Identity assurance

Results: 362



#Item
221Computer security / Identity management / Security Assertion Markup Language / OpenID / Credential Service Provider / Authentication / Identity assurance / Security and safety features new to Windows Vista / Federated identity / Security / Identity

POWERING THE WORLD’S LEADING IDENTITY ECOSYSTEMS Key Benefits 4 S  eamlessly

Add to Reading List

Source URL: securekey.com

Language: English - Date: 2014-08-08 14:42:20
222Internet2 / Federated identity management / Identity assurance / IAM / Computing / Abstraction / Identity management / Educause / Computer security

IAM Online EDUCAUSE Identity and Access Management Working Group Thursday, October 14, 2010 – 4 p.m. EDT / 1 p.m. PDT IAM Online is brought to you by InCommon, in cooperation with Internet2 and !

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2010-10-14 17:03:16
223Identity / Identity assurance / Two-factor authentication / Password / Authentication / Identity provider / Federated identity management / Identity management / Security / Computer security

IAM Online Grabbing the Bronze and Silver Ring: The InCommon Assurance Program Wednesday, June 15, 2011 – 3 p.m. ET Tom Barton, University of Chicago R.L. “Bob” Morgan, University of Washington

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2011-06-15 16:03:04
224Audit / Addendum / Documents / Writing

InCommon  Identity  Assurance  Program  Addendum ADDENDUM  TO  THE  INCOMMON  PARTICIPATION  AGREEMENT   COVERING  PARTICIPATION  IN  THE   INCOMMON  IDENTITY  ASSURANCE

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2013-03-18 12:35:54
225Credential / Authentication / Identity theft / Access control / Digital credential / Electronic authentication / Identity management / Security / Identity assurance

Identity Assurance Profiles Bronze and Silver February 11, 2013 Version 1.2

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2013-02-22 12:04:44
226Identity management / Identity assurance / Abstraction

Version   InCommon  Federation     Operating  Policies  and  Practices   [removed]  

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2012-02-20 09:00:29
227Computer security / Identity / Shibboleth / Authentication / Identity assurance / Identity management / Federated identity / Security

IAM Online The Challenges of User Consent Wednesday, May 11, 2011 – 3 p.m. ET Tom Barton, University of Chicago Steve Carmody, Brown University Russell Beall, University of Southern California

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2011-05-11 14:17:18
228Public safety / Identity management / Computer security / Access control / Identity assurance / Information security / Authentication / Two-factor authentication / Anakam / Security / Crime prevention / National security

ANDREW M. CUOMO Governor STATE OF NEW YORK State Capitol P.O. Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-01-24 17:01:23
229Authentication / Picture archiving and communication system / Electronic authentication / Credential / Health / FIPS 201 / Identity management / Security / Identity assurance

PIV PACS Integration Workshop Draft SP[removed]Discussion National Institute of Standards and Technology U.S. Department of Commerce 1 May 2008

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-05-09 01:00:00
230Computing / Federated identity / Identity assurance / OpenID / National Strategy for Trusted Identities in Cyberspace / Cloud computing / Identity / Identity management / Computer security

10TH SYMPOSIUM ON IDENTITY AND TRUST ON THE INTERNET (IDTRUST[removed]Identity and Access Management “Near the Horizon, Just Over the Horizon”

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2011-04-06 07:49:44
UPDATE