Search results

Jump to navigation Jump to search
  • .... This use case looks forward to the case where the state has combined all identification cards into a single system. ...evice and is not currently enrolled for state services with a state issued identification card.
    8 KB (1,360 words) - 01:30, 7 January 2021
  • ...nt for the first time with a current complaint. The patient provides some identification and subjective information about their history and health problem and then ...been de-identified, and there are mitigating circumstances that prevent re-identification, which minimize risk of harm from unauthorized disclosure. The information
    20 KB (3,074 words) - 22:40, 21 March 2021
  • ...V to approve an individual’s application for a REAL ID driver’s license or identification card.
    30 KB (4,866 words) - 16:56, 9 June 2021
  • ...call SCRA that is supposed to be used by creditors and claims and not for identification purposes. That is the concern. Using the database even with the veteran p
    6 KB (1,061 words) - 04:02, 28 June 2018
  • ...]], [[Microcode]], [[Operator]], [[Output Data]], [[Password]], [[Personal Identification Number]], [[Physical Protection]], [[Plaintext Key]], [[Port]], [[Private K
    3 KB (379 words) - 03:58, 28 June 2018
  • for the Accreditation of PIV Card Issuers; SP 800-87, Codes for the Identification of Federal and
    1 KB (173 words) - 03:58, 28 June 2018
  • for the Accreditation of PIV Card Issuers; SP 800-87, Codes for the Identification of Federal and chain-of-trust for collected identification data, this will contain PII which must be protected and disposed
    3 KB (374 words) - 00:25, 24 August 2020
  • ...question was asked how to prepare the physical card along with some other identification process if the card is missing.
    7 KB (1,073 words) - 03:58, 28 June 2018
  • ...uested by the Relying Party. The need for attributes, in addition to user identification and authentication, stems from access control models in which combinations
    7 KB (1,007 words) - 03:58, 28 June 2018
  • *Strong identification usually with a second factor, like smart cards.
    8 KB (1,315 words) - 19:29, 30 July 2020
  • Countermeasures taken to prevent the unauthorized use of legitimate Identification & Authentication (I&A) data, however it was obtained, to mimic a subject di ...em used to satisfy a subset of requirements related to the verification or identification of an end user's identity so that the end user's identifier can be used to
    845 KB (86,833 words) - 04:00, 28 June 2018
  • ...or in it, and other printed information on it. It may be used for personal identification, physical access to facilities such as buildings and/or logical access to a Contrasts with Identification.
    135 KB (15,051 words) - 04:00, 28 June 2018
  • * Any time a user is asked to provide identification or personal information. In general the user will be able to assume that an
    10 KB (1,596 words) - 20:11, 15 October 2019
  • ...ing one knows (e.g., password/PIN), something one has (e.g., cryptographic identification device, token), or something one is (e.g., biometric). [[IDEF_Glossary_Refe
    11 KB (1,496 words) - 23:48, 5 September 2020
  • [[CPS Summary (or CPS Abstract)]], [[Identification]], [[Issuing Certification Authority (issuing CA)]],
    2 KB (297 words) - 04:00, 28 June 2018
  • ...d rules. The Identity Ecosystem will offer, but will not mandate, stronger identification and authentication while protecting privacy by limiting the amount of infor
    1 KB (171 words) - 04:00, 28 June 2018
  • ...rics. Authentication and the factors that contribute to establishing that identification for authentication needs to be better defined.
    3 KB (449 words) - 04:02, 28 June 2018
  • *#Identification of security standards for IDESG adoption
    2 KB (361 words) - 04:02, 28 June 2018
  • ...perator]], [[Grant Category]], [[Grant (of Rights Ofuse)]], [[Grantee]], [[Identification]], [[Identifier]], [[Identity]], [[Identity Assurance Work Group]], [[Ident
    2 KB (217 words) - 04:02, 28 June 2018
  • ...inct from the user display name and the user email address. Any real-world identification information must be protected as befits the compliance criteria that the RP # What are the canonical terms for identification?
    24 KB (3,980 words) - 19:57, 13 November 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)