<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=GGG-Sources</id>
	<title>GGG-Sources - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=GGG-Sources"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=GGG-Sources&amp;action=history"/>
	<updated>2026-05-11T01:20:01Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=GGG-Sources&amp;diff=2346&amp;oldid=prev</id>
		<title>Omaerz: 2 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=GGG-Sources&amp;diff=2346&amp;oldid=prev"/>
		<updated>2018-06-28T04:00:10Z</updated>

		<summary type="html">&lt;p&gt;2 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Global Grid Glossary - Sources for References found in Glossary&lt;br /&gt;
Sources of Definitions included in Global Glossary Grid (GGG)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Draft June 16, 2010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prepared as a joint research project of the:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Identity Commons – Legal Working Group &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
and&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
American Bar Association – Business Law Section – Cyberspace Law Committee &lt;br /&gt;
&lt;br /&gt;
__________________________________________&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that the GGG and this listing are intended for use by any interested parties for research and reference purposes relating to the analysis and development of technological tools and legal rules for public, private, governmental and other information systems.  The material is not intended to be comprehensive or authoritative. Some materials are presented in summarized, edited or abbreviated forms.  Original materials should be accessed for authoritative reference. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please also note that many of the glossaries were originally presented in the context of a larger work.  We have extracted the definitions for purposes of comparison here with other similar definitions, but have not made any attempt to carry forward their original context into this initial accumulation effort.  Accordingly, some of the definitions may have been intended for a narrower use than might be suggested by their inclusion in this accumulation.  Whatever their original intended use, it is believed that the definitions themselves (even stripped of their original context) can be helpful in evaluating other similar definitions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Links to the individual glossary sources are provided for convenient access to referenced materials that are made publicly available on the internet by their authors.  Persons interested in using such materials should review the relevant terms of conditions of use and contact the respective rights owners to make arrangements for the rights needed for the anticipated use. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Notes to User:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This chart is intended to provide easy access to original source materials that are included in the GGG.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The title of each of the various materials that included the glossary is provided below and in the GGG.  The GGG also references the document number indicated below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These are currently presented in random order.  As the project moves forward, we will seek to apply technologies and system structures that will enhance the ability to restructure the data for presentation to users in a way that is most helpful to the various programs and initiatives in which it might be used. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
DOCUMENT NAME&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
AUTHOR &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
DATE&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
WEB ADDRESS&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
1&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Incommon Federation Participant Operational Practices&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Last accessed 1/21/10&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.incommonfederation.org/docs/policies/incommonpop_20080208.html http://www.incommonfederation.org/docs/policies/incommonpop_20080208.html] &lt;br /&gt;
&lt;br /&gt;
Information distributed by operator of federated identity management system for institutions of higher education.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
2&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
E-Authentication Federation Interim Legal Document Suite&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
e-Gov&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
10/14/05&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.japanpkiforum.jp/shiryou/e-auth_policy/EAI_Legal_Document_Suite_E.pdf http://www.japanpkiforum.jp/shiryou/e-auth_policy/EAI_Legal_Document_Suite_E.pdf] k&lt;br /&gt;
&lt;br /&gt;
Legal definitions related specifically to federated identity management agreement between U.S. government (General Services Administration) and Participants in federation.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
3&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Identipedia&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
IdCommons&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Last accessed 1/19/10&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://wiki.idcommons.net/Identipedia http://wiki.idcommons.net/Identipedia]&lt;br /&gt;
&lt;br /&gt;
Wiki-encyclopedia of terms related to identity management.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
4&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Proposal for a Common Identity Framework: A User-Centric Identity Metasystem&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Kim Cameron, Reinhard Posch,  Kai Rannen-&lt;br /&gt;
&lt;br /&gt;
berg&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
10/5/08&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.identityblog.com/wp-content/images/2009/06/usercentricidentitymetasystem.pdf http://www.identityblog.com/wp-content/images/2009/06/usercentricidentitymetasystem.pdf]&lt;br /&gt;
&lt;br /&gt;
Basic identity management glossary with expanded explanation of “claims” in text of article.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
5&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Wikipedia:Digital Identity&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Wikipedia&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Last accessed 1/21/10&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity http://en.wikipedia.org/wiki/Digital_identity] &lt;br /&gt;
&lt;br /&gt;
Limited definition of “digital identity” and related terms.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
6&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Modinis: Common Terminological Framework for Interoperable Electronic Identity Management&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
11/23/05&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[https://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/GlossaryDoc?code=nld https://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/GlossaryDoc?code=nld]&lt;br /&gt;
&lt;br /&gt;
Consultation paper prepared for the eGovernment Unit of the European Union Commission; attempts to create a common terminological framework.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
7&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Open Privacy.Org: Definitions&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Open Privacy Initiative&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Last accessed 1/21/10&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.openprivacy.org/opd.shtml http://www.openprivacy.org/opd.shtml]&lt;br /&gt;
&lt;br /&gt;
Technical definitions.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
8&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Random Thoughts on Digital Identity: Digital Identity Glossary&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Blog: Random Thoughts on Digital Identity&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
8/23/07&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://blog.onghome.com/glossary.htm http://blog.onghome.com/glossary.htm]&lt;br /&gt;
&lt;br /&gt;
Non-technical definitions.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
9&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
The Identity Dictionary&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Blog: Identity and Access Management (Allan Milgate)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
8/21/06&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://identityaccessman.blogspot.com/ http://identityaccessman.blogspot.com/]&lt;br /&gt;
&lt;br /&gt;
Basic definitions of 100 technical and non-technical terms related to “Identity and Access Management.”&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
10&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
National Security Telecommunications Advisory Committee (NSTAC) Report to the President on Identity Management Strategy&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
NSTAC&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
5/21/09&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.ncs.gov/nstac/reports/2009/NSTAC IDTF Report.pdf#14 http://www.ncs.gov/nstac/reports/2009/NSTAC%20IDTF%20Report.pdf#14] &lt;br /&gt;
&lt;br /&gt;
General glossary of identity management terms.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
11&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Identity Management Task Force Report 2008&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
National Science &amp;amp; Technology Council Subcommittee on Biometrics &amp;amp; Identity Management &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
2008&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.ostp.gov/galleries/NSTC Reports/IdMReport Final.pdf http://www.ostp.gov/galleries/NSTC%20Reports/IdMReport%20Final.pdf] &lt;br /&gt;
&lt;br /&gt;
General glossary of identity management terms.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
12&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Electronic Authentication Partnership (EAP) Trust Framework&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
EAP&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
1/6/05&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://eap.projectliberty.org/docs/Trust_Framework_010605_final.pdf http://eap.projectliberty.org/docs/Trust_Framework_010605_final.pdf] &lt;br /&gt;
&lt;br /&gt;
General and technical glossary specific to the EAP Framework.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
13&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Federated Identity Management: Balancing Privacy Rights, Liability Risks, and the Duty to Authenticate&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Thomas J. Smedinghoff&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
8/21/09&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1471599 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1471599] &lt;br /&gt;
&lt;br /&gt;
Limited general and legal glossary.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
14&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Kantara Identity Assurance Framework: Glossary&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Editor: Britta Glade&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
10/14/09&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.kantarainitiative.org/ www.kantarainitiative.org] &lt;br /&gt;
&lt;br /&gt;
General and technical glossary specific to Kantara Initiative.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
15&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Issues for Responsible User-Centric Identity&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Center for Democracy &amp;amp; Technology&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
11/2009&lt;br /&gt;
&lt;br /&gt;
Version 1&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.cdt.org/files/pdfs/Issues_for_Responsible_UCI.pdf http://www.cdt.org/files/pdfs/Issues_for_Responsible_UCI.pdf] &lt;br /&gt;
&lt;br /&gt;
Defines “user-centric identity.”&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
16&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Identity in the Age of Cloud Computing: The next-generation Internet’s impact on business, governance and social interaction&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
J.D. Lasica&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
2009&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.aspeninstitute.org/publications/identity-age-cloud-computing-next-generation-internets-impact-business-governance-socia http://www.aspeninstitute.org/publications/identity-age-cloud-computing-next-generation-internets-impact-business-governance-socia] &lt;br /&gt;
&lt;br /&gt;
General definitions scattered throughout text.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
17&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Lexicon from IdCommons&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
IdCommons&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Printed 01/19/10&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://wiki.idcommons.net/Lexicon http://wiki.idcommons.net/Lexicon] &lt;br /&gt;
&lt;br /&gt;
Wiki-glossary of general terms.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
18&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
ABA Identity Management Services Agreement&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
American Bar Association, Section of Business Law, Federated Identity Management Legal Task Force &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
4/7/09&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Not available online.&lt;br /&gt;
&lt;br /&gt;
Sample agreement between “relying party” and “credential service provider.”&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
19&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Oasis&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf] &lt;br /&gt;
&lt;br /&gt;
Technical glossary with some general terms.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
20&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Liberty Alliance Privacy and Security Best Practices &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Liberty Alliance Project&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
2003&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.projectliberty.org/liberty/resource_center/papers/liberty_alliance_privacy_and_security_best_practices/ http://www.projectliberty.org/liberty/resource_center/papers/liberty_alliance_privacy_and_security_best_practices/]&lt;br /&gt;
&lt;br /&gt;
Liberty-specific general glossary.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
21&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Liberty Glossary v.2.0&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Liberty Alliance Project&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.projectliberty.org/resource_center/specifications/liberty_alliance_specifications_support_documents_and_utility_schema_files/liberty_glossary_v2_0/ http://www.projectliberty.org/resource_center/specifications/liberty_alliance_specifications_support_documents_and_utility_schema_files/liberty_glossary_v2_0/]&lt;br /&gt;
&lt;br /&gt;
Technical glossary.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
22&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Liberty Identity Assurance Framework&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Liberty Alliance Project&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.projectliberty.org/liberty/content/download/4315/28869/file/liberty-identity-assurance-framework-v1.1.pdf http://www.projectliberty.org/liberty/content/download/4315/28869/file/liberty-identity-assurance-framework-v1.1.pdf] &lt;br /&gt;
&lt;br /&gt;
Technical and general glossary.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
23&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Public Key Infrastructure (PKI) Assessment Guidelines &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
American Bar Association, Information Security Committee&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
6/18/01&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.abanet.org/scitech/ec/isc/pagv30.pdf http://www.abanet.org/scitech/ec/isc/pagv30.pdf] &lt;br /&gt;
&lt;br /&gt;
Comprehensive glossary of general and technical terms.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
24&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
ITU&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Supplemental Index as of 6/7/10&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
DOCUMENT NAME&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
AUTHOR &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
DATE&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
WEB ADDRESS&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
25&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
RFID Application Privacy Impact Assessment Framework &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
European Commission&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Nov. 30, XXXX&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
No website&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
26&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
ITU-T X.1252 Baseline Identity Management Terms and Definitions&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
International Telecommunication Union (ITU)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Apr. 2010&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
No website&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
27&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Recommendation X.1252: Baseline Identity Management Terms and Definitions&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
International Telecommunication Union (ITU)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Apr. 2010&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
No website&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
28&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Draft Recommendation X.1252: Baseline Identity Management Terms and Definitions&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
International Telecommunication Union (ITU)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Sept. 2009&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
No website&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
29&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Draft Recommendation ITU-T &amp;lt;nowiki&amp;gt;X.pr&amp;lt;/nowiki&amp;gt;iva, Criteria for assessing the level of protection for personally identifiable information in IdM&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
International Telecommunication Union (ITU)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Sept. 2009&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
No website&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
30&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Draft Recommendation ITU-T X.1275, Guideline on Protection of personally identifiable information in the application of RFID technology&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
International Telecommunication Union (ITU)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Apr. 2010&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
No website&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
31&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Generally Accepted Privacy Principles: a Global Privacy Network&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
American Institute for Certified Public Accountants&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/GenerallyAcceptedPrivacyPrinciples/GenerallyAcceptedPrivacyPrinciplesAppendixes/Pages/Appendix A Glossary.aspx http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/GenerallyAcceptedPrivacyPrinciples/GenerallyAcceptedPrivacyPrinciplesAppendixes/Pages/Appendix%20A%20Glossary.aspx]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
32&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Glossary of Terms&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Information Commissioner’s Office (UK)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://www.ico.gov.uk/tools_and_resources/glossary.aspx http://www.ico.gov.uk/tools_and_resources/glossary.aspx]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
33&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
2006 Identity Fraud Survey Report&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Javelin Strategy and Research&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[Costs $___]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;ADDED 6/9/10&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
34&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Identity Management Terminology&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Hitachi ID Systems, Inc. (formerly MTech, Inc.)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
(website is © 2010 but no publ. date)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://access-certifier.hitachi-id.com/docs/identity-management-terminology.html http://access-certifier.hitachi-id.com/docs/identity-management-terminology.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
35&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Federal Information Processing Standards Publication – Personal Identity Verification (PIV) of Federal Employees and Contractors&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
National Institute of Standards and Technology (NIST)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
May 2006&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://csrc.nist.gov/publications/fips/fips201-1/FIPS-201-1-chng1.pdf http://csrc.nist.gov/publications/fips/fips201-1/FIPS-201-1-chng1.pdf]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
36&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
Glossary of Key Information Security Terms&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
National Institute of Standards and Technology (NIST)&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
May 2010&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
[http://csrc.nist.gov/publications/drafts/nistir-7298/draft-nistir-7298-rev1_glossary-key-security-terms.pdf http://csrc.nist.gov/publications/drafts/nistir-7298/draft-nistir-7298-rev1_glossary-key-security-terms.pdf]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>