National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
1Computer security / Computer access control / Identity management / Federated identity / Public administration / Open government / Digital identity / Authentication / E-government / National Strategy for Trusted Identities in Cyberspace / Interoperability / EGovernment in Europe

Microsoft Word - SSEDIC Press Release - Talamo _2_.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English
2Identity management / Computer access control / Federated identity / Electronic identification / Identification / Digital identity / Authentication / Eid / National Strategy for Trusted Identities in Cyberspace / Interoperability / Mobile identity management

Microsoft Word - SSEDIC Memorandum.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:06
3Identity management / National Strategy for Trusted Identities in Cyberspace / Credential / Authentication / ID.me / Identity assurance

The  National  Strategy  for   Trusted  Identities  in   Cyberspace   Aaron  Segal    

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-11-02 14:39:00
4Computer network security / National Strategy for Trusted Identities in Cyberspace / Open Identity Exchange

NSTIC Pilots: Catalyzing the Identity Ecosystem

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-04-13 11:03:53
5Elisa Bertino / Bertino / Tsutomu Kanai Award / Gene Spafford / Computer security / CERIAS / National Strategy for Trusted Identities in Cyberspace / Privacy / Computing / Electrical engineering

Elisa Bertino Professor of Computer Science Professor of Electrical and Computer Engineering (courtesy) Research Director of CERIAS Director of Cyber Center, Discovery Park

Add to Reading List

Source URL: www.issnaf.org

Language: English - Date: 2015-03-14 05:32:13
6

Comment on the Draft National Strategy for Trusted Identities in Cyberspace (NSTIC) Jonathan Mayer & Arvind Narayanan Stanford University Department of Computer Science July 26, 2010 I. Introduction We applaud the White

Add to Reading List

Source URL: randomwalker.info

Language: English - Date: 2013-11-14 23:46:46
    7Privacy / Internet privacy / Ethics / Computer network security / National Strategy for Trusted Identities in Cyberspace

      JOINT  COMMENTS  OF     THE  ELECTRONIC  PRIVACY  INFORMATION  CENTER   and   THE  LIBERTY  COALITION   to  

    Add to Reading List

    Source URL: www.epic.org

    Language: English - Date: 2011-07-22 16:23:38
    8Privacy / Internet privacy / Ethics / Computer network security / National Strategy for Trusted Identities in Cyberspace

      JOINT  COMMENTS  OF     THE  ELECTRONIC  PRIVACY  INFORMATION  CENTER   and   THE  LIBERTY  COALITION   to  

    Add to Reading List

    Source URL: epic.org

    Language: English - Date: 2011-07-22 16:23:38
    9Privacy / Security / Law / Internet privacy / National Strategy for Trusted Identities in Cyberspace / Information privacy / Biometrics / Ethics / Identity / Identity management

    PROVIDING TRUST AND SECURITY IN A HYPERCONNECTED WORLDYann Le Borgne - Deputy General Secretary, Eurosmart

    Add to Reading List

    Source URL: www.eurosmart.com

    Language: English - Date: 2014-12-11 04:23:51
    10Public safety / Standards organizations / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Cloud computing / Computer network security / Security / Computer crimes

    Update on the Cybersecurity Framework July 31, 2014 The Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”) was issued on February 12, 2014, as directed by the President in Executive Order

    Add to Reading List

    Source URL: nist.gov

    Language: English - Date: 2014-07-31 16:13:52
    UPDATE