Search results

Jump to navigation Jump to search

Page title matches

    Page text matches

    • # Relying Parties can get the level of assurance that they need for authentication the user's identifiers. ...be able to provision one. See his evolving work with the emergency contact use case at http://controls.azurewebsites.net
      3 KB (507 words) - 00:20, 26 May 2019
    • ==Full Title of Use Case== # Patient can always get their own data, but only after strong authentication. This data will include a list of existing consent grants. The patient alwa
      5 KB (842 words) - 03:00, 21 May 2019
    • ==Full Title of Use Case== ...ately address patient data or other providers, like lab services, that may use the same or different EHRs.
      10 KB (1,662 words) - 19:21, 27 April 2020
    • ==Full Title of Use Case== * This use can can easily be extended to other sources of user-provided information, b
      8 KB (1,248 words) - 20:08, 4 December 2019
    • ==Full Title of Use Case== # Patient can always get their own data, but only after strong authentication. This data will include a list of existing consent grants. The patient alwa
      5 KB (825 words) - 17:21, 3 May 2019
    • # Creation of a profile for the use of the [[UXC NSTIC Principles]] in the US Healthcare community. ...it has been tried. (It has only worked where some enterprise required its use.)
      18 KB (2,580 words) - 18:52, 7 December 2020
    • ...rity assurance as well as a paradigm of federated frameworks that we could use in our framework design. *In all cases that are known in 2018, a natural person is required to take responsibility
      5 KB (813 words) - 15:47, 26 November 2018
    • ...online and be able to download it and and share it with others. In those cases trust must be established and shared within the ecosystem by digital means. ...ment and software may need to be checked for compliance and trust prior to use by the patient. For the purposes of this document, all hardware and softwar
      28 KB (4,415 words) - 17:28, 21 March 2021
    • ...and correction procedures based on user's providing more than one means of authentication to their account. There are a variety of use cases that most of us experience on a steady basis that need to establish as user
      12 KB (2,064 words) - 19:21, 28 May 2020
    • In some ways this is similar to existing use case that discuss privacy enhancing technology, but the purpose is quite di ==When to use this Pattern (Context)==
      9 KB (1,467 words) - 20:46, 9 September 2018
    • # The user gets to select which of their identifiers they wish to use with the web site. ...tions at that point in time. The current state of the web is recognized as use case 6, Contract of Adhesion.
      13 KB (2,151 words) - 00:14, 30 October 2020
    • In some ways this is similar to the existing use case that discusses privacy enhancing technology, but the purpose of the pa ===When to use this Pattern (Context)===
      17 KB (2,712 words) - 19:20, 28 November 2021

    View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)