Pages with the most categories
Jump to navigation
Jump to search
Showing below up to 50 results in range #201 to #250.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Guardian (2 categories)
- User Notice (2 categories)
- Consent (2 categories)
- Trusted Entity (2 categories)
- Electronic Health Record (2 categories)
- Persistent Compute Objects (2 categories)
- Immunization Information System (2 categories)
- Health IT Record Location Service (Data Aggregation) (2 categories)
- Phone as Health Care Credential (2 categories)
- FHIR Use Case (2 categories)
- FHIR to the Patient Use Case (2 categories)
- Patient Web Experience (2 categories)
- Authorized Certification Body (2 categories)
- Patient Interaction with HIE (2 categories)
- Digital Travel Credentials (2 categories)
- Health Consent (2 categories)
- Patient Journey as seen by the Browser (2 categories)
- Patient Empowerment (2 categories)
- Usable Best Practice A (2 categories)
- Usable Req 1 (2 categories)
- Mobile Driver's License Criteria (2 categories)
- Bind Attributes to Identity Use Case (2 categories)
- Change IdP (2 categories)
- Change Identity Provider (IdP) Use Case (2 categories)
- Individuals Can Choose and Change Identity Account Providers and Can Use Between and Manage Multiple Different Interoperable Credentials (2 categories)
- Match Names between Identity Systems Use Case (2 categories)
- Persona Attributes (2 categories)
- Publicly Discoverable ePayment Address(es) Part 2 (2 categories)
- Publicly Discoverable ePayment Address(es) Part 3 (2 categories)
- Revocation of Delegated Authentication Use Case (2 categories)
- ABADSG (2 categories)
- CertiPath CP 3.18 (2 categories)
- EV Cert 1.1 (2 categories)
- IETF RFC 3647 (2 categories)
- NIST IR 7870 (2 categories)
- IETF RFC 4122 (2 categories)
- OASIS xNL 2.0 (2 categories)
- UX Usability Requirements and Guidelines Working Document (2 categories)
- Use Cases (2 categories)
- Use Case Ad Hoc Group (2 categories)
- User Managed Access (UMA) (2 categories)
- Approve Disclosure of PII Use Case (2 categories)
- Authenticate Using Pseudonymous Identity Use Case (2 categories)
- Disclose Storage of PII Use Case (2 categories)
- Game Avatar as Pseudonymous Identity Use Case (2 categories)
- Identity Ecosystem Framework enables individuals to protect their privacy through clear FIPPS rules (2 categories)
- Identity Ecosystem Framework protects individuals from unbounded liability in particular for losses that they were powerless to prevent. (2 categories)
- Inform User of Disclosure of PII Use Case (2 categories)
- No one service provider can gain a complete picture of an individual’s life in cyberspace (2 categories)
- Online Safety for Democracy Activists Use Case (2 categories)