[1] The White House. National Strategy for Trusted Identities in Cyberspace[OL]. 2011-04 [2020-05-06]. https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf
[2] 旷野, 闫晓丽. 美国网络空间可信身份战略的真实意图[J]. 信息安全与技术, 2012,3(11):3-6
[3] 赛迪智库信息安全所. 美国全方位构建网络空间安全战略[N]. 中国电子报, 2011-12-20
[4] Office of the White House. Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace[OL]. (2011-04-15 )[2020-05-06]. https://obamawhitehouse.archives.gov/the-press-office/2011/04/15/administration-releases-strategy-protect-online-consumers-and-support-in
[5] Schmidt H A. The national strategy for trusted identities in cyberspace [OL]. The White House Blog,(2011-04-26) [2020-05-06]. https://obamawhitehouse.archives.gov/blog/2011/04/26/national-strategy-trusted-identities-cyberspace-and-your-privacy
[6] Honan M . Kill the password —Why a string of characters can't protect us anymore[OL]. Wired Gadget Lab,(2012-11-15)[2020-05-05]. https://www.wired.com/2012/11/ff-mat-honan-password-hacker/
[7] NIST Blog. Whoa-Oh! We’re halfway there! Happy NSTI civersary![OL]. (2016-04-15)[2020-05-06]. https://www.nist.gov/blogs/cybersecurity-insights/whoa-oh-were-halfway-there-happy-nsticiversary
[8] NIST Trusted Identities Group. Pilots of NSTIC[OL]. (2019-07-01) [2020-05-06]. https://www.nist.gov/itl/tig/pilots
[9] Megas K, Lam P, Nadeau E, et al. NSTIC pilots: Catalyzing the identity ecosystem[OL]. 2016-03[2020-05-06]. http://dx.doi.org/10.6028/NIST.IR.8054
[10] Scott T, Connor A. NSTIC State Government Pilot: Michigan Department of Health and Human Services Final Evaluation Report[OL].2016-12[2020-05-06].https://www.rti.org/sites/default/files/resources/mdhhs_nstic_pilot_rti_evaluation_vf.pdf
[11] NIST Trusted Identities Group. Pilots future releases[OL]. (2016-04-29) (2019-07-01) [2020-05-06]. https://www.nist.gov/itl/tig/pilots
[12] IDESG. Identity Ecosystem Framework (IDEF) Core Documents[OL]. 2015-10[2020-05-06].https://idesg.edufoundation.kantarainitiative.org/The-ID-Ecosystem/Identity-Ecosystem-Framework/IDEF-Core-Documents.html
[13] Grassi P A, Garcia M E, Fenton J L. Digital Identity Guidelines (NIST Special Publication 800-63-3)[OL]. 2017-06 [2020-05-06]. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf
[14] Wikipedia. National Strategy for Trusted Identities in Cyberspace[OL]. 2019-12[2020-04-20]. https://en.wikipedia.org/wiki/National_Strategy_for_Trusted_Identities_in_Cyberspace
[15] Chabrow E. Michael Daniel's Path to the White House[OL]. 2014-08 [2020-05-06]. https://www.bankinfosecurity.com/interviews/michael-daniels-path-to-white-house-i-2422
[16] NIST TIG. Pilot projects & partners[OL]. (2016-04-29) [2020-05-06]. https://www.nist.gov/itl/tig/about/overview
[17] NIST Blog. Putting the Fed in Federation: The US Government as Early Adopter of the Identity Ecosystem [OL].2015-02[2020-04-20]. https://www.nist.gov/blogs/cybersecurity-insights/putting-fed-federation-us-government-early-adopter-identity-ecosystem
[18] NSTIC Blog .NSTIC Welcomes Trusted Federal Systems as Secretariat of the Identity Ecosystem Steering Group[OL].(2012-07-12)[2020-04-20]. http://nstic.blogs.govdelivery.com/2012/07/12/nstic-welcomes-trusted-federal-systems-as-secretariat-of-the-identity-ecosystem-steering-group-iesg
[19] IDESG. The Identity Ecosystem Steering Group[OL].[2020-04-20]. https://idesg.edufoundation.kantarainitiative.org/
[20] IDESG. Identity Ecosystem Framework (IDEF) Registry[OL].[2020-04-20]. https://idefregistry.edufoundation.kantarainitiative.org/
[21] NIST. Five pilot projects receive grants to promote online security and privacy[OL].(2012-12-20)[2020-04-20]. https://www.nist.gov/news-events/news/2012/09/five-pilot-projects-receive-grants-promote-online-security-and-privacy
[22] NIST tig. NSTIC polit: ID.me, Inc[OL].2016-04[2020-04-20]. https://www.nist.gov/nstic/id-inc.html
[23] NIST tig. Trusted Identities Group[OL].2016-04[2020-04-20]. https://www.nist.gov/itl/tig
[24] SecureKey,Inc. SecureKey Technologies Wins Contract with US Postal Service to Implement Federal Cloud Credential Exchange – SecureKey[OL]. 2013-08-21[2020-04-20]. http://securekey.com/press-releases/securekey-technologies-wins-contract-with-u-s-postal-service-to-implement-federal-cloud-credential-exchange/
[25] Fontana J. Connect.gov solidifies, expands ID credential plan for federal agencies—ZDNet[OL].(2015-04-30)[2020-04-20]. https://www.zdnet.com/article/connect-gov-solidifies-expands-identity-credential-plan-for-federal-agencies/.
[26] Miller J. Connect.gov is latest attempt to get buy-in to online ID management[OL]. (2014-12-22)[2020-04-20]. https://federalnewsnetwork.com/technology-main/2014/12/connectgov-is-latest-attempt-to-get-buy-in-to-online-id-management/
[27] Zack M. Login.gov replacing Connect.gov [OL]. SecureIDNews,( 2016-08-26)[2020-04-20]. https://www.secureidnews.com/news-item/login-gov-replacing-connect-gov/
[28] Minton, Mills T. Government launches login.gov to simplify access to public services[OL]. (2017-08-22) [2020-04-20]. https://18f.gsa.gov/2017/08/22/government-launches-login-gov/
[29] Electronic Privacy Information Center. EPIC: National Strategy for Trusted Identities in Cyberspace (NSTIC)[OL]. (2012-02-10)[2020-04-20]. http://epic.org/privacy/nstic.html
[30] Coney L, Buttar S, McGilvray J, et al. Statement on the National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy[OL]. (2010-09-23)[2020-04-20]. http://privacy.org/privacy_coalition_comments_trusted_ids.pdf.
[31]刘耀华.国际网络可信身份战略研究及对我国的启示[J]. 网络空间安全, 2018,9(2):1-5
[32]刘权. 网络可信身份之道[J]. 网络安全和信息化, 2017(12):33-38