National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
131Public safety / Standards organizations / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Cloud computing / Computer network security / Security / Computer crimes

Update on the Cybersecurity Framework July 31, 2014 The Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”) was issued on February 12, 2014, as directed by the President in Executive Order

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-07-31 16:13:52
132Computer security / Cyberwarfare / Computer network security / National Strategy for Trusted Identities in Cyberspace / Identity

Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant Senior Executive Advisor, Identity Management National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-10 10:54:42
133Security / Identity assurance / National Strategy for Trusted Identities in Cyberspace / Health Insurance Portability and Accountability Act / Authentication / Nationwide Health Information Network / Electronic authentication / Identity management / Computer security / Identity

HIT Privacy and Security Team Recommendations - Transmittal[removed]

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:18:12
134Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 HIT Policy Committee Privacy and Security Tiger Team Transmittal Letter

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-04-03 11:08:11
135Internet2 / Science and technology in the United States / Integrated Digital Enhanced Network / Computer security / National Strategy for Trusted Identities in Cyberspace / Middleware / Privacy / Internet privacy / Computing / Identity management / Ethics / Consortia

Lifestyles  of  the  A-ribute  Rich     and  Privacy  Preserved   IAM  Online  –  June  11,  2014      

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-06-11 10:20:47
136Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 Jacob Reider, MD Acting National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W. Washington, DC 20201

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-11-05 09:56:00
137Computer security / Consortia / Internet2 / Science and technology in the United States / National Strategy for Trusted Identities in Cyberspace / Educause / Middleware / Privacy / Identity management / Identity / Ethics

Policy and Privacy Considerations for Identity and Access Management in a Federated World Wednesday, Feb. 8, 2012 – 3 p.m. ET Ken Klingenstein, Director, Internet2 Middleware and Security Steven Carmody, Information Ar

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2012-02-08 12:44:02
138Computing / Federated identity / Identity assurance / OpenID / National Strategy for Trusted Identities in Cyberspace / Cloud computing / Identity / Identity management / Computer security

10TH SYMPOSIUM ON IDENTITY AND TRUST ON THE INTERNET (IDTRUST[removed]Identity and Access Management “Near the Horizon, Just Over the Horizon”

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2011-04-06 07:49:44
139Computer security / Computing / MAAWG / Internet privacy / Domain Name System Security Extensions / Internet / Computer network security / National Strategy for Trusted Identities in Cyberspace

From: Messaging Anti-Abuse Working Group (MAAWG) Date: July 19, 2010 Subject: Comments on the National Strategy for Trusted Identities in Cyberspace Thank you for the opportunity to review and comment on the National Str

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2010-11-23 17:52:45
140Cryptographic protocols / Certificate authorities / DigiCert / Electronic commerce / Public key certificate / X.509 / Public key infrastructure / National Strategy for Trusted Identities in Cyberspace / HTTP Secure / Cryptography / Public-key cryptography / Key management

07 July 2010 This Issue New SSL Tool P.1

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-09-29 16:25:35
UPDATE