Identity management

Results: 13318



#Item
531Identity management / Digital rights / Human rights / Law / Privacy / Internet privacy / Email / Ambient intelligence / Helen Nissenbaum / Reputation

International Workshop on Web Intelligence and Virtual EnterprisesHandling Privacy as Contextual Integrity in Virtual Communities

Add to Reading List

Source URL: wic.litislab.fr

Language: English - Date: 2013-12-09 08:25:56
532Computer security / Security / Identity management / Public housing in the United States / United States Department of Housing and Urban Development / Urban planning in the United States / Password / Hud / Information security / User / Computer security incident management

Microsoft Word - Updated EIV MF Coordinator Access Authorization Form FINALdoc

Add to Reading List

Source URL: www.hud.gov

Language: English - Date: 2008-05-13 13:31:56
533Privacy / Identity management / Law / Internet privacy / Confidentiality / Personally identifiable information / Medical privacy / Patriot Act / GrammLeachBliley Act

Privacy Notice We recognize the importance of protecting our clients’ privacy. We have policies to maintain the confidentiality and security of your nonpublic personal information. The following is designed to help you

Add to Reading List

Source URL: www.soundmindfp.com

Language: English - Date: 2014-12-24 10:29:34
534Social networking services / Identity management / Privacy / Albany /  California / Language learning / Quizlet / Family Educational Rights and Privacy Act / Internet privacy / Information privacy / Google Analytics / Facebook / Webs

  Introduction    The  iKeepSafe  FERPA  Program©  is  available  to  operators  and  service  providers of websites and  online  services,  data  management  systems  and  other  technologies 

Add to Reading List

Source URL: ikeepsafe.org

Language: English - Date: 2016-07-18 20:05:53
535Privacy / Human rights / Digital rights / Identity management / Law / Ubiquitous computing / Internet privacy / Medical privacy / Personally identifiable information / Privacy concerns with social networking services / Information privacy

Seven Privacy Worries in Ubiquitous Social Computing Sara Motahari, Constantine Manikopoulos, Roxanne Hiltz, Quentin Jones New Jersey Institute of Technology University Heights, Newark, NJ, 07102, USA , ma

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
536Information privacy / Privacy / Digital rights / Human rights / Identity management / Exponential mechanism / Internet privacy / Cynthia Dwork / Medical privacy / Theoretical computer science / Algorithm / Differential privacy

R Foundations and Trends⃝ in Theoretical Computer Science Vol. 9, Nos. 3––407 c 2014 C. Dwork and A. Roth

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-06 20:30:08
537Medical imaging / Telehealth / Oracle Corporation / Redwood City /  California / Oracle Database / Oracle RAC / Oracle Application Server / Hospital information system / Picture archiving and communication system / DICOM / RMAN / Oracle Identity Management

the i-engineers, Switzerland Health-engine, the comprehensive health dossiers management NEW YORK CITY, July 11, 2007, the i-engineers announce that their health-engine solution is based on Oracle® Database 11g. The i-e

Add to Reading List

Source URL: tie.ch

Language: English - Date: 2011-06-21 03:40:00
538Identity management / National Strategy for Trusted Identities in Cyberspace / Credential / Authentication / ID.me / Identity assurance

The  National  Strategy  for   Trusted  Identities  in   Cyberspace   Aaron  Segal    

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-11-02 14:39:00
539Proxy / Computer access control / Identity management

Authorization Statement for Digital Government Services Authorization Personal information Information Proxy

Add to Reading List

Source URL: onlineservices.sintmaartengov.org

Language: English - Date: 2013-09-17 10:15:45
540Identification / Biometrics / Access control / Computer security / Identity management / Physical security / Card reader / MIFARE / Fingerprint

cem-lrg-endorsement-justified-cmyk-logo

Add to Reading List

Source URL: www.cemsys.com

Language: English - Date: 2015-09-28 08:29:02
UPDATE