National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
171SAIC / Mitre Corporation / United States / Military / Computer network security / National Strategy for Trusted Identities in Cyberspace / Booz Allen Hamilton

NSTIC Governance Workshop Registered Attendees

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-16 09:22:31
172Governance / Political science / Social philosophy / Abstraction / Computer network security / National Strategy for Trusted Identities in Cyberspace / Identity management

Microsoft Word - NSTIC Governance NOI.doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-08 09:47:37
173Security / National Strategy for Trusted Identities in Cyberspace / Identity theft / Identity assurance / Digital identity / Privacy-enhancing technologies / Internet privacy / Electronic health record / Computer crime / Identity management / Identity / Computer security

National Strategy for Trusted Identities in Cyberspace Creating Options for Enhanced Online Security and Privacy

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2010-06-25 12:06:23
174Privacy / Internet privacy / Ethics / Computer network security / National Strategy for Trusted Identities in Cyberspace

  JOINT  COMMENTS  OF     THE  ELECTRONIC  PRIVACY  INFORMATION  CENTER   and   THE  LIBERTY  COALITION   to  

Add to Reading List

Source URL: epic.org

Language: English - Date: 2011-07-22 16:23:38
175Privacy / Internet privacy / Ethics / Computer network security / National Strategy for Trusted Identities in Cyberspace

  JOINT  COMMENTS  OF     THE  ELECTRONIC  PRIVACY  INFORMATION  CENTER   and   THE  LIBERTY  COALITION   to  

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2011-07-22 16:23:38
176National Strategy for Trusted Identities in Cyberspace / Computer security / Abstraction / Systems ecology / Identity theft / Ecosystem management / Ecosystem / AccountAbility / Privacy / Identity / Ethics / Computer network security

PDF Document

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-02-07 15:46:53
177Centralized computing / Cloud computing / National Strategy for Trusted Identities in Cyberspace / Information security / CA Technologies / Privacy / Identity management / Computing / Computer security / Security

PDF Document

Add to Reading List

Source URL: www.oasis-open.org

Language: English - Date: 2014-06-26 19:22:54
178National Strategy for Trusted Identities in Cyberspace / OpenForum Europe / Privacy / Internet privacy / Ethics / Cloud computing / Computing

PDF Document

Add to Reading List

Source URL: www.oasis-open.org

Language: English - Date: 2014-06-26 19:23:12
179Cyberwarfare / Identity / Secure communication / National Strategy for Trusted Identities in Cyberspace / Data security / Password / Identity theft / Internet privacy / Data breach / Computer network security / Security / Computer security

Applicants’ Webinar January 31, [removed]

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-01-31 16:41:46
180Grants / Computer network security / National Strategy for Trusted Identities in Cyberspace / Public economics / National Institute of Standards and Technology / Funding Opportunity Announcement / Identity theft / Computer security / Identity management / Federal assistance in the United States / Public finance / Identity

March 5, 2012 SECOND AMENDED ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY FOR THE NIST NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE (NSTIC) PILOT GRANT PROGRAM SUMMARY OF AMENDMENT Background

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-05 17:10:27
UPDATE