Pages with the most categories

Jump to navigation Jump to search

Showing below up to 50 results in range #201 to #250.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Guardian‏‎ (2 categories)
  2. User Notice‏‎ (2 categories)
  3. Consent‏‎ (2 categories)
  4. Trusted Entity‏‎ (2 categories)
  5. Electronic Health Record‏‎ (2 categories)
  6. Persistent Compute Objects‏‎ (2 categories)
  7. Immunization Information System‏‎ (2 categories)
  8. Health IT Record Location Service (Data Aggregation)‏‎ (2 categories)
  9. Phone as Health Care Credential‏‎ (2 categories)
  10. FHIR Use Case‏‎ (2 categories)
  11. FHIR to the Patient Use Case‏‎ (2 categories)
  12. Patient Web Experience‏‎ (2 categories)
  13. Authorized Certification Body‏‎ (2 categories)
  14. Patient Interaction with HIE‏‎ (2 categories)
  15. Digital Travel Credentials‏‎ (2 categories)
  16. Health Consent‏‎ (2 categories)
  17. Patient Journey as seen by the Browser‏‎ (2 categories)
  18. Patient Empowerment‏‎ (2 categories)
  19. Usable Best Practice A‏‎ (2 categories)
  20. Usable Req 1‏‎ (2 categories)
  21. Mobile Driver's License Criteria‏‎ (2 categories)
  22. Bind Attributes to Identity Use Case‏‎ (2 categories)
  23. Change IdP‏‎ (2 categories)
  24. Change Identity Provider (IdP) Use Case‏‎ (2 categories)
  25. Individuals Can Choose and Change Identity Account Providers and Can Use Between and Manage Multiple Different Interoperable Credentials‏‎ (2 categories)
  26. Match Names between Identity Systems Use Case‏‎ (2 categories)
  27. Persona Attributes‏‎ (2 categories)
  28. Publicly Discoverable ePayment Address(es) Part 2‏‎ (2 categories)
  29. Publicly Discoverable ePayment Address(es) Part 3‏‎ (2 categories)
  30. Revocation of Delegated Authentication Use Case‏‎ (2 categories)
  31. ABADSG‏‎ (2 categories)
  32. CertiPath CP 3.18‏‎ (2 categories)
  33. EV Cert 1.1‏‎ (2 categories)
  34. IETF RFC 3647‏‎ (2 categories)
  35. NIST IR 7870‏‎ (2 categories)
  36. IETF RFC 4122‏‎ (2 categories)
  37. OASIS xNL 2.0‏‎ (2 categories)
  38. UX Usability Requirements and Guidelines Working Document‏‎ (2 categories)
  39. Use Cases‏‎ (2 categories)
  40. Use Case Ad Hoc Group‏‎ (2 categories)
  41. User Managed Access (UMA)‏‎ (2 categories)
  42. Approve Disclosure of PII Use Case‏‎ (2 categories)
  43. Authenticate Using Pseudonymous Identity Use Case‏‎ (2 categories)
  44. Disclose Storage of PII Use Case‏‎ (2 categories)
  45. Game Avatar as Pseudonymous Identity Use Case‏‎ (2 categories)
  46. Identity Ecosystem Framework enables individuals to protect their privacy through clear FIPPS rules‏‎ (2 categories)
  47. Identity Ecosystem Framework protects individuals from unbounded liability in particular for losses that they were powerless to prevent.‏‎ (2 categories)
  48. Inform User of Disclosure of PII Use Case‏‎ (2 categories)
  49. No one service provider can gain a complete picture of an individual’s life in cyberspace‏‎ (2 categories)
  50. Online Safety for Democracy Activists Use Case‏‎ (2 categories)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)