<--- Back to Details
First PageDocument Content
Identity management / Electronic authentication / Two-factor authentication / Federated identity / Security token / Authentication / Access token / Information security / One-time password / Security / Cryptography / Computer security
Date: 2012-12-12 14:43:17
Identity management
Electronic authentication
Two-factor authentication
Federated identity
Security token
Authentication
Access token
Information security
One-time password
Security
Cryptography
Computer security

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 354,69 KB

Share Document on Facebook

Similar Documents

Security in Federated e-Infrastructure and Identity Management Boris Parák2 Slávek Licehammer1,2

DocID: 1uGdl - View Document

Computer access control / Computer security / Identity management / Federated identity / Cloud standards / OAuth / OpenID / Identity provider / Single sign-on / Authentication / Relying party / SAML-based products and services

UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs Marios Isaakidis Harry Halpin

DocID: 1uuV4 - View Document

Sirtfi The Security Incident Response Trust Framework for Federated Identity (Sirtfi) provides a mechanism to identify trusted, operationally secure eduGAIN participants and facilitate effective incident response collabo

DocID: 1u57J - View Document

Early Community Draft VersionSubject to Change Bloom Protocol Decentralized credit scoring powered by Ethereum and IPFS Bloom is a protocol for assessing credit risk through federated attestation-based identity v

DocID: 1tCvJ - View Document

Global Federated Identity and Privilege Management (GFIPM) Initiative The following is the first of a series of podcasts on justice information sharing national initiatives forThese podcasts are presented by SEA

DocID: 1s7Jn - View Document