Pages with the most categories

Jump to navigation Jump to search

Showing below up to 250 results in range #1 to #250.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Distributed Identity Assurance‏‎ (7 categories)
  2. Consent to Create Binding‏‎ (6 categories)
  3. Identity Proofing Use Case‏‎ (5 categories)
  4. Level of Assurance‏‎ (5 categories)
  5. Trustmark Evolving Design Pattern‏‎ (5 categories)
  6. Identity Model‏‎ (5 categories)
  7. User Consent‏‎ (5 categories)
  8. State Issued ID for Healthcare‏‎ (5 categories)
  9. Basic interactions in a single Trust Framework‏‎ (5 categories)
  10. ISO/IEC 29115 Entity Authentication Assurance‏‎ (4 categories)
  11. NIST SP 800-63-2‏‎ (4 categories)
  12. Software Compliance Attestation‏‎ (4 categories)
  13. Generalized Presumptive Authentication‏‎ (4 categories)
  14. Authorization‏‎ (4 categories)
  15. User Choice Pattern‏‎ (4 categories)
  16. Patient authenticates to EHR to access their lab results‏‎ (4 categories)
  17. Emergency Access‏‎ (4 categories)
  18. Identity Design Patterns‏‎ (4 categories)
  19. Consent Receipt‏‎ (4 categories)
  20. Un and Underserved People Use Case‏‎ (4 categories)
  21. Trustworthy Healthcare Ecosystem‏‎ (4 categories)
  22. Trustworthy Healthcare Provider‏‎ (4 categories)
  23. User Agent in the Cloud‏‎ (4 categories)
  24. Patient Choice‏‎ (4 categories)
  25. Trustworthy Healthcare Application‏‎ (4 categories)
  26. User Private Information‏‎ (4 categories)
  27. InCommon IAAF 1.1‏‎ (3 categories)
  28. High Assurance AZ Token‏‎ (3 categories)
  29. Native Apps for US Healthcare‏‎ (3 categories)
  30. Device Integrity supporting User Authentication‏‎ (3 categories)
  31. Trust Elevation Use Case‏‎ (3 categories)
  32. Authentication‏‎ (3 categories)
  33. Federated Strong Employee ID‏‎ (3 categories)
  34. OASIS SAML Conformance 2.0‏‎ (3 categories)
  35. Self-issued Identifier‏‎ (3 categories)
  36. Common to any Internet Identity Ecosystem ARR‏‎ (3 categories)
  37. Design Pattern: Common to any Internet Identity Ecosystem‏‎ (3 categories)
  38. Design Pattern: Dual use user agent‏‎ (3 categories)
  39. User Intent Pattern‏‎ (3 categories)
  40. Authenticate Person Use Case‏‎ (3 categories)
  41. Privacy Enhanced by User Agent‏‎ (3 categories)
  42. Privacy Enhancing Technologies‏‎ (3 categories)
  43. SMART on FHIR‏‎ (3 categories)
  44. Design Pattern: Role Based Access‏‎ (3 categories)
  45. Docker‏‎ (3 categories)
  46. Best Practices and Example for RP System‏‎ (3 categories)
  47. Anonymous Browsing Use Case‏‎ (3 categories)
  48. Attribute‏‎ (3 categories)
  49. Change Identity Provider Use Case‏‎ (3 categories)
  50. Identity‏‎ (3 categories)
  51. Migrate to Federated Identity Use Case‏‎ (3 categories)
  52. Identity Modeling Introduction‏‎ (3 categories)
  53. Consent Grant‏‎ (3 categories)
  54. RSA PKCS 12‏‎ (3 categories)
  55. Design Pattern: Selecting an Identity‏‎ (3 categories)
  56. User Registration Ceremony‏‎ (3 categories)
  57. Publicly Discoverable ePayment Address(es)‏‎ (3 categories)
  58. InCommon Glossary‏‎ (3 categories)
  59. Session Identifier‏‎ (3 categories)
  60. Health Care Profile‏‎ (3 categories)
  61. Health Care Profile Sandbox‏‎ (3 categories)
  62. Information Sharing Agreement‏‎ (3 categories)
  63. Accreditation Authority‏‎ (3 categories)
  64. Patient-centric‏‎ (3 categories)
  65. Attestation‏‎ (3 categories)
  66. Reliability‏‎ (3 categories)
  67. FBCA CP 2.25‏‎ (3 categories)
  68. FBCA Cross-certification Methodology 3.0‏‎ (3 categories)
  69. FICAM TFPAP 1.0.1‏‎ (3 categories)
  70. Patient with Lab and Referral Use Case‏‎ (3 categories)
  71. Emergency Contact Information Use Case‏‎ (3 categories)
  72. Patient pull of information‏‎ (3 categories)
  73. Patient Registration with Distributed Attributes‏‎ (3 categories)
  74. Patient uses Trusted Third Party to authenticate and move EHR‏‎ (3 categories)
  75. Patient under 13 and Homeless Use Case‏‎ (3 categories)
  76. Remote Attestation Use Case‏‎ (3 categories)
  77. Public Health Centers‏‎ (3 categories)
  78. Mobile Driver's License in Healthcare‏‎ (3 categories)
  79. Mobile Driver's License‏‎ (3 categories)
  80. Secure Sharing of High Integrity Documents‏‎ (3 categories)
  81. General Data Protection Regulation‏‎ (3 categories)
  82. NIST SP 800-53‏‎ (3 categories)
  83. FICAM Privacy Guidance for Assessors‏‎ (3 categories)
  84. Kantara Federal Privacy Criteria‏‎ (3 categories)
  85. Trust Federation Membership Validation‏‎ (3 categories)
  86. User recovery and redress‏‎ (3 categories)
  87. FIPS 201-2‏‎ (2 categories)
  88. User Agent Assurance‏‎ (2 categories)
  89. IETF ID SWD‏‎ (2 categories)
  90. OpenID Attribute 1.0‏‎ (2 categories)
  91. OpenID Connect Discovery 1.0‏‎ (2 categories)
  92. Yadis 1.0‏‎ (2 categories)
  93. BAE Governance‏‎ (2 categories)
  94. BAE Overview‏‎ (2 categories)
  95. Access Age Restricted Content Use Case‏‎ (2 categories)
  96. Verify an Attribute Claim Use Case‏‎ (2 categories)
  97. OASIS SAML Security and Privacy 2.0‏‎ (2 categories)
  98. FIDO Universal Authentication Framework (UAF) 1.x‏‎ (2 categories)
  99. OASIS SAML Authentication Context 2.0‏‎ (2 categories)
  100. Cryptographic Secret Recovery‏‎ (2 categories)
  101. Key Roll-over‏‎ (2 categories)
  102. OpenID Connect 1.0‏‎ (2 categories)
  103. BAE SAML 2.0 Profiles‏‎ (2 categories)
  104. ICAM IMI Profile 1.0.1‏‎ (2 categories)
  105. ICAM OpenID 2.0 Profile 1.0.1‏‎ (2 categories)
  106. ICAM SAML 2.0 WB SSO Profile 1.0.2‏‎ (2 categories)
  107. Kantara SAML 2.0 Profile‏‎ (2 categories)
  108. OASIS IMI 1.0‏‎ (2 categories)
  109. OASIS SAML Bindings 2.0‏‎ (2 categories)
  110. OASIS SAML Glossary 2.0‏‎ (2 categories)
  111. OASIS SAML Metadata 2.0‏‎ (2 categories)
  112. OASIS SAML Profiles 2.0‏‎ (2 categories)
  113. OASIS SAML Protocol 2.0‏‎ (2 categories)
  114. OAuth 1.0 Protocol‏‎ (2 categories)
  115. OpenID Auth 1.1‏‎ (2 categories)
  116. OpenID Authentication 2.0‏‎ (2 categories)
  117. OpenID Connect Basic 1.0‏‎ (2 categories)
  118. OpenID Connect Dynamic Registration 1.0‏‎ (2 categories)
  119. OpenID Connect Implicit 1.0‏‎ (2 categories)
  120. OpenID Connect Messages 1.0‏‎ (2 categories)
  121. OpenID Connect Session 1.0‏‎ (2 categories)
  122. OpenID OAuth 2.0 Responses‏‎ (2 categories)
  123. OpenID Policy 1.0‏‎ (2 categories)
  124. OpenID SRE 1.0‏‎ (2 categories)
  125. Authenticate Organization Use Case‏‎ (2 categories)
  126. Authenticate Service Use Case‏‎ (2 categories)
  127. Authenticate Website Use Case‏‎ (2 categories)
  128. Authentication for Enrollment in a Financial Service‏‎ (2 categories)
  129. BB+ Direct PULL‏‎ (2 categories)
  130. Cryptographic Authentication for Access to Online Resources‏‎ (2 categories)
  131. Delegate Credentials Use Case‏‎ (2 categories)
  132. Delegate to Trusted Assistant Use Case‏‎ (2 categories)
  133. Delegated Authentication Use Case‏‎ (2 categories)
  134. Delegated Authentication for User Managed Access‏‎ (2 categories)
  135. End User to Cloud Authentication Use Case‏‎ (2 categories)
  136. Enterprise SSO Authentication Use Case‏‎ (2 categories)
  137. Enterprise to Cloud Authentication Use Case‏‎ (2 categories)
  138. Enterprise to Cloud to End User Authentication Use Case‏‎ (2 categories)
  139. Enterprise to Cloud to Enterprise Authentication Use Case‏‎ (2 categories)
  140. Four Party Authentication and Authorization Use Case‏‎ (2 categories)
  141. Medicare Patient logs into MyMedicare.gov site to access their records‏‎ (2 categories)
  142. Privacy facilitated by User Agent Use Case‏‎ (2 categories)
  143. Remote E-Notarization Use Case‏‎ (2 categories)
  144. Three Party Authentication Use Case‏‎ (2 categories)
  145. Resource Server‏‎ (2 categories)
  146. OAuth 2.0‏‎ (2 categories)
  147. Best Practices and Example for Tagging Data‏‎ (2 categories)
  148. ISO's Framework for identity management - part1 - terminology and concepts‏‎ (2 categories)
  149. OASIS SAML 2.0‏‎ (2 categories)
  150. Verify Attribute Binding Use Case‏‎ (2 categories)
  151. Compliant Implementation of RP on ASP.NET‏‎ (2 categories)
  152. Credential Service Provider‏‎ (2 categories)
  153. Digital Entity‏‎ (2 categories)
  154. Digital Identity‏‎ (2 categories)
  155. Entity‏‎ (2 categories)
  156. Identity Proofer‏‎ (2 categories)
  157. Identity Provider‏‎ (2 categories)
  158. Relying Party‏‎ (2 categories)
  159. User Experience Guidelines Metrics‏‎ (2 categories)
  160. User Apps with Identifiers‏‎ (2 categories)
  161. Conformance‏‎ (2 categories)
  162. Patient Consent‏‎ (2 categories)
  163. PIV-I Certificate and CRL Profile‏‎ (2 categories)
  164. IETF RFC 5280‏‎ (2 categories)
  165. FIPS 201-1‏‎ (2 categories)
  166. NIST SP 800-73-3 Part 1‏‎ (2 categories)
  167. NIST SP 800-73-3 Part 2‏‎ (2 categories)
  168. NIST SP 800-73-3 Part 3‏‎ (2 categories)
  169. NIST SP 800-73-3 Part 4‏‎ (2 categories)
  170. NIST SP 800-76-2‏‎ (2 categories)
  171. PIV-I for Non-Federal Issuers‏‎ (2 categories)
  172. ANSI X9.62-2005‏‎ (2 categories)
  173. ANSI X9.63-2001‏‎ (2 categories)
  174. FIPS 186-3‏‎ (2 categories)
  175. Community and Privacy Pattern Language‏‎ (2 categories)
  176. Responsive Design Pattern‏‎ (2 categories)
  177. IETF RFC 2026‏‎ (2 categories)
  178. ISO-IEC Directives Part 2‏‎ (2 categories)
  179. OASIS Interop‏‎ (2 categories)
  180. OASIS TC-Process Sec 2.18‏‎ (2 categories)
  181. Credential Issuance Use Case‏‎ (2 categories)
  182. PIV-I Enrollment for Educational Institutions Use Case‏‎ (2 categories)
  183. PIV-I Enrollment for Financial Institutions Use Case‏‎ (2 categories)
  184. Remote Electronic Identity Proofing Use Case‏‎ (2 categories)
  185. Data Controller‏‎ (2 categories)
  186. Identifier‏‎ (2 categories)
  187. NSTIC Strategy‏‎ (2 categories)
  188. Provider‏‎ (2 categories)
  189. UXC Dictionary‏‎ (2 categories)
  190. UXC Use Case Mapping‏‎ (2 categories)
  191. User‏‎ (2 categories)
  192. User Agent‏‎ (2 categories)
  193. Financial Profile‏‎ (2 categories)
  194. Financial Profile Sandbox‏‎ (2 categories)
  195. Framework Profiles‏‎ (2 categories)
  196. Trustmark‏‎ (2 categories)
  197. Privacy Profile‏‎ (2 categories)
  198. Entity Statement‏‎ (2 categories)
  199. Attribute Vector‏‎ (2 categories)
  200. Smartphone‏‎ (2 categories)
  201. Guardian‏‎ (2 categories)
  202. User Notice‏‎ (2 categories)
  203. Consent‏‎ (2 categories)
  204. Trusted Entity‏‎ (2 categories)
  205. Electronic Health Record‏‎ (2 categories)
  206. Persistent Compute Objects‏‎ (2 categories)
  207. Immunization Information System‏‎ (2 categories)
  208. Health IT Record Location Service (Data Aggregation)‏‎ (2 categories)
  209. Phone as Health Care Credential‏‎ (2 categories)
  210. FHIR Use Case‏‎ (2 categories)
  211. FHIR to the Patient Use Case‏‎ (2 categories)
  212. Patient Web Experience‏‎ (2 categories)
  213. Authorized Certification Body‏‎ (2 categories)
  214. Patient Interaction with HIE‏‎ (2 categories)
  215. Digital Travel Credentials‏‎ (2 categories)
  216. Health Consent‏‎ (2 categories)
  217. Patient Journey as seen by the Browser‏‎ (2 categories)
  218. Patient Empowerment‏‎ (2 categories)
  219. Usable Best Practice A‏‎ (2 categories)
  220. Usable Req 1‏‎ (2 categories)
  221. Mobile Driver's License Criteria‏‎ (2 categories)
  222. Bind Attributes to Identity Use Case‏‎ (2 categories)
  223. Change IdP‏‎ (2 categories)
  224. Change Identity Provider (IdP) Use Case‏‎ (2 categories)
  225. Individuals Can Choose and Change Identity Account Providers and Can Use Between and Manage Multiple Different Interoperable Credentials‏‎ (2 categories)
  226. Match Names between Identity Systems Use Case‏‎ (2 categories)
  227. Persona Attributes‏‎ (2 categories)
  228. Publicly Discoverable ePayment Address(es) Part 2‏‎ (2 categories)
  229. Publicly Discoverable ePayment Address(es) Part 3‏‎ (2 categories)
  230. Revocation of Delegated Authentication Use Case‏‎ (2 categories)
  231. ABADSG‏‎ (2 categories)
  232. CertiPath CP 3.18‏‎ (2 categories)
  233. EV Cert 1.1‏‎ (2 categories)
  234. IETF RFC 3647‏‎ (2 categories)
  235. NIST IR 7870‏‎ (2 categories)
  236. IETF RFC 4122‏‎ (2 categories)
  237. OASIS xNL 2.0‏‎ (2 categories)
  238. UX Usability Requirements and Guidelines Working Document‏‎ (2 categories)
  239. Use Cases‏‎ (2 categories)
  240. Use Case Ad Hoc Group‏‎ (2 categories)
  241. User Managed Access (UMA)‏‎ (2 categories)
  242. Approve Disclosure of PII Use Case‏‎ (2 categories)
  243. Authenticate Using Pseudonymous Identity Use Case‏‎ (2 categories)
  244. Disclose Storage of PII Use Case‏‎ (2 categories)
  245. Game Avatar as Pseudonymous Identity Use Case‏‎ (2 categories)
  246. Identity Ecosystem Framework enables individuals to protect their privacy through clear FIPPS rules‏‎ (2 categories)
  247. Identity Ecosystem Framework protects individuals from unbounded liability in particular for losses that they were powerless to prevent.‏‎ (2 categories)
  248. Inform User of Disclosure of PII Use Case‏‎ (2 categories)
  249. No one service provider can gain a complete picture of an individual’s life in cyberspace‏‎ (2 categories)
  250. Online Safety for Democracy Activists Use Case‏‎ (2 categories)

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)