Identity management

Results: 13318



#Item
771Identity management / Internet privacy / Privacy / Mission statement

Mission Statement June 4, 2013 Dra$  Mission  Statement   Version  1.0  (February  26,  2013)  

Add to Reading List

Source URL: www.smartgrid.gov

Language: English - Date: 2015-02-12 06:56:52
772Identity management / Human subject research / Informed consent / Consent / Authorization / Privacy / Ethics / Applied ethics / Government

DOE  VCC   Choice  and  Consent  Workgroup   Principle  of  Customer  Control   •  Electricity  distribu:on  companies  require   access  to  customer  energy  us

Add to Reading List

Source URL: www.smartgrid.gov

Language: English - Date: 2015-02-12 06:56:56
773Identity management / Computer access control / Federated identity / Access control / Authentication / Notary / Knowledge-based authentication / Multi-factor authentication / Know your customer / Analytics / Electronic authentication / Digital identity

White Paper The Most Important Question in Customer/Constituent Identity Management Discover the answers for balancing increased value

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:10
774Privacy / Economy / Business law / Human rights / Identity management / E-commerce / Law / Data security / Internet privacy / Information privacy / Medical privacy / Consumer privacy

Economic Barriers to the Deployment of Existing Privacy Technologies (Position Paper) Joan Feigenbaum1 , Michael J. Freedman2 , Tomas Sander3 , Adam Shostack4 1

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:42:01
775Internet privacy / Computing / Digital rights / Human rights / Identity management / Geolocation / Digital media / Privacy / World Wide Web / P3P / W3C Geolocation API / Medical privacy

Nick Doty npdoty.name4223 Terrace St, #6 Oakland, CA 94611

Add to Reading List

Source URL: npdoty.name

Language: English - Date: 2014-08-30 20:19:25
776Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:07
777

NIST CYBERSECURITY PRACTICE GUIDE ENERGY IDENTITY AND ACCESS MANAGEMENT FOR ELECTRIC UTILITIES Approach, Architecture, and Security Characteristics

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2015-09-09 10:14:20
    778

    Privacy-respecting Identity Management Introduction to ABC4Trust Attribute-based Credentials for Trust Kai Rannenberg ()

    Add to Reading List

    Source URL: abc4trust.eu

    Language: English - Date: 2015-07-20 10:11:31
      779Privacy / Identity management / Data protection / Information privacy / Internet privacy / Privacy policy

      PUBLIC SUBMISSION As of: :02 AM Received: October 14, 2014 Status: Pending_Post Tracking No. 1jy-8ex6-hu60

      Add to Reading List

      Source URL: www.smartgrid.gov

      Language: English - Date: 2015-02-12 06:56:48
      780

      Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance Part B: Implementation Guidance Initial Phase 1 ICAM Public Release Draft

      Add to Reading List

      Source URL: www.idmachines.com

      Language: English - Date: 2011-03-07 17:04:25
        UPDATE