Identity assurance

Results: 362



#Item
31Computer security / Crime prevention / National security / Identity assurance / Federated identity management / OpenID / Defense Information Systems Agency / Transglobal Secure Collaboration Project / Security / Identity management / Identity

TSCP_logo_cmyk_Participation_whitetext.eps

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:06:02
32Ethics / Cryptography / Cryptographic software / Software / File sharing networks / Tor / Anonymity / Computer security conference / Peer-to-peer / Internet privacy / Identity management / Social issues

Rob G. Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems 4555 Overlook Avenue SW Washington, DC 20375

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
33Identity / Federated identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Identity provider / Service provider / Authentication / Identity assurance / Identity management / System software / Computer security

GOV.UK Verify Architecture Overview High level architecture overview GOV.UK Verify enables a user to be identified at a service provider with a required  level of assurance, but without revealing any

Add to Reading List

Source URL: alphagov.github.io

Language: English - Date: 2015-06-08 12:02:04
34Electronics / Technology / Apple ID / Federated identity / Computer hardware / Accreditation / Apple II series / Apple / Steve Jobs / Apple Inc. / Quality assurance

ADVANCED APPLE The goal of APPLE Accreditation is to increase the quality in early learning centers through self-evaluation, self-improvement, and verification of quality standards. Advanced APPLE is an accelerated accr

Add to Reading List

Source URL: www.faccm.org

Language: English
35Access control / Identity / Authentication / Electronic authentication / Multi-factor authentication / Authorization / Two-factor authentication / Identity assurance / Security / Computer security / Identity management

ITL Bulletin, Authentication Considerations for Public Safety Mobile Networks (May 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-14 08:46:44
36Computer security / Crime prevention / National security / Identity assurance / Federated identity management / OpenID / Defense Information Systems Agency / Transglobal Secure Collaboration Project / Security / Identity management / Identity

TSCP_logo_cmyk_Participation_whitetext.eps

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:06:02
37Identity management / Federated identity / OpenID / Credential / Authentication / Identity assurance / Security / Identity / Computer security

First Line of Defense against Hackers: Secure, Trusted Identity Credentials under a Federation Trust Framework In the wake of seemingly daily news articles about the theft of personal identity, financial, and proprietary

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-27 06:50:02
38Identity / Access control / Authentication / Notary / Packaging / Credential / Identity verification service / Online identity / Identity assurance / Identity management / Internet privacy / Security

Evidence of Identity Standard Additional Guidance Online Establishment of Individual Identity Produced September 2011

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-11-20 14:44:32
39Comodo Group / Public-key cryptography / Authentication / Phishing / Melih Abdulhayoğlu / Comparison of SSL certificates for web servers / Cryptography / Certificate authorities / Key management

Building Trust with Customers Builds Business. Identity and Trust Assurance Technologies. It’s How eCommerce Gets Done. Trust is the currency of the internet. Without it, communication, commerce or collaboration cannot

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:07:19
40Identity management / Identity / Identity document / Identity assurance / New Zealand Certificate of Identity / Identity theft / New Zealand Refugee Travel Document / New Zealand passport / Biometrics / Security / Cryptography / Identification

Microsoft Word 620529DB - Overview for Agencies.doc

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-01-31 16:09:09
UPDATE