Cao, Y. and Yang, L. (2010). A survey of Identity Manage-
ment technology. In IEEE ICITIS 2010, pages 287–
293. IEEE.
Cloud Security Alliance (2011). Security Guidance for Crit-
ical Areas of Focus in Cloud Computing V3.0. CSA.
Cox, P. (2012). How to Manage Identity in the Public
Cloud. InformationWeek reports.
Dabrowski, M. and Pacyna, P. (2008). Generic and Com-
plete Three-Level Identity Management Model. In
SECURWARE 2008, pages 232–237. IEEE.
Dbrowski, M. and Pacyna, P. (2008). Overview of Iden-
tity Management. Technical report, chinacommunica-
tions.cn.
Frommm, J. and Hoepner, P. (2011). The New German
eID Card. In Fumy, W. and Paeschke, M., editors,
Handbook of eID Security - Concepts, Practical Expe-
riences, Technologies, pages 154–166. Publicis Pub-
lishing, Erlangen.
Gopalakrishnan, A. (2009). Cloud Computing Identity
Management. SETLabs Briefings, 7(7):45–55.
Goulding, J. T. (2010). identity and Access Management
for the Cloud : CAs Strategy and vision. Technical
Report May, CA Technologies.
Green, M. and Ateniese, G. (2007). Identity-Based Proxy
Re-encryption. In ACNS 2007, volume 4521 of LNCS,
pages 288–306. Springer.
Huang, H. Y., Wang, B., Liu, X. X., and Xu, J. M. (2010).
Identity Federation Broker for Service Cloud. ICSS
2010, pages 115–120.
Jøsang, A., Fabre, J., Hay, B., Dalziel, J., and Pope, S.
(2005). Trust Requirements in Identity Management.
Proceedings of the 2005 Australasian workshop on
Grid computing and e-research, pages 99–108.
Jøsang, A. and Pope, S. (2005). User Centric Identity Man-
agement. AusCERT 2005.
Jøsang, A., Zomai, M. A., and Suriadi, S. (2007). Usability
and privacy in identity management architectures. In
ACSW ’07, pages 143–152.
Kaler, C. and McIntosh, M. (2009). Web Services Federa-
tion Language (WS-Federation) Version 1.2. OASIS
Standard.
Leitold, H., Hollosi, A., and Posch, R. (2002). Security
architecture of the Austrian citizen card concept. In
ACSAC 2002, pages 391–400.
Linn, J., Boeyen, S., Ellison, G., Karhuluoma, N., Mac-
gregor, W., Madsen, P., Sengodan, S., Shinkar, S., and
Thompson, P. (2004). Trust Models Guidelines. Tech-
nical report, OASIS.
Neuman, C., Yu, T., Hartman, S., and Raeburn, K. (2005).
The Kerberos Network Authentication Service (V5).
RFC 4120 (Proposed Standard).
Nu
˜
nez, D., Agudo, I., and Lopez, J. (2013). Leveraging
Privacy in Identity Management as a Service through
Proxy Re-Encryption. In Zimmermann, W., editor,
Proceedings of the PhD Symposium at the 2nd Eu-
ropean Conference on Service-Oriented and Cloud
Computing, pages 42–47.
Nu
˜
nez, D. and Agudo, I. (In Press). Blindidm: A privacy-
preserving approach for identity management as a ser-
vice. International Journal of Information Security.
Nu
˜
nez, D., Agudo, I., and Lopez, J. (2012). Integrating
OpenID with Proxy Re-Encryption to enhance privacy
in cloud-based identity services. In IEEE CloudCom
2012, pages 241 – 248.
Palfrey, J. and Gasser, U. (2007). CASE STUDY: Digital
Identity Interoperability and eInnovation. Berkman
Publication Series,.
Pearson, S. and Benameur, A. (2010). Privacy, Security
and Trust Issues Arising from Cloud Computing. In
CloudCom 2010, pages 693–702. IEEE.
Sen, J. (2013). Security and Privacy Issues in Cloud Com-
puting. In Mart
´
ınez, A. R., Marin-Lopez, R., and
Pereniguez-Garcia, F., editors, Architectures and Pro-
tocols for Secure Information Technology Infrastruc-
tures, pages 1–45. IGI Global.
Zissis, D. and Lekkas, D. (2012). Addressing cloud com-
puting security issues. Future Generation Computer
Systems, 28(3):583–592.
Zwattendorfer, B. (2014). Towards a Privacy-Preserving
Federated Identity as a Service Model. to appear.
Zwattendorfer, B. and Slamanig, D. (2013a). On Privacy-
Preserving Ways to Porting the Austrian eID System
to the Public Cloud. In SEC 2013, AICT, pages 300–
314. Springer.
Zwattendorfer, B. and Slamanig, D. (2013b). Privacy-
Preserving Realization of the STORK Framework in
the Public Cloud. In SECRYPT 2013, pages 419–426.
Zwattendorfer, B., Stranacher, K., and Tauber, A. (2013).
Towards a Federated Identity as a Service Model. In
Egovis 2013, pages 43–57.
WEBIST2014-InternationalConferenceonWebInformationSystemsandTechnologies
92