[1]
Jøsang, A., AlZomai, M., and Suriadi, S.: Usability and Privacy in Identity Management Architectures. In Australasian Information Security Workshop: Privacy Enhancing Technologies, Ballarat, Australia (2007).
Google Scholar
[2]
Tewfiq El Maliki, J.S.: A Survey of User-centric Identity Management Technologies. In International Conference on Emerging Security Information, Systems and Technologies, Valencia (2007).
DOI: 10.1109/secureware.2007.4385303
Google Scholar
[3]
Kim C.: The Laws of Identity, http: /ts-si. org/files/TheLawsOfIdentity. pdf (2005).
Google Scholar
[4]
Dabrowski, M., and Pacyna, P.: Generic and complete three-level identity management model. In 2nd International Conference on Emerging Security Information, Systems and Technologies, Cap Esterel (2008).
DOI: 10.1109/securware.2008.18
Google Scholar
[5]
National E-Health Transition Authority, http: /www. nehta. gov. au.
Google Scholar
[6]
Lee, S.C.: An Introduction to Identity Management, SANS Institute InfoSec Reading Room.
Google Scholar
[7]
Windley, P.: Digital Identity. O'Reilly Media, Inc (2005).
Google Scholar
[8]
S. Claub, M.K.: Identity management and its support of multilateral security, J. Computer Networks: The International Journal of Computer and Telecommunications Networking, 37, pp.205-219 (2001).
DOI: 10.1016/s1389-1286(01)00217-1
Google Scholar
[9]
Hansen, M., Berlich, P., Camenisch, J., Claub, S., Pfitzmann, A., and Waidner, M.: Privacy-enhancing identity management, Information Security Technical Report, 9, pp.35-44 (2004).
DOI: 10.1016/s1363-4127(04)00014-7
Google Scholar
[10]
Koch, M., Worndl, W.: Community Support and Identity Management. In 7th European Conference on Computer-Supported Cooperative Work, Bonn, Germany (2001).
Google Scholar
[11]
White, P.: Identity Management Architecture: A New Direction. In8th IEEE International Conference on Computer and Information Technology, Sydney, (2008).
Google Scholar
[12]
Jøsang, A., and Pope, S.: User centric identity management. In Australian Computer Emergency Response Team Conference, Royal Pines Resort, Australia (2005).
Google Scholar
[13]
Hommel, W., Reiser, H.: Federated Identity Management: Shortcomings of existing standards. In 9th IFIP/IEEE International Symposium on Integrated Network Management – Managing New Networked Worlds, Nice, France (2005).
Google Scholar