providence, Rhode Island, United States, 1989, 291-304.
DOI: 10.1145/22145.22178
Google Scholar
[10]
Internet2. Shibboleth. https: /shibboleth. internet2. edu.
Google Scholar
[11]
Jøsang, A. and Pope, S. User centric identity management. AusCERT Asia Pacific Information Technology, (2005), 1-13.
Google Scholar
[12]
Kaler, C., Mcintosh, M., Goodner, M., and Nadalin, A. Web Services Federation Language (WS-Federation). OASIS Standard, 2007, 1-128.
Google Scholar
[13]
Merrels, J. SXIP identity. DIX: Digital Identity Exchange protocol. (2006).
Google Scholar
[14]
Michael, S. SSL Certificates In Use Today Aren't All Valid. Qualys, 2010. http: /www. esecurityplanet. com/features/article. php/3890171/SSL-Certificates-In-Use-Today-Arent-All-Valid. htm.
Google Scholar
[15]
Ruddy, M., Trevithick, P., Nadalin, T., and D. Higgins trust framework. Digital ID World '06, (2009).
Google Scholar
[16]
Samarati, P. Protecting Respondents ' Identities in Microdata Release. IEEE Transactions on Knowledge and Data 13, 6 (2001), 1010-1027.
DOI: 10.1109/69.971193
Google Scholar
[17]
Winsborough, W., Seamons, K., and Jones, V. Automated trust negotiation. Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, (2000), 88-102.
DOI: 10.1109/discex.2000.824965
Google Scholar