Digital identity

Results: 1391



#Item
891Trust negotiation / Computer security / Digital credential / Credential / Access control / Trust management / Identity management / Security / Cryptography

TrustBuilder: Automated Trust Negotiation in Open Systems Kent Seamons Brigham Young University

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-14 07:37:00
892Ethics / Marketing / Identity management / Social issues / Privacy / Internet privacy / Advertising / Digital footprint / Social networking service / World Wide Web / Social media / Computing

Global Insights PROACTIVE PROTECTORS % 60

Add to Reading List

Source URL: 5personas.mastercard.com

Language: English - Date: 2014-05-02 10:58:49
893Security / Identity / Information Card / Security token / Password / Identity provider / Identity theft / Digital identity / Phishing / Federated identity / Computer security / Identity management

Carl Ellison, speaking for Kim Cameron Chief Architect of Identity Microsoft Corporation Name

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-18 07:46:32
894Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:27:34
895Windows games / Identity / Identity theft / Theft / Application software / Grand Theft Auto IV / Russian passport / Wilmington /  Delaware / Crimes / Action-adventure games / Digital media

Microsoft Word - idtheftapplication.doc

Add to Reading List

Source URL: attorneygeneral.delaware.gov

Language: English - Date: 2014-03-11 12:28:00
896Science / Archivist / Finding aid / Archive / Archival research / The National Archives / Encoded Archival Description / Preservation / Library of Congress Digital Library project / Archival science / Library science / Museology

DIGITAL ARCHIVES AND INSTITUTIONAL IDENTITY NMDS[removed]CRN 7520 Spring 2014 Tuesdays 4:00 – 6:45pm

Add to Reading List

Source URL: www.wordsinspace.net

Language: English - Date: 2014-01-28 00:36:23
897Human rights / Law / Identity management / Internet privacy / Information privacy / Expectation of privacy / The right to privacy in New Zealand / Privacy in Australian law / Privacy law / Ethics / Privacy

Submission: SERIOUS INVASIONS OF PRIVACY IN THE DIGITAL ERA

Add to Reading List

Source URL: www.oic.qld.gov.au

Language: English - Date: 2013-11-12 19:45:28
898Biometrics / Data security / Electronic signature / Identity management / Digital signature / Information security / Smart card / Identity document / Access control / Security / Cryptography / Computer security

DOC Document

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-08-12 15:27:00
899Technical communication / Open formats / Identity / Digital identity / XML / World Wide Web / HTML / Information Card / Uniform resource identifier / Computing / Federated identity / Markup languages

The Identity Web: Key Concepts of XNS Architecture The XNS Public Trust Organization (XNSORG) July 9, 2002

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-12-02 07:25:07
900Identity / Electronic commerce / Public key infrastructure / X.509 / Identity management / Digital identity / Public key certificate / Authentication / WISeKey / Cryptography / Public-key cryptography / Key management

Non-Intrusive Identity Management Dr. Stefan Brands McGill School of Computer Science & Credentica April 12, 2004 Presented to: 3rd Annual PKI R&D Workshop, Gaithersburg

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-19 19:10:59
UPDATE