Pages with the most categories
Jump to navigation
Jump to search
Showing below up to 250 results in range #1 to #250.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- Distributed Identity Assurance (7 categories)
- Consent to Create Binding (6 categories)
- Identity Proofing Use Case (5 categories)
- Level of Assurance (5 categories)
- Trustmark Evolving Design Pattern (5 categories)
- Identity Model (5 categories)
- User Consent (5 categories)
- State Issued ID for Healthcare (5 categories)
- Basic interactions in a single Trust Framework (5 categories)
- ISO/IEC 29115 Entity Authentication Assurance (4 categories)
- NIST SP 800-63-2 (4 categories)
- Software Compliance Attestation (4 categories)
- Generalized Presumptive Authentication (4 categories)
- Authorization (4 categories)
- User Choice Pattern (4 categories)
- Patient authenticates to EHR to access their lab results (4 categories)
- Emergency Access (4 categories)
- Identity Design Patterns (4 categories)
- Consent Receipt (4 categories)
- Un and Underserved People Use Case (4 categories)
- Trustworthy Healthcare Ecosystem (4 categories)
- Trustworthy Healthcare Provider (4 categories)
- User Agent in the Cloud (4 categories)
- Patient Choice (4 categories)
- Trustworthy Healthcare Application (4 categories)
- User Private Information (4 categories)
- InCommon IAAF 1.1 (3 categories)
- High Assurance AZ Token (3 categories)
- Native Apps for US Healthcare (3 categories)
- Device Integrity supporting User Authentication (3 categories)
- Trust Elevation Use Case (3 categories)
- Authentication (3 categories)
- Federated Strong Employee ID (3 categories)
- OASIS SAML Conformance 2.0 (3 categories)
- Self-issued Identifier (3 categories)
- Common to any Internet Identity Ecosystem ARR (3 categories)
- Design Pattern: Common to any Internet Identity Ecosystem (3 categories)
- Design Pattern: Dual use user agent (3 categories)
- User Intent Pattern (3 categories)
- Authenticate Person Use Case (3 categories)
- Privacy Enhanced by User Agent (3 categories)
- Privacy Enhancing Technologies (3 categories)
- SMART on FHIR (3 categories)
- Design Pattern: Role Based Access (3 categories)
- Docker (3 categories)
- Best Practices and Example for RP System (3 categories)
- Anonymous Browsing Use Case (3 categories)
- Attribute (3 categories)
- Change Identity Provider Use Case (3 categories)
- Identity (3 categories)
- Migrate to Federated Identity Use Case (3 categories)
- Identity Modeling Introduction (3 categories)
- Consent Grant (3 categories)
- RSA PKCS 12 (3 categories)
- Design Pattern: Selecting an Identity (3 categories)
- User Registration Ceremony (3 categories)
- Publicly Discoverable ePayment Address(es) (3 categories)
- InCommon Glossary (3 categories)
- Session Identifier (3 categories)
- Health Care Profile (3 categories)
- Health Care Profile Sandbox (3 categories)
- Information Sharing Agreement (3 categories)
- Accreditation Authority (3 categories)
- Patient-centric (3 categories)
- Attestation (3 categories)
- Reliability (3 categories)
- FBCA CP 2.25 (3 categories)
- FBCA Cross-certification Methodology 3.0 (3 categories)
- FICAM TFPAP 1.0.1 (3 categories)
- Patient with Lab and Referral Use Case (3 categories)
- Emergency Contact Information Use Case (3 categories)
- Patient pull of information (3 categories)
- Patient Registration with Distributed Attributes (3 categories)
- Patient uses Trusted Third Party to authenticate and move EHR (3 categories)
- Patient under 13 and Homeless Use Case (3 categories)
- Remote Attestation Use Case (3 categories)
- Public Health Centers (3 categories)
- Mobile Driver's License in Healthcare (3 categories)
- Mobile Driver's License (3 categories)
- Secure Sharing of High Integrity Documents (3 categories)
- General Data Protection Regulation (3 categories)
- NIST SP 800-53 (3 categories)
- FICAM Privacy Guidance for Assessors (3 categories)
- Kantara Federal Privacy Criteria (3 categories)
- Trust Federation Membership Validation (3 categories)
- User recovery and redress (3 categories)
- FIPS 201-2 (2 categories)
- User Agent Assurance (2 categories)
- IETF ID SWD (2 categories)
- OpenID Attribute 1.0 (2 categories)
- OpenID Connect Discovery 1.0 (2 categories)
- Yadis 1.0 (2 categories)
- BAE Governance (2 categories)
- BAE Overview (2 categories)
- Access Age Restricted Content Use Case (2 categories)
- Verify an Attribute Claim Use Case (2 categories)
- OASIS SAML Security and Privacy 2.0 (2 categories)
- FIDO Universal Authentication Framework (UAF) 1.x (2 categories)
- OASIS SAML Authentication Context 2.0 (2 categories)
- Cryptographic Secret Recovery (2 categories)
- Key Roll-over (2 categories)
- OpenID Connect 1.0 (2 categories)
- BAE SAML 2.0 Profiles (2 categories)
- ICAM IMI Profile 1.0.1 (2 categories)
- ICAM OpenID 2.0 Profile 1.0.1 (2 categories)
- ICAM SAML 2.0 WB SSO Profile 1.0.2 (2 categories)
- Kantara SAML 2.0 Profile (2 categories)
- OASIS IMI 1.0 (2 categories)
- OASIS SAML Bindings 2.0 (2 categories)
- OASIS SAML Glossary 2.0 (2 categories)
- OASIS SAML Metadata 2.0 (2 categories)
- OASIS SAML Profiles 2.0 (2 categories)
- OASIS SAML Protocol 2.0 (2 categories)
- OAuth 1.0 Protocol (2 categories)
- OpenID Auth 1.1 (2 categories)
- OpenID Authentication 2.0 (2 categories)
- OpenID Connect Basic 1.0 (2 categories)
- OpenID Connect Dynamic Registration 1.0 (2 categories)
- OpenID Connect Implicit 1.0 (2 categories)
- OpenID Connect Messages 1.0 (2 categories)
- OpenID Connect Session 1.0 (2 categories)
- OpenID OAuth 2.0 Responses (2 categories)
- OpenID Policy 1.0 (2 categories)
- OpenID SRE 1.0 (2 categories)
- Authenticate Organization Use Case (2 categories)
- Authenticate Service Use Case (2 categories)
- Authenticate Website Use Case (2 categories)
- Authentication for Enrollment in a Financial Service (2 categories)
- BB+ Direct PULL (2 categories)
- Cryptographic Authentication for Access to Online Resources (2 categories)
- Delegate Credentials Use Case (2 categories)
- Delegate to Trusted Assistant Use Case (2 categories)
- Delegated Authentication Use Case (2 categories)
- Delegated Authentication for User Managed Access (2 categories)
- End User to Cloud Authentication Use Case (2 categories)
- Enterprise SSO Authentication Use Case (2 categories)
- Enterprise to Cloud Authentication Use Case (2 categories)
- Enterprise to Cloud to End User Authentication Use Case (2 categories)
- Enterprise to Cloud to Enterprise Authentication Use Case (2 categories)
- Four Party Authentication and Authorization Use Case (2 categories)
- Medicare Patient logs into MyMedicare.gov site to access their records (2 categories)
- Privacy facilitated by User Agent Use Case (2 categories)
- Remote E-Notarization Use Case (2 categories)
- Three Party Authentication Use Case (2 categories)
- Resource Server (2 categories)
- OAuth 2.0 (2 categories)
- Best Practices and Example for Tagging Data (2 categories)
- ISO's Framework for identity management - part1 - terminology and concepts (2 categories)
- OASIS SAML 2.0 (2 categories)
- Verify Attribute Binding Use Case (2 categories)
- Compliant Implementation of RP on ASP.NET (2 categories)
- Credential Service Provider (2 categories)
- Digital Entity (2 categories)
- Digital Identity (2 categories)
- Entity (2 categories)
- Identity Proofer (2 categories)
- Identity Provider (2 categories)
- Relying Party (2 categories)
- User Experience Guidelines Metrics (2 categories)
- User Apps with Identifiers (2 categories)
- Conformance (2 categories)
- Patient Consent (2 categories)
- PIV-I Certificate and CRL Profile (2 categories)
- IETF RFC 5280 (2 categories)
- FIPS 201-1 (2 categories)
- NIST SP 800-73-3 Part 1 (2 categories)
- NIST SP 800-73-3 Part 2 (2 categories)
- NIST SP 800-73-3 Part 3 (2 categories)
- NIST SP 800-73-3 Part 4 (2 categories)
- NIST SP 800-76-2 (2 categories)
- PIV-I for Non-Federal Issuers (2 categories)
- ANSI X9.62-2005 (2 categories)
- ANSI X9.63-2001 (2 categories)
- FIPS 186-3 (2 categories)
- Community and Privacy Pattern Language (2 categories)
- Responsive Design Pattern (2 categories)
- IETF RFC 2026 (2 categories)
- ISO-IEC Directives Part 2 (2 categories)
- OASIS Interop (2 categories)
- OASIS TC-Process Sec 2.18 (2 categories)
- Credential Issuance Use Case (2 categories)
- PIV-I Enrollment for Educational Institutions Use Case (2 categories)
- PIV-I Enrollment for Financial Institutions Use Case (2 categories)
- Remote Electronic Identity Proofing Use Case (2 categories)
- Data Controller (2 categories)
- Identifier (2 categories)
- NSTIC Strategy (2 categories)
- Provider (2 categories)
- UXC Dictionary (2 categories)
- UXC Use Case Mapping (2 categories)
- User (2 categories)
- User Agent (2 categories)
- Financial Profile (2 categories)
- Financial Profile Sandbox (2 categories)
- Framework Profiles (2 categories)
- Trustmark (2 categories)
- Privacy Profile (2 categories)
- Entity Statement (2 categories)
- Attribute Vector (2 categories)
- Smartphone (2 categories)
- Guardian (2 categories)
- User Notice (2 categories)
- Consent (2 categories)
- Trusted Entity (2 categories)
- Electronic Health Record (2 categories)
- Persistent Compute Objects (2 categories)
- Immunization Information System (2 categories)
- Health IT Record Location Service (Data Aggregation) (2 categories)
- Phone as Health Care Credential (2 categories)
- FHIR Use Case (2 categories)
- FHIR to the Patient Use Case (2 categories)
- Patient Web Experience (2 categories)
- Authorized Certification Body (2 categories)
- Patient Interaction with HIE (2 categories)
- Digital Travel Credentials (2 categories)
- Health Consent (2 categories)
- Patient Journey as seen by the Browser (2 categories)
- Patient Empowerment (2 categories)
- Usable Best Practice A (2 categories)
- Usable Req 1 (2 categories)
- Mobile Driver's License Criteria (2 categories)
- Bind Attributes to Identity Use Case (2 categories)
- Change IdP (2 categories)
- Change Identity Provider (IdP) Use Case (2 categories)
- Individuals Can Choose and Change Identity Account Providers and Can Use Between and Manage Multiple Different Interoperable Credentials (2 categories)
- Match Names between Identity Systems Use Case (2 categories)
- Persona Attributes (2 categories)
- Publicly Discoverable ePayment Address(es) Part 2 (2 categories)
- Publicly Discoverable ePayment Address(es) Part 3 (2 categories)
- Revocation of Delegated Authentication Use Case (2 categories)
- ABADSG (2 categories)
- CertiPath CP 3.18 (2 categories)
- EV Cert 1.1 (2 categories)
- IETF RFC 3647 (2 categories)
- NIST IR 7870 (2 categories)
- IETF RFC 4122 (2 categories)
- OASIS xNL 2.0 (2 categories)
- UX Usability Requirements and Guidelines Working Document (2 categories)
- Use Cases (2 categories)
- Use Case Ad Hoc Group (2 categories)
- User Managed Access (UMA) (2 categories)
- Approve Disclosure of PII Use Case (2 categories)
- Authenticate Using Pseudonymous Identity Use Case (2 categories)
- Disclose Storage of PII Use Case (2 categories)
- Game Avatar as Pseudonymous Identity Use Case (2 categories)
- Identity Ecosystem Framework enables individuals to protect their privacy through clear FIPPS rules (2 categories)
- Identity Ecosystem Framework protects individuals from unbounded liability in particular for losses that they were powerless to prevent. (2 categories)
- Inform User of Disclosure of PII Use Case (2 categories)
- No one service provider can gain a complete picture of an individual’s life in cyberspace (2 categories)
- Online Safety for Democracy Activists Use Case (2 categories)