On the analysis of identity delegation attacks | IEEE Conference Publication | IEEE Xplore