National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
201Role-based access control / Identity management / Computer network security / National Institute of Standards and Technology / National Security Agency / National Strategy for Trusted Identities in Cyberspace / Security / Access control / Computer security

Attribute Based Access Control Workshop, Rockville, Maryland, July 17th, 2013

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-07-16 12:26:59
202Social issues / Computer network security / National Strategy for Trusted Identities in Cyberspace / Social change / Internet privacy / Privacy-enhancing technologies / FTC Fair Information Practice / Personally identifiable information / Privacy Office of the U.S. Department of Homeland Security / Privacy / Ethics / Identity management

Microsoft Word - NSTIC Privacy Workshop - Objectives.DOCX

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-16 12:57:50
203National security / United States Department of Homeland Security / Computer network security / Computer crimes / International Multilateral Partnership Against Cyber Threats / Comprehensive National Cybersecurity Initiative / National Strategy for Trusted Identities in Cyberspace / United States Computer Emergency Readiness Team / Critical infrastructure protection / Cyberwarfare / Computer security / Security

[removed]Federal Register / Vol. 75, No[removed]Wednesday, July 28, [removed]Notices Affairs Coordinator, telephone: 781– 545–8026, ext. 206.

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-07 13:49:22
204Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-03-06 12:33:10
205United States Department of Homeland Security / Computer security / Privacy Office of the U.S. Department of Homeland Security / Internet privacy / Privacy-enhancing technologies / Political privacy / Identity management / TRUSTe / Ethology / Privacy / Computer network security / National Strategy for Trusted Identities in Cyberspace

Microsoft Word - NSTIC Privacy Workshop Agenda.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-23 14:33:01
206National Strategy for Trusted Identities in Cyberspace / Computer security / Human rights / Identity management / Social issues / Anonymity / Internet privacy / Cyber-security regulation / Privacy / Ethics / Identity / Computer network security

Recommendations for the National Strategy for Trusted Identities in Cyberspace

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-04 09:39:44
207Electronic commerce / Public-key cryptography / Phishing / Spamming / National Strategy for Trusted Identities in Cyberspace / Online shopping / Password / HTTP Secure / Identity theft / Cryptography / Key management / Computer network security

Via electronic email to [removed] September 20, 2010 Office of the Secretary National Telecommunications and Information Administration International Trade Administration

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-04 10:23:47
208Standards organizations / Funding Opportunity Announcement / National Institute of Standards and Technology / Identity management / Grant / Identity theft / Computer security / Crime / Government / Identity / Computer network security / National Strategy for Trusted Identities in Cyberspace

February 1, 2012 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilot Grant Program EXECUTIVE SUMMARY ·

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-02-01 10:38:28
209Computer crimes / Public safety / National security / Computer security / Cyber-security regulation / United States Department of Homeland Security / Information Technology Industry Council / International Multilateral Partnership Against Cyber Threats / National Strategy for Trusted Identities in Cyberspace / Cyberwarfare / Computer network security / Security

PDF Document

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-09-14 07:42:19
210National Strategy for Trusted Identities in Cyberspace / Identity management / Identity theft / Digital identity / Authentication / Chief information officer / Provisioning / Identity / Security / Computer security

NASCIO Call-to-Action: The Necessity for Maturing Identity and Access Management in State Government November 2012

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2012-11-28 13:57:36
UPDATE