Most linked-to pages
Jump to navigation
Jump to search
Showing below up to 250 results in range #1 to #250.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- Security (113 links)
- Baseline Functional Requirements v1.0 (80 links)
- Trust Frameworks (78 links)
- SALS (75 links)
- TFTM Meeting Attachments (75 links)
- TFTM Deliverables (74 links)
- Glossary (66 links)
- Taxonomy AHG Glossary (59 links)
- Taxonomy (55 links)
- IDEF Functional Model CREDENTIALING (54 links)
- Taxonomy AHG Catalog (51 links)
- IDEF Functional Model AUTHORIZATION (50 links)
- IDEF Functional Model REGISTRATION (50 links)
- IDEF Functional Model AUTHENTICATION (49 links)
- Taxonomy Project Management (49 links)
- IDEF Functional Model INTERMEDIATION (42 links)
- IDEF Glossary DIGITAL IDENTITY MANAGEMENT FUNCTIONS (34 links)
- Relying Party (34 links)
- IDEF Glossary USERS (30 links)
- APPENDIX A-Defined Terms (29 links)
- Authentication (27 links)
- Identifier (26 links)
- User Private Information (24 links)
- IDEF Glossary RELYING PARTIES (22 links)
- Health Care Profile (19 links)
- Supplemental Privacy Guidance (19 links)
- User Agent (19 links)
- IDEF Glossary IDENTITY PROVIDERS (18 links)
- Identity Provider (18 links)
- Privacy Req 1 (18 links)
- Privacy Requirements (18 links)
- Credential Service Provider (17 links)
- Digital Entity (17 links)
- Identity (17 links)
- Identity Design Patterns (17 links)
- IDEF Glossary (16 links)
- Subject (16 links)
- IDEF Glossary PERSONAL INFORMATION (15 links)
- IDEF Keywords INTEROPERABILITY (15 links)
- IDEF Keywords PRIVACY (15 links)
- IDEF Keywords SECURITY (15 links)
- Patient Choice (15 links)
- Attribute (14 links)
- Attributes (14 links)
- IDEF Keywords PROCESS (13 links)
- UXC Use Case Mapping (13 links)
- User Object (13 links)
- User:Ann Racuya-Robbins (13 links)
- User talk:Ann Racuya-Robbins (13 links)
- Entity (12 links)
- Identity Proofing (12 links)
- Identity Proofing Use Case (12 links)
- Subscriber (12 links)
- User Experience (12 links)
- AAWG Work Plan (11 links)
- AAWG Work Plan Assumptions (11 links)
- Attributes Ad-Hoc Workgroup Work Plan Space (11 links)
- Attributes Ad-hoc Workgroup Deliverables (11 links)
- IDEF Keywords CHOICE (11 links)
- IDEF Keywords LIMITATION (11 links)
- Token (11 links)
- Trustworthy Healthcare Ecosystem (11 links)
- Authenticate Person Use Case (10 links)
- Authorization (10 links)
- Best Practices and Example for RP System (10 links)
- Health IT Record Location Service (Data Aggregation) (10 links)
- IDEF Keywords POLICIES (10 links)
- IDEF Keywords USABILITY (10 links)
- Phone as Health Care Credential (10 links)
- User (10 links)
- Applicant (9 links)
- Credential (9 links)
- Digital Identity (9 links)
- IDEF Keywords CREDENTIAL (9 links)
- Identity Ecosystem (9 links)
- NSTIC Strategy (9 links)
- SALS Application Package (9 links)
- TFTMControlCodes (9 links)
- Trust Elevation Use Case (9 links)
- Trust Framework Membership Validation (9 links)
- Application Instructions and Attestation Forms (8 links)
- Claimant (8 links)
- IDEF Glossary ATTRIBUTES (8 links)
- IDEF Glossary STANDARDS (8 links)
- IDEF Keywords OPEN-STANDARDS (8 links)
- NIST SP 800-63-1 (8 links)
- OpenID Connect 1.0 (8 links)
- Registration Authority (8 links)
- SALS Data Handling and Use Policy (8 links)
- SALS Supplemental Terms of Use (8 links)
- Smart Phone (8 links)
- User Experience Overview (8 links)
- Assertion (7 links)
- Binding (7 links)
- Credential Issuance Use Case (7 links)
- Guardian (7 links)
- IDEF Functional Model (7 links)
- IDEF Glossary THIRD PARTIES (7 links)
- IDEF Keywords IDENTIFIERS (7 links)
- IDEF Keywords RISK (7 links)
- IDEF Keywords TOKEN (7 links)
- Identity Model (7 links)
- Interop Req 6 (7 links)
- OASIS SAML Glossary 2.0 (7 links)
- OAuth 2.0 (7 links)
- Patient with Lab and Referral Use Case (7 links)
- Privacy (7 links)
- Privacy Req 2 (7 links)
- Privacy Req 5 (7 links)
- Remote Electronic Identity Proofing Use Case (7 links)
- Anonymous Interaction (6 links)
- Authentication for Enrollment in a Financial Service (6 links)
- Basic interactions in a single Trust Framework (6 links)
- Common to any Internet Identity Ecosystem (6 links)
- Consent Receipt (6 links)
- Cryptographic Authentication for Access to Online Resources (6 links)
- Delegated Authentication for User Managed Access (6 links)
- Design Pattern: Common to any Internet Identity Ecosystem (6 links)
- Device Integrity supporting User Authentication (6 links)
- Digital Signature (6 links)
- Emergency Contact Information Use Case (6 links)
- IDEF Glossary CREDENTIALS (6 links)
- IDEF Keywords ARCHITECTURE (6 links)
- IDEF Keywords DESIGN (6 links)
- IDEF Keywords NOTICE (6 links)
- Mobile Driver's License (6 links)
- Patient Registration with Distributed Attributes (6 links)
- Privacy Enhanced by User Agent (6 links)
- Privacy Enhancing Technologies (6 links)
- Public Key Infrastructure (6 links)
- Record Locator Service (6 links)
- SAML 2.0 (6 links)
- Selectively Disclose Attributes Use Case (6 links)
- User:Peter F Brown (6 links)
- Access Age Restricted Content Use Case (5 links)
- Authorization Server (5 links)
- Claim (5 links)
- Confidentiality (5 links)
- Four Party Authentication and Authorization Use Case (5 links)
- Framework Profiles (5 links)
- Functional Model (5 links)
- IDEF Keywords ASSESSMENT (5 links)
- IDEF Keywords ATTRIBUTES (5 links)
- IDEF Keywords COMPLIANCE (5 links)
- IDEF Keywords CONSENT (5 links)
- IDEF Keywords DATA-INTEGRITY (5 links)
- IDEF Keywords PURPOSE (5 links)
- IDEF Keywords TRANSACTION (5 links)
- IDESG Productization (5 links)
- Identification (5 links)
- Identity Ecosystem Framework (5 links)
- Integrity (5 links)
- Interop Req 8 (5 links)
- NIST SP 800-63-2 (5 links)
- Plenary Planning (5 links)
- Pseudonymous Interaction (5 links)
- Public Key (5 links)
- Registration (5 links)
- SALS Self-Assessment Matrix (5 links)
- Security Assertion Markup Language (5 links)
- Smartphone (5 links)
- Use Case Catalog (5 links)
- User Choice Pattern (5 links)
- User:Jim Fenton (5 links)
- User talk:Jim Fenton (5 links)
- User talk:Peter F Brown (5 links)
- Accreditation Authority (4 links)
- Actor:Relying Party (4 links)
- Attribute Authority (4 links)
- Audit (4 links)
- Card (4 links)
- Card Application (4 links)
- Certificate Policy (4 links)
- Certificate Revocation List (4 links)
- Certification Practice Statement (4 links)
- Compromise (4 links)
- Consent Grant (4 links)
- Consent to Create Binding (4 links)
- Cryptographic Key (4 links)
- Cryptographic Module (4 links)
- Data Controller (4 links)
- FMWG Work Plan (4 links)
- Financial Profile (4 links)
- General Data Protection Regulation (4 links)
- Health Care Profile Sandbox (4 links)
- IDEF Keywords ACCOUNT (4 links)
- IDEF Keywords CONTROL (4 links)
- IDEF Keywords PROVISIONING (4 links)
- IDEF Keywords THIRD PARTIES (4 links)
- IRS Identity Theft (4 links)
- ISO/IEC 29115 Entity Authentication Assurance (4 links)
- Identity Federation (4 links)
- Identity Management (4 links)
- Information Blocking (4 links)
- Interop Req 5 (4 links)
- Interop Req 7 (4 links)
- Metadata (4 links)
- Mobile Driver's License in Healthcare (4 links)
- NISTIR 7817 (4 links)
- Native Apps for US Healthcare (4 links)
- Network (4 links)
- Object Identifier (4 links)
- Patient Consent (4 links)
- Patient authenticates to EHR to access their lab results (4 links)
- Patient uses Trusted Third Party to authenticate and move EHR (4 links)
- Personally Identifiable Information (4 links)
- Principal (4 links)
- Privacy Req 3 (4 links)
- Private Key (4 links)
- Pseudonym (4 links)
- Public Health Centers (4 links)
- Redress (4 links)
- Remote Employee Verification and Certification Use Case (4 links)
- Resource Server (4 links)
- SALS Dispute Avoidance and Resolution Process (4 links)
- SALS FAQs (4 links)
- Secure Anonymous Digital Identity (4 links)
- Software Compliance Attestation (4 links)
- Standards (4 links)
- TFTM Action Items and Decisions Log (4 links)
- Threat (4 links)
- Trust Anchor (4 links)
- Trusted Third Party (4 links)
- UXC Dictionary (4 links)
- UXC NSTIC Principles (4 links)
- UXC resources (4 links)
- Un and Underserved People Use Case (4 links)
- Usable Req 4 (4 links)
- Usable Req 5 (4 links)
- Usable Req 7 (4 links)
- User Experience Guidelines Metrics (4 links)
- User Intent Pattern (4 links)
- User Notice (4 links)
- User recovery and redress (4 links)
- Verifier (4 links)
- Wiki Guidelines (4 links)
- User:Scott Shorter (4 links)
- Access (3 links)
- Access Control (3 links)
- Activation Data (3 links)
- Actor:Human User (3 links)
- Algorithm Identifier (3 links)
- Application Identifier (3 links)
- Approved (3 links)
- Attribute Provider (3 links)
- Authentication Protocol (3 links)
- BER-TLV Data Object (3 links)
- Biometric (3 links)
- Certification (3 links)
- Certification Authority (3 links)