National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
151National Strategy for Trusted Identities in Cyberspace / FIPS 201 / Computer security / Computing / Abstraction / Identity management / Identity assurance / Interoperability

PSCR 2010 Winter Conference Access, Cyber Threat, and Identity Management Mark Adams Northrop Grumman Information Systems

Add to Reading List

Source URL: www.pscr.gov

Language: English - Date: 2010-12-02 09:24:30
152Public economics / Computer network security / National Strategy for Trusted Identities in Cyberspace / Funding Opportunity Announcement / Federal grants in the United States / Economic policy / Government / National Institute of Standards and Technology / Grant / Federal assistance in the United States / Public finance / Grants

May 20, 2013 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Cooperative Agreement Program for the Evaluation of Pilots Using Trusted Online Credentials fo

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-05-17 14:30:00
153Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 20:59:34
154Computer network security / National Strategy for Trusted Identities in Cyberspace / Federated identity / OpenID / SAFE-BioPharma Association / HID Global / ActivIdentity / Identity management / Internet privacy / Cryptography / Computer security / Computing

NSTIC Privacy Workshop Registered Attendees

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-16 09:25:15
155Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 21:02:13
156Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / International Cybercrime / Government / Library of Congress / Cyberwarfare

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-06-09 20:43:25
157Business / Technology / Project management / Computer network security / National Strategy for Trusted Identities in Cyberspace / WorkPLAN

The Proposed Identity Ecosystem Steering Group Workplan Outline

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-08-03 08:41:09
158Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 21:02:01
159Committee / Politics / Structure / Social psychology / Computer network security / National Strategy for Trusted Identities in Cyberspace / Ecosystem management

Recommendations for Establishing an Identity Ecosystem Steering Group

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-26 14:28:50
160Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

. Cybersecurity: Authoritative Reports and Resources, by Topic Rita Tehan Information Research Specialist

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 21:03:16
UPDATE