@conference {L{\textquoteright}Amrani2017736, title = {Identity management systems: Laws of identity for models7 evaluation}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {736-740}, abstract = {The digital identity is the representation of an active entity (Person, actor), it{\textquoteright}s used by most systems to allow access to resources. When users are involved in many domains they should hardly remember a lot of authentication criterions for every access. They exist many identity management systems that aim to solve the issues in relation with digital identity. However, the problem of identification process and Cross-Domain target the digital identity use. In this work, we analyze the existing identity management systems within the laws of identity, which make a roadmap for managing the identities migration cross-domain. A comparative study between identity management systems based on the laws of identity as evaluation criteria of those systems is the main of this work. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CIST.2016.7804984}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010194106\&doi=10.1109\%2fCIST.2016.7804984\&partnerID=40\&md5=ce22c4c9d844e8bb028241fc0debd7b6}, author = {L{\textquoteright}Amrani, H.a and Berroukech, B.E.b and El Bouzekri El Idrissi, Y.b and Ajhoun, R.a} }