1. Lecture Notes in Computer Science;D.W. Chadwick,2008
2. Ahn, G.J., Ko, M.: User-centric privacy management for federated identity management. In: COLCOM 2007: Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 187–195. IEEE Computer Society, Washington, DC, USA (2007)
3. Ingo Naumann, G.H.: Privacy Features of European eID Card Specifications. Technical report, ENISA (2009)
4. Chadwick, D.W., Inman, G., Klingenstein, N.: A conceptual model for attribute aggregation. Future Generation Computer Systems 26(7), 1043–1052 (2010)
5. Jøsang, A., Zomai, M.A., Suriadi, S.: Usability and privacy in identity management architectures. In: Brankovic, L., Coddington, P.D., Roddick, J.F., Steketee, C., Warren, J.R., Wendelborn, A.L. (eds.) ACSW Frontiers. CRPIT, vol. 68, pp. 143–152. Australian Computer Society (2007)