National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
21Computer network security / National Strategy for Trusted Identities in Cyberspace / Security / Social change / Standards organizations / Identity / Internet privacy / National Institute of Standards and Technology / Privacy / Identity management / Social issues / Ethics

March 26, 2015 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Privacy Pilots Cooperative Agreement Program EXECUTIVE SUMMARY •

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-03-26 14:25:39
22Computer security / Computer network security / National Strategy for Trusted Identities in Cyberspace / Open government / Public administration / Identity theft / Internet privacy / Privacy / E-Government / Identity management / Identity / Ethics

NAT IONA L S T R AT E G Y F OR T RUS T E D I DEN T I T I E S I N C Y BER SPACE Enhancing Online Choice, Efficiency, Security, and Privacy

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2011-04-15 10:42:24
23Industries / Political geography / Political philosophy / Social philosophy / Interoperability / Identity management / Identity assurance / Ethics / Political science / Accountability / Capitals / Governance

Open Identity Exchange (OIX) Response to: “Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace” Notice of Inquiry National Institute of Standards and Technology [Docket No

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
24Computer security / Federated identity / Access control / Internet privacy / OpenID / Security Assertion Markup Language / Digital identity / National Strategy for Trusted Identities in Cyberspace / Authentication / Security / Identity management / Identity

Criterion White Paper: Federated Online Attribute Exchange Initiatives Executive Summary: During 2011, Criterion Systems, Inc. (“Criterion”) partners, Google and ID Dataweb (IDW), designed, developed and open-sourced

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
25Computer security / Federated identity / Access control / Internet privacy / OpenID / Security Assertion Markup Language / Digital identity / National Strategy for Trusted Identities in Cyberspace / Authentication / Security / Identity management / Identity

Criterion White Paper: Federated Online Attribute Exchange Initiatives Executive Summary: During 2011, Criterion Systems, Inc. (“Criterion”) partners, Google and ID Dataweb (IDW), designed, developed and open-sourced

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
26Security / Federated identity / Computer network security / National Strategy for Trusted Identities in Cyberspace / OpenID / Security Assertion Markup Language / Authentication / Digital credential / Identity assurance / Identity / Identity management / Computer security

Building Trusted Identity Networks OIX Internet Summit London, UK Oct 10, 2013 © SecureKey Technologies Inc.

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
27Identity / Computer security / Federated identity / OpenID / National Strategy for Trusted Identities in Cyberspace / Phorm / Identity Commons / Kerberos / Online identity / Computing / Computer network security / Internet privacy

OVERVIEW & UPDATE   CROWDED & NOISY LANDSCAPE ISO WC3

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
28Computer security / Privacy / Einstein / Internet privacy / International Multilateral Partnership Against Cyber Threats / National Strategy for Trusted Identities in Cyberspace / FTC Fair Information Practice / Hugo Teufel III / Department of Defense Strategy for Operating in Cyberspace / United States Department of Homeland Security / Ethics / Government

WRITTEN STATEMENT OF MARY ELLEN CALLAHAN Partner and Chair, Privacy and Information Governance Practice, Jenner & Block Former Chief Privacy Officer, U.S. Department of Homeland Security Before the House Committee on Hom

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-03-03 19:32:46
29Identity / Computer security / ISO standards / Ubiquitous computing / Smart card / Identity management / Identity document / Online identity / Security token / Security / Computer network security / National Strategy for Trusted Identities in Cyberspace

NSTIC: Facts at a Glance 1. What is the NSTIC? The National Strategy for Trusted Identities in Cyberspace (NSTIC) is an Obama administration initiative

Add to Reading List

Source URL: www.smartcardalliance.org

Language: English - Date: 2011-09-01 10:37:00
30Computer security / Identity assurance / Access control / Credential / Federated identity / Interoperability / National Strategy for Trusted Identities in Cyberspace / Emergency management / Identity management / Identity / Security

FirstNet ICAM Summit - Recommended Principles and Actions Report

Add to Reading List

Source URL: ise.gov

Language: English - Date: 2015-01-27 16:24:41
UPDATE