Pages with the most categories

Jump to navigation Jump to search

Showing below up to 240 results in range #51 to #290.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Migrate to Federated Identity Use Case‏‎ (3 categories)
  2. Identity Modeling Introduction‏‎ (3 categories)
  3. Consent Grant‏‎ (3 categories)
  4. RSA PKCS 12‏‎ (3 categories)
  5. Design Pattern: Selecting an Identity‏‎ (3 categories)
  6. User Registration Ceremony‏‎ (3 categories)
  7. Publicly Discoverable ePayment Address(es)‏‎ (3 categories)
  8. InCommon Glossary‏‎ (3 categories)
  9. Session Identifier‏‎ (3 categories)
  10. Health Care Profile‏‎ (3 categories)
  11. Health Care Profile Sandbox‏‎ (3 categories)
  12. Information Sharing Agreement‏‎ (3 categories)
  13. Accreditation Authority‏‎ (3 categories)
  14. Patient-centric‏‎ (3 categories)
  15. Attestation‏‎ (3 categories)
  16. Reliability‏‎ (3 categories)
  17. FBCA CP 2.25‏‎ (3 categories)
  18. FBCA Cross-certification Methodology 3.0‏‎ (3 categories)
  19. FICAM TFPAP 1.0.1‏‎ (3 categories)
  20. Patient with Lab and Referral Use Case‏‎ (3 categories)
  21. Emergency Contact Information Use Case‏‎ (3 categories)
  22. Patient pull of information‏‎ (3 categories)
  23. Patient Registration with Distributed Attributes‏‎ (3 categories)
  24. Patient uses Trusted Third Party to authenticate and move EHR‏‎ (3 categories)
  25. Patient under 13 and Homeless Use Case‏‎ (3 categories)
  26. Remote Attestation Use Case‏‎ (3 categories)
  27. Public Health Centers‏‎ (3 categories)
  28. Mobile Driver's License in Healthcare‏‎ (3 categories)
  29. Mobile Driver's License‏‎ (3 categories)
  30. Secure Sharing of High Integrity Documents‏‎ (3 categories)
  31. General Data Protection Regulation‏‎ (3 categories)
  32. NIST SP 800-53‏‎ (3 categories)
  33. FICAM Privacy Guidance for Assessors‏‎ (3 categories)
  34. Kantara Federal Privacy Criteria‏‎ (3 categories)
  35. Trust Federation Membership Validation‏‎ (3 categories)
  36. User recovery and redress‏‎ (3 categories)
  37. FIPS 201-2‏‎ (2 categories)
  38. User Agent Assurance‏‎ (2 categories)
  39. IETF ID SWD‏‎ (2 categories)
  40. OpenID Attribute 1.0‏‎ (2 categories)
  41. OpenID Connect Discovery 1.0‏‎ (2 categories)
  42. Yadis 1.0‏‎ (2 categories)
  43. BAE Governance‏‎ (2 categories)
  44. BAE Overview‏‎ (2 categories)
  45. Access Age Restricted Content Use Case‏‎ (2 categories)
  46. Verify an Attribute Claim Use Case‏‎ (2 categories)
  47. OASIS SAML Security and Privacy 2.0‏‎ (2 categories)
  48. FIDO Universal Authentication Framework (UAF) 1.x‏‎ (2 categories)
  49. OASIS SAML Authentication Context 2.0‏‎ (2 categories)
  50. Cryptographic Secret Recovery‏‎ (2 categories)
  51. Key Roll-over‏‎ (2 categories)
  52. OpenID Connect 1.0‏‎ (2 categories)
  53. BAE SAML 2.0 Profiles‏‎ (2 categories)
  54. ICAM IMI Profile 1.0.1‏‎ (2 categories)
  55. ICAM OpenID 2.0 Profile 1.0.1‏‎ (2 categories)
  56. ICAM SAML 2.0 WB SSO Profile 1.0.2‏‎ (2 categories)
  57. Kantara SAML 2.0 Profile‏‎ (2 categories)
  58. OASIS IMI 1.0‏‎ (2 categories)
  59. OASIS SAML Bindings 2.0‏‎ (2 categories)
  60. OASIS SAML Glossary 2.0‏‎ (2 categories)
  61. OASIS SAML Metadata 2.0‏‎ (2 categories)
  62. OASIS SAML Profiles 2.0‏‎ (2 categories)
  63. OASIS SAML Protocol 2.0‏‎ (2 categories)
  64. OAuth 1.0 Protocol‏‎ (2 categories)
  65. OpenID Auth 1.1‏‎ (2 categories)
  66. OpenID Authentication 2.0‏‎ (2 categories)
  67. OpenID Connect Basic 1.0‏‎ (2 categories)
  68. OpenID Connect Dynamic Registration 1.0‏‎ (2 categories)
  69. OpenID Connect Implicit 1.0‏‎ (2 categories)
  70. OpenID Connect Messages 1.0‏‎ (2 categories)
  71. OpenID Connect Session 1.0‏‎ (2 categories)
  72. OpenID OAuth 2.0 Responses‏‎ (2 categories)
  73. OpenID Policy 1.0‏‎ (2 categories)
  74. OpenID SRE 1.0‏‎ (2 categories)
  75. Authenticate Organization Use Case‏‎ (2 categories)
  76. Authenticate Service Use Case‏‎ (2 categories)
  77. Authenticate Website Use Case‏‎ (2 categories)
  78. Authentication for Enrollment in a Financial Service‏‎ (2 categories)
  79. BB+ Direct PULL‏‎ (2 categories)
  80. Cryptographic Authentication for Access to Online Resources‏‎ (2 categories)
  81. Delegate Credentials Use Case‏‎ (2 categories)
  82. Delegate to Trusted Assistant Use Case‏‎ (2 categories)
  83. Delegated Authentication Use Case‏‎ (2 categories)
  84. Delegated Authentication for User Managed Access‏‎ (2 categories)
  85. End User to Cloud Authentication Use Case‏‎ (2 categories)
  86. Enterprise SSO Authentication Use Case‏‎ (2 categories)
  87. Enterprise to Cloud Authentication Use Case‏‎ (2 categories)
  88. Enterprise to Cloud to End User Authentication Use Case‏‎ (2 categories)
  89. Enterprise to Cloud to Enterprise Authentication Use Case‏‎ (2 categories)
  90. Four Party Authentication and Authorization Use Case‏‎ (2 categories)
  91. Medicare Patient logs into MyMedicare.gov site to access their records‏‎ (2 categories)
  92. Privacy facilitated by User Agent Use Case‏‎ (2 categories)
  93. Remote E-Notarization Use Case‏‎ (2 categories)
  94. Three Party Authentication Use Case‏‎ (2 categories)
  95. Resource Server‏‎ (2 categories)
  96. OAuth 2.0‏‎ (2 categories)
  97. Best Practices and Example for Tagging Data‏‎ (2 categories)
  98. ISO's Framework for identity management - part1 - terminology and concepts‏‎ (2 categories)
  99. OASIS SAML 2.0‏‎ (2 categories)
  100. Verify Attribute Binding Use Case‏‎ (2 categories)
  101. Compliant Implementation of RP on ASP.NET‏‎ (2 categories)
  102. Credential Service Provider‏‎ (2 categories)
  103. Digital Entity‏‎ (2 categories)
  104. Digital Identity‏‎ (2 categories)
  105. Entity‏‎ (2 categories)
  106. Identity Proofer‏‎ (2 categories)
  107. Identity Provider‏‎ (2 categories)
  108. Relying Party‏‎ (2 categories)
  109. User Experience Guidelines Metrics‏‎ (2 categories)
  110. User Apps with Identifiers‏‎ (2 categories)
  111. Conformance‏‎ (2 categories)
  112. Patient Consent‏‎ (2 categories)
  113. PIV-I Certificate and CRL Profile‏‎ (2 categories)
  114. IETF RFC 5280‏‎ (2 categories)
  115. FIPS 201-1‏‎ (2 categories)
  116. NIST SP 800-73-3 Part 1‏‎ (2 categories)
  117. NIST SP 800-73-3 Part 2‏‎ (2 categories)
  118. NIST SP 800-73-3 Part 3‏‎ (2 categories)
  119. NIST SP 800-73-3 Part 4‏‎ (2 categories)
  120. NIST SP 800-76-2‏‎ (2 categories)
  121. PIV-I for Non-Federal Issuers‏‎ (2 categories)
  122. ANSI X9.62-2005‏‎ (2 categories)
  123. ANSI X9.63-2001‏‎ (2 categories)
  124. FIPS 186-3‏‎ (2 categories)
  125. Community and Privacy Pattern Language‏‎ (2 categories)
  126. Responsive Design Pattern‏‎ (2 categories)
  127. IETF RFC 2026‏‎ (2 categories)
  128. ISO-IEC Directives Part 2‏‎ (2 categories)
  129. OASIS Interop‏‎ (2 categories)
  130. OASIS TC-Process Sec 2.18‏‎ (2 categories)
  131. Credential Issuance Use Case‏‎ (2 categories)
  132. PIV-I Enrollment for Educational Institutions Use Case‏‎ (2 categories)
  133. PIV-I Enrollment for Financial Institutions Use Case‏‎ (2 categories)
  134. Remote Electronic Identity Proofing Use Case‏‎ (2 categories)
  135. Data Controller‏‎ (2 categories)
  136. Identifier‏‎ (2 categories)
  137. NSTIC Strategy‏‎ (2 categories)
  138. Provider‏‎ (2 categories)
  139. UXC Dictionary‏‎ (2 categories)
  140. UXC Use Case Mapping‏‎ (2 categories)
  141. User‏‎ (2 categories)
  142. User Agent‏‎ (2 categories)
  143. Financial Profile‏‎ (2 categories)
  144. Financial Profile Sandbox‏‎ (2 categories)
  145. Framework Profiles‏‎ (2 categories)
  146. Trustmark‏‎ (2 categories)
  147. Privacy Profile‏‎ (2 categories)
  148. Entity Statement‏‎ (2 categories)
  149. Attribute Vector‏‎ (2 categories)
  150. Smartphone‏‎ (2 categories)
  151. Guardian‏‎ (2 categories)
  152. User Notice‏‎ (2 categories)
  153. Consent‏‎ (2 categories)
  154. Trusted Entity‏‎ (2 categories)
  155. Electronic Health Record‏‎ (2 categories)
  156. Persistent Compute Objects‏‎ (2 categories)
  157. Immunization Information System‏‎ (2 categories)
  158. Health IT Record Location Service (Data Aggregation)‏‎ (2 categories)
  159. Phone as Health Care Credential‏‎ (2 categories)
  160. FHIR Use Case‏‎ (2 categories)
  161. FHIR to the Patient Use Case‏‎ (2 categories)
  162. Patient Web Experience‏‎ (2 categories)
  163. Authorized Certification Body‏‎ (2 categories)
  164. Patient Interaction with HIE‏‎ (2 categories)
  165. Digital Travel Credentials‏‎ (2 categories)
  166. Health Consent‏‎ (2 categories)
  167. Patient Journey as seen by the Browser‏‎ (2 categories)
  168. Patient Empowerment‏‎ (2 categories)
  169. Usable Best Practice A‏‎ (2 categories)
  170. Usable Req 1‏‎ (2 categories)
  171. Mobile Driver's License Criteria‏‎ (2 categories)
  172. Bind Attributes to Identity Use Case‏‎ (2 categories)
  173. Change IdP‏‎ (2 categories)
  174. Change Identity Provider (IdP) Use Case‏‎ (2 categories)
  175. Individuals Can Choose and Change Identity Account Providers and Can Use Between and Manage Multiple Different Interoperable Credentials‏‎ (2 categories)
  176. Match Names between Identity Systems Use Case‏‎ (2 categories)
  177. Persona Attributes‏‎ (2 categories)
  178. Publicly Discoverable ePayment Address(es) Part 2‏‎ (2 categories)
  179. Publicly Discoverable ePayment Address(es) Part 3‏‎ (2 categories)
  180. Revocation of Delegated Authentication Use Case‏‎ (2 categories)
  181. ABADSG‏‎ (2 categories)
  182. CertiPath CP 3.18‏‎ (2 categories)
  183. EV Cert 1.1‏‎ (2 categories)
  184. IETF RFC 3647‏‎ (2 categories)
  185. NIST IR 7870‏‎ (2 categories)
  186. IETF RFC 4122‏‎ (2 categories)
  187. OASIS xNL 2.0‏‎ (2 categories)
  188. UX Usability Requirements and Guidelines Working Document‏‎ (2 categories)
  189. Use Cases‏‎ (2 categories)
  190. Use Case Ad Hoc Group‏‎ (2 categories)
  191. User Managed Access (UMA)‏‎ (2 categories)
  192. Approve Disclosure of PII Use Case‏‎ (2 categories)
  193. Authenticate Using Pseudonymous Identity Use Case‏‎ (2 categories)
  194. Disclose Storage of PII Use Case‏‎ (2 categories)
  195. Game Avatar as Pseudonymous Identity Use Case‏‎ (2 categories)
  196. Identity Ecosystem Framework enables individuals to protect their privacy through clear FIPPS rules‏‎ (2 categories)
  197. Identity Ecosystem Framework protects individuals from unbounded liability in particular for losses that they were powerless to prevent.‏‎ (2 categories)
  198. Inform User of Disclosure of PII Use Case‏‎ (2 categories)
  199. No one service provider can gain a complete picture of an individual’s life in cyberspace‏‎ (2 categories)
  200. Online Safety for Democracy Activists Use Case‏‎ (2 categories)
  201. Option Not to Track Use Case‏‎ (2 categories)
  202. PlayaNym as Pseudonymous Identity Use Case‏‎ (2 categories)
  203. Secure Anonymous Digital Identity‏‎ (2 categories)
  204. Use of online anonymity and pseudonymity‏‎ (2 categories)
  205. Trust Frameworks‏‎ (2 categories)
  206. Discover Attributes about Credentials Use Case‏‎ (2 categories)
  207. Discover Attributes about Individual Use Case‏‎ (2 categories)
  208. Access Control in Special Ed Use Case‏‎ (2 categories)
  209. Access Government Data Base Use Case‏‎ (2 categories)
  210. Remote High Value Transaction Use Case‏‎ (2 categories)
  211. IETF ID SCIM 1.0‏‎ (2 categories)
  212. OAuth 2.0 Threat Model‏‎ (2 categories)
  213. NIST SP 800-79-1‏‎ (2 categories)
  214. Accredit an Organization Use Case‏‎ (2 categories)
  215. Approve a Product Use Case‏‎ (2 categories)
  216. Certify a System Use Case‏‎ (2 categories)
  217. Conduct Compliance Audit Use Case‏‎ (2 categories)
  218. Conduct Product Testing Use Case‏‎ (2 categories)
  219. Conduct System Testing Use Case‏‎ (2 categories)
  220. IRS Identity Theft‏‎ (2 categories)
  221. NIST SP 800-130‏‎ (2 categories)
  222. PACS IG‏‎ (2 categories)
  223. IETF RFC 2510‏‎ (2 categories)
  224. IETF RFC 2560‏‎ (2 categories)
  225. NIST SP 800-152‏‎ (2 categories)
  226. NIST IR 7693‏‎ (2 categories)
  227. FIPS 140-2‏‎ (2 categories)
  228. NIST SP 800-85A-2‏‎ (2 categories)
  229. NIST SP 800-85B‏‎ (2 categories)
  230. InCommon IAP 1.1‏‎ (2 categories)
  231. Kantara IAF 1000‏‎ (2 categories)
  232. Kantara IAF 1100‏‎ (2 categories)
  233. Kantara IAF 1200‏‎ (2 categories)
  234. Kantara IAF 1300‏‎ (2 categories)
  235. Kantara IAF 1400‏‎ (2 categories)
  236. Kantara IAF 1600‏‎ (2 categories)
  237. Trusted Third Party‏‎ (2 categories)
  238. User Experience Trust Metrics‏‎ (2 categories)
  239. User Experience of a Trust Framework‏‎ (2 categories)
  240. User Engagement‏‎ (2 categories)

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)