Identity assurance

Results: 362



#Item
251Certificate authorities / Electronic commerce / Comodo Group / Phishing / Authentication / Identity assurance / Public key certificate / Comparison of SSL certificates for web servers / Cryptography / Key management / Public-key cryptography

Creating Trust Online TM Creating Trust Online

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2011-11-10 11:53:07
252Security / Data / Directory services / Identity assurance / X.500 / Health information exchange / Authentication / EXPRESS / Attribute / ISO standards / Identity management / Computing

Trust Framework for Health Information Exchange

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2014-01-07 14:31:02
253Security / Identity assurance / Authentication / Electronic authentication / Two-factor authentication / Health Insurance Portability and Accountability Act / Credential / Smart card / National Strategy for Trusted Identities in Cyberspace / Identity management / Computer security / Identity

Identity and Access Management for Health Information Exchange

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2013-12-18 13:47:45
254ITU-T / Global Standards Collaboration / Identity assurance / Interoperability / Computing / International Telecommunication Union / Identity theft / Abstraction / Technology / Standards organizations / Identity / Identity management

RESOLUTION GSC[removed]: (Plenary) Identity Management (revised)(reaffirmed) The 154th Global Standards Collaboration meeting (BeijingGeneva, JulyAugustSeptember[removed]Recognizing: the importance of Identity Management (

Add to Reading List

Source URL: www.itu.int

Language: English - Date: 2011-01-07 14:57:16
255ITU-T / Global Standards Collaboration / Identity assurance / Interoperability / Computing / International Telecommunication Union / Identity theft / Abstraction / Technology / Standards organizations / Identity / Identity management

RESOLUTION GSC-15/04: (Plenary) Identity Management (revised) The 15th Global Standards Collaboration meeting (Beijing, 30 August 2 September[removed]Recognizing: the importance of Identity Management (IDM) to practically

Add to Reading List

Source URL: www.gsc16.ca

Language: English - Date: 2011-09-16 14:05:36
256Global Standards Collaboration / ITU-T / Identity assurance / Computing / Interoperability / International Telecommunication Union / Technology / Electronics / Standards organizations / Identity management / Identity

Document Title: Draft RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised) Source: Identity Management and Identifications Systems HIS Panel at GSC-16 Opening Plenary Contacts: Bilel Jamoussi (ITU)

Add to Reading List

Source URL: www.gsc16.ca

Language: English - Date: 2011-11-03 00:50:12
257Access control / Cryptographic software / Identity management / Authentication / Authorization / Passphrase / Encryption / Cryptography / Security / Disk encryption

Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2013-01-14 21:07:53
258Identity management / Federated identity / Identity / Identity assurance / Medical ethics / Key management / E-Authentication / Authentication / Electronic authentication / Cryptography / Security / Computer security

Patient Identity in Directed Exchange: How Much Assurance?

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2014-07-25 16:36:36
259Identity management systems / Cryptographic software / Password / Security / Computer security

ICIS System Overview Office of Compliance Office of Enforcement and Compliance Assurance U.S. Environmental Protection Agency 1200 Pennsylvania Avenue, NW (MC 2221-A)

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-06-30 17:01:27
260Law / Health Information Systems Programme / Identity assurance / Electronic health record / Authentication / Health Insurance Portability and Accountability Act / Email / Public-key cryptography / Health informatics / Health / Security

Directed Exchange Workgroup: Public Comments and FHA Responses for Directed Exchange Documents

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2014-04-03 13:47:39
UPDATE