[1]
Andreas Poller, Ulrich Waldmann, Sven Vowé, and Sven Türpe, Electronic Identity Cards for User Authentication—Promise and Practice . IEEE Security and Privacy. 2012, Volume 10, Issue 1: 46-54.
DOI: 10.1109/msp.2011.148
Google Scholar
[2]
Mika¨el Ates and Serge Ravet and Abakar Mohamat Ahmat and Jacques Fayolle, An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and other delights. 2011 Sixth International Conference on Availability, Reliability and Security. 2011: 555-560.
DOI: 10.1109/ares.2011.85
Google Scholar
[3]
Eric Olden, Architecting a Cloud-Scale Identity Fabric. IEEE computer society. March 2011: 52-59.
DOI: 10.1109/mc.2011.60
Google Scholar
[4]
Christian Senk and Florian Dotzler, Biometric Authentication as a Service for Enterprise Identity Management Deployment. 2011 Sixth International Conference on Availability, Reliability and Security. 2011 IEEE: 43-50.
DOI: 10.1109/ares.2011.14
Google Scholar
[5]
Peng Zhang, Hanlin Sun and Zheng Yan, Building up trusted identity management in mobile heterogeneous environment, 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 2011: 873-877.
DOI: 10.1109/trustcom.2011.117
Google Scholar
[6]
Valentina Casola, Massimiliano Rak and Umberto Villano, Identity Federation in Cloud Computing, 2010 Sixth International Conference on Information Assurance and Security. 2010: 253-259.
DOI: 10.1109/isias.2010.5604074
Google Scholar
[7]
Christian Schridde, etc. An Identity-Based Security Infrastructure for Cloud Environments, 2010 IEEE: 644-649.
Google Scholar
[8]
Lishan Kang and Xuejie Zhang, Identity-Based Authentication in Cloud Storage Sharing, 2010 International Conference on Multimedia Information Networking and Security, 2010: 851-855.
DOI: 10.1109/mines.2010.180
Google Scholar
[9]
Zombo Fu, etc. Application Independent Identity Management, 2010 IEEE: 625-627.
Google Scholar
[10]
Ghazi Ben Ayed. Digital Identity Metadata Scheme—A technical approach to reduce digital identity risks, 2011 Workshops of International Conference on Advanced Information Networking and Applications: 607-612.
DOI: 10.1109/waina.2011.118
Google Scholar
[11]
P. Mell and T. Grance. The NIST Definition of cloud computing, ver 15, Information Technology Laboratory, US Nat'1 Inst. Of Standards and technology, 7Oct, 2009. http: /csrc. nist. gov/groups/sns/cloud-computing.
DOI: 10.6028/nist.sp.800-145
Google Scholar
[12]
Cath Everett. E-Identity: an issue of trust. Computer Fraud & Security, March, 2011: 8-10.
Google Scholar
[13]
http: /news. xinhuanet. com/world/2011-04/21/c_121331615. htm.
Google Scholar
[14]
Christian Cachin, Mattias Schunter. A Cloud You Can Trust. IEEE Spectrum, DEC 2011: 28-52.
DOI: 10.1109/mspec.2011.6085778
Google Scholar
[15]
Lori M. Kaufman. How Private Is the Internet?. IEEE Security &privacy, 2011, Volume 9, Issue 1: 73-75.
Google Scholar
[16]
HUANG Ruwei, GUI Xiaolin, etc. Design of Cloud Storage Framework with Privacy-preserving. Journal of XI'AN JiaoTong University, 2011, volume 45, No 10: 1-6.
Google Scholar
[17]
Hong Cheng, Zhang Min, etc. AB-ACCA: A Cryptographic Access Control Scheme for cloud storage. Journal of Computer Research and Development, 2010, vol 47(suppl): 259-265.
Google Scholar
[18]
XU Zi-Yao, HE Ye-Ping, etc. Efficient Remote Attestation Mechanism with Privacy Protection. Journal of Software, 2011, 22(2): 39-352.
DOI: 10.3724/sp.j.1001.2011.03714
Google Scholar