Protocol and software integration guidelines

Summary
HowTo’s and best-practice guidelines for IdM software producers and standard organizations facilitating the easy take-up of proxy cryptography