National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
91POSIX / The Open Group / Unix / X Window System / National Strategy for Trusted Identities in Cyberspace / Open standard / System software / Interoperability / Software / Standards organizations / Computing / Consortia

Microsoft Word - Open Group_NSTIC NOI Response final.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-28 11:56:06
92Governance / Political science / Abstraction / Social philosophy / Computer network security / National Strategy for Trusted Identities in Cyberspace / Identity management

Billing Code[removed]      

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-25 10:15:32
93Security / Cyberwarfare / National Strategy for Trusted Identities in Cyberspace / Healthcare in the United States / Inova Health System / Identity management / Digital identity / Healthcare Information and Management Systems Society / Office of the National Coordinator for Health Information Technology / Computer network security / Computer security / Identity

NSTIC, ONC, and Inova: Trusted Identities for Health IT February 25, 2014 Jeremy Grant, National Strategy for Trusted Identities in Cyberspace (NSTIC)

Add to Reading List

Source URL: himss.files.cms-plus.com

Language: English - Date: 2014-02-25 08:51:08
94Computing / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet Society / Open standard / Internet Engineering Task Force / CaBIG / Internet governance / Medicine / Internet

Annie Sokol National Institute of Standards and Technology 100 Bureau Drive, Mailstop 8930, Gaithersburg, MD[removed]By electronic mail: [removed] Response by the Internet Society to the

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 22:55:18
95Public relations / Business / Social philosophy / Stakeholder / AccountAbility / Governance / Steering / Political science / Computer network security / National Strategy for Trusted Identities in Cyberspace / Corporate finance

NSTIC Governance - A Climate of Trust

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 14:33:42
96Internet Engineering Task Force / Governance / American National Standards Institute / Computing / Political science / Technology / Standards organizations / Computer network security / National Strategy for Trusted Identities in Cyberspace

COMMENTS ON NOTICE OF INQUIRY Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace 76 FR[removed]DOCUMENT NUMBER[removed]DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 09:44:42
97Jericho Forum / National Strategy for Trusted Identities in Cyberspace / DC Comics / Jericho / Steering / Ecosystem / The Open Group / Working group / Prehistory / Data security / Archaeology / Systems ecology

July 21st, 2011 National Institute of Standards and Technology c/o Annie Sokol 100 Bureau Drive Mailstop 8930 Gaithersburg, MD 20899

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-21 12:33:12
98Computer network security / Crime prevention / National security / Data security / National Strategy for Trusted Identities in Cyberspace / Federal Information Security Management Act / Information security / International Multilateral Partnership Against Cyber Threats / National Institute of Standards and Technology / Security / Computer security / Public safety

NIST Roadmap for Improving Critical Infrastructure Cybersecurity, February 12, 2014

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-02-12 10:41:03
99National Strategy for Trusted Identities in Cyberspace / Semantic Web / Service-oriented architecture / Cloud computing / Interoperability / Linked data / Computing / Web services / Computer network security

Fall Cubicon Trusted Infrastructure for the Ambient Cloud Architectural solutions to

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-17 13:04:08
100Computer network security / National Strategy for Trusted Identities in Cyberspace / Governance / Steering / Privacy / Identity management / E-Government / Committee / Ethics / Politics / Structure

Microsoft Word - Inman Technology_NSTIC NOI.doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-10 16:05:36
UPDATE