Search results

Jump to navigation Jump to search

Page title matches

    Page text matches

    • ===Use Cases=== *[[Emergency Contact Information Use Case]]
      5 KB (788 words) - 16:34, 16 April 2019
    • ...s this plan lays out how to address specific community needs for security, privacy, interoperability and user experience. It is expected that all communities ...nd best practices to manage cybersecurity-related risk. One example of the use of vertical industry profiles of this framework may be found by following t
      7 KB (988 words) - 21:22, 15 December 2018
    • # Creation of a profile for the use of the [[UXC NSTIC Principles]] in the US Healthcare community. ...it has been tried. (It has only worked where some enterprise required its use.)
      18 KB (2,580 words) - 18:52, 7 December 2020
    • Looking at the examples we received from the security and privacy committees, which are both farther along in requirements development, Suzan - needs to work well for both cases. What this means is that whatever is displayed by the RP
      26 KB (4,220 words) - 19:40, 19 December 2014
    • ==Full Title of Use Case== ...patient with a trusted identity which confirms that they subscribe to the privacy regulations of the trust provider.
      5 KB (825 words) - 17:21, 3 May 2019
    • '''Use Case Description''': ...pseudonymous identity, match names between systems, verify attributes with privacy protection]
      858 bytes (99 words) - 18:49, 27 September 2019
    • Use cases for Consideration January 10, 2017 Foundation for Use Case Development: IDESG Guiding Principles and Platform Services
      3 KB (399 words) - 18:50, 13 May 2020
    • ...t have established a repertory of regulations and guidelines that focus on privacy and seek to achieve two sets of goals that create tension among designers a There are a variety of use cases that most of us experience on a steady basis that need to establish as user
      12 KB (2,064 words) - 19:21, 28 May 2020
    • Privacy, Trust/Assurance, Interoperability ==When to use this Pattern (Context)==
      11 KB (1,838 words) - 16:48, 19 January 2016
    • In some ways this is similar to existing use case that discuss privacy enhancing technology, but the purpose is quite different. Privacy, Trust/Assurance, Interoperability
      9 KB (1,467 words) - 20:46, 9 September 2018
    • # The user gets to select which of their identifiers they wish to use with the web site. *Regulatory and commercial pressures on Web Site to increase user privacy are mounting.
      13 KB (2,151 words) - 00:14, 30 October 2020
    • In some ways this is similar to the existing use case that discusses privacy enhancing technology, but the purpose of the pattern is limited to the attr Privacy, Trust/Assurance, Interoperability
      17 KB (2,712 words) - 19:20, 28 November 2021

    View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)