...
Other valued references include:
- http://www.nmi‐editnmi-edit.org/roadmap/draft‐authn‐roadmap‐03draft-authn-roadmap-03/Resources/authn_roadmap_060828.pdf
- http://wiki.idcommons.net/Lexicon
- http://wiki.idcommons.net/Identipedia
- http://docs.oasis‐open.org/security/saml/v2.0/saml‐glossary‐2.0‐os.pdf
- http://csrc.nist.gov/publications/nistpubs/800‐63/SP800‐63V1_0_2.pdf
- http://www.ietf.org/rfc/rfc2828.txt
- http://www.wikipedia.org/
- http://middleware.internet2.edu/eduperson/docs/internet2‐mace‐dir‐eduperson‐200806.html
- http://middleware.internet2.edu/dir/groups/docs/internet2‐mace‐dir‐groups‐best‐practices‐200210.htm
- http://middleware.internet2.edu/signet/docs/internet2‐mace‐signet‐privmgmt‐recipe‐02.html\http://middleware.internet2.edu/signet/docs/internet2‐mace‐signet‐privmgmt‐recipe‐02.html
- http://msdn.microsoft.com/en‐us/architecture/cc836389.aspx