... trail of personal information that, if not properly protected, may be misused. Therefore, the development of digital identity management (IdM for short) systems suitable for cloud comput- ing is ... client-centric protocols and the identity- provider centric protocols, to the use of different names for identity attributes. An identity attribute encodes a specific identity information about an individual, ... computing paradigm is referred to as cloud computing. Examples of cloud computing applications are Amazon’s Simple Storage Service (S3), Elastic Computing Cloud (EC2) for storing photos on Smugmug an...