National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
11Federated identity / Computer network security / Abstraction / Identity assurance / Digital identity / National Strategy for Trusted Identities in Cyberspace / Security / Identity management / Identity / Computer security

st London 1 November 2012 Press Release

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
12Federated identity / Computer network security / Abstraction / Identity assurance / Digital identity / National Strategy for Trusted Identities in Cyberspace / Security / Identity management / Identity / Computer security

st London 1 November 2012 Press Release

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
13National Strategy for Trusted Identities in Cyberspace / Abstraction / Federated identity / Philosophical logic / Identity management / Identity Commons / Digital identity / Ecosystem / Identity / Computer security / Computer network security

Response by Kaliya Hamlin, Identity Woman User-Advocate / Independent Expert / Identity Community Leader To [Docket No02] Notice of Inquiry Models for a Governance Structure for the National Strategy for

Add to Reading List

Source URL: www.identitywoman.net

Language: English - Date: 2007-09-05 22:15:00
14Security / Federated identity / Identity assurance / OpenID / Security Assertion Markup Language / Authentication / Multi-factor authentication / Identity provider / National Strategy for Trusted Identities in Cyberspace / Identity management / Identity / Computer security

Remarks of Catherine Tilton at the Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC)

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:54
15Cyberwarfare / Security / Computer network security / Computer crimes / Cyber-security regulation / Congressional Research Service / United States Computer Emergency Readiness Team / United States Department of Homeland Security / National Strategy for Trusted Identities in Cyberspace / Government / Library of Congress / Computer security

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-04-01 12:55:47
16Security / Computer security / Identity assurance / Access control / National Strategy for Trusted Identities in Cyberspace / OpenID / Digital identity / Internet privacy / Authentication / Identity / Identity management / Federated identity

CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:11
17Computing / Internet privacy / Information privacy / Personally identifiable information / National Strategy for Trusted Identities in Cyberspace / Consumer privacy / Data breach / Medical privacy / FTC regulation of behavioral advertising / Privacy / Ethics / Security

CTO Corner September 2012 Striking a Balance between Privacy and Security Transformation Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:20
18Security / Federated identity / Identity assurance / OpenID / Authentication / Security Assertion Markup Language / National Strategy for Trusted Identities in Cyberspace / Daon /  Inc. / Anakam / Identity management / Identity / Computer security

Cloud-Based Identity Services TrustX Technologies, Inc[removed]  Random  Hills  Rd.,  Suite  650   Fairfax,  VA    22030

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:58
19Grants / Computer network security / National Strategy for Trusted Identities in Cyberspace / Computer security / Public economics / Funding Opportunity Announcement / Federal grants in the United States / Identity theft / National Institute of Standards and Technology / Identity / Federal assistance in the United States / Public finance

February 11, 2015 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilots Cooperative Agreement Program EXECUTIVE SUMMARY •

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-12 09:55:48
20Grants / Computer network security / National Strategy for Trusted Identities in Cyberspace / Computer security / Public economics / Funding Opportunity Announcement / Federal grants in the United States / Identity theft / National Institute of Standards and Technology / Identity / Federal assistance in the United States / Public finance

FFO for the 2015 NSTIC pilots

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-11 17:04:10
UPDATE