[1] Hallam-Braker P, Maler E.Assertions and protocol for the OASIS security assertion markup languages(SAML)[EB/OL].(2002-04-19)[2007-05-08].http://www.oasis-open.org/committees/security/docs.
[2] Erdos M, Cantor S.Shibboleth-architecture draft v05 [EB/OL].(2002-05-02)[2007-05-08].http://shibboleth.internet2.edu/docs/draft-internet2-shibboleth-arch-v05.pdf.
[3] Pfitzmann B, Waidner M.Analysis of liberty single-sign-on with enabled clients[J].Internet Computing, 2003, 7(6):38-44.
[4] Yu Xiulan, Chen Xiaoyan, Fang Xing et al.Web services security in data service delivery platform for telecom[C]//Proceedings of the E-Commerce Technology for Dynamic E-Business. Washington DC:IEEE Computer Society, 2004:374-377.
[5] Jeong Jongil, Shin Dongkyoo, Shin Dongil.An XML-based automated authentication profile for home network based on OSGi framework[C]//International Conference on Consumer Electronics(ICCE ’06), Digest of Technical Papers.IEEE Consumer Electronics Society, 2006:99-100.
[6] Zhao Gang, Zheng Dong, Chen Kefei.Design of single sign-on[C]//Proceedings of the E-Commerce Technology for Dynamic E-Business.Washington, DC: IEEE Computer Society, 2004:253-256.