Pages without language links

Jump to navigation Jump to search

The following pages do not link to other language versions.

Showing below up to 500 results in range #1 to #500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. 310-220 Training Tools
  2. 640-802 Examination Guide
  3. AAWG Work Plan
  4. AAWG Work Plan Assumptions
  5. ABADSG
  6. ANSI X9.62-2005
  7. ANSI X9.63-2001
  8. ANSI X9.63-2011
  9. APPENDIX A-Defined Terms
  10. A Brief Outline On The 640-802 Ccna Exam
  11. Access Age Restricted Content Use Case
  12. Access Control in Special Ed Use Case
  13. Access Government Data Base Use Case
  14. Account Creation at, and Login to, RP
  15. Accredit an Organization Use Case
  16. Accreditation Authority
  17. Actors
  18. All IDESG Activities
  19. Alternate Functional Model
  20. Anonymity Facilitated with Limited Scope Claims
  21. Anonymous Browsing Use Case
  22. Anonymous Interaction
  23. Applicant
  24. Application Instructions and Attestation Forms
  25. Approve Disclosure of PII Use Case
  26. Approve a Product Use Case
  27. April 12, 2016 UXC Meeting Page
  28. April 17, 2014 Meeting Page
  29. April 19, 2016 UXC Meeting Page
  30. April 2, 2015 Meeting Page
  31. April 21, 2017 VPWG Meeting Page
  32. April 22, 2016 UXC Meeting Page
  33. April 23, 2015 Meeting Page
  34. April 24, 2014 Meeting Page
  35. April 25, 2017 UXC Meeting Page
  36. April 26, 2016 UXC Meeting Page
  37. April 30, 2015 Meeting Page
  38. April 5, 2016 UXC Meeting Page
  39. April 7, 2017 VPWG Meeting Page
  40. April 9, 2015 Meeting Page
  41. Archived Material
  42. Article Writer - The Best Way To Get Freelance Writing Jobs Online
  43. Assigned Name
  44. Attestation
  45. Attribute
  46. Attribute Life Cycle
  47. Attribute Practice Statement Draft Outline Loosely Based on RFC 3647
  48. Attribute Practices Catalog
  49. Attribute Provider
  50. Attribute Vector
  51. Attribute proofing at AP
  52. Attribute release to RP
  53. Attributes
  54. Attributes Ad-Hoc Workgroup Work Plan Space
  55. Attributes Ad-hoc Workgroup Deliverables
  56. Attributes Terms of Reference.docx
  57. Attributes Work Plan
  58. August 1, 2017 UXC Meeting Page
  59. August 11, 2015 UXC Meeting Page
  60. August 13, 2015 Meeting Page
  61. August 14, 2014 Meeting Page
  62. August 15, 2013 Meeting Page
  63. August 16, 2016 UXC Meeting Page
  64. August 18, 2015 UXC Meeting Page
  65. August 2, 2017 UXC Meeting Page
  66. August 20, 2015 Meeting Page
  67. August 21, 2014 Meeting Page
  68. August 23, 2016 UXC Meeting Page
  69. August 25, 2015 UXC Meeting Page
  70. August 28, 2014 Meeting Page
  71. August 30, 2016 UXC Meeting Page
  72. August 4, 2015 UXC Meeting Page
  73. August 6, 2015 Meeting Page
  74. August 7, 2014 Meeting Page
  75. August 8, 2017 UXC Meeting Page
  76. Authenticate Organization Use Case
  77. Authenticate Person, With Token and LOA Process Flow Use Case
  78. Authenticate Person Use Case
  79. Authenticate Service Use Case
  80. Authenticate Using Pseudonymous Identity Use Case
  81. Authenticate Website Use Case
  82. Authentication
  83. Authentication Token
  84. Authentication for Enrollment in a Financial Service
  85. Authority
  86. Authorization
  87. Authorization Server
  88. Authorized Certification Body
  89. BAE Governance
  90. BAE Overview
  91. BAE SAML 2.0 Profiles
  92. BB+ Direct PULL
  93. Baseline Functional Requirements v1.0
  94. Basic interactions in a single Trust Framework
  95. Being Digital
  96. Best Practices and Example for RP System
  97. Best Practices and Example for Tagging Data
  98. BigDataIdentity
  99. Bind Attributes to Identity Use Case
  100. Binding
  101. Business Value Models
  102. Cdl General Knowledge Test
  103. Cdl Test Answers - Rip Over The Cdl Handbook
  104. CertiPath CP 3.18
  105. Certify a System Use Case
  106. Change IdP
  107. Change Identity Provider (IdP) Use Case
  108. Change Identity Provider Use Case
  109. Cisco Ccna Certification Exam Tutorial: Configuring And Troubleshooting Vtp
  110. Cisco Ccna Exam Tutorial: Password Recovery Procedures
  111. Claim
  112. Claimant
  113. Code of Conduct
  114. Combined Definitions
  115. Comment Instructions
  116. Comment Preload
  117. Comments to RIN 0955-AA02
  118. Common to any Internet Identity Ecosystem ARR
  119. Community and Privacy Pattern Language
  120. Compliant Implementation of RP on ASP.NET
  121. Concept Creation Guidelines
  122. Concept Meta-Model
  123. Condition of Certification
  124. Conduct Compliance Audit Use Case
  125. Conduct Product Testing Use Case
  126. Conduct System Testing Use Case
  127. Conformance
  128. Consent
  129. Consent Grant
  130. Consent Receipt
  131. Consent to Create Binding
  132. Content Tree for User Experience Proposal
  133. Covered Entities
  134. Creating Composite Claims from Multiple Providers
  135. Credential
  136. Credential Binding
  137. Credential Issuance Use Case
  138. Credential Service Provider
  139. Cryptographic Authentication for Access to Online Resources
  140. Cryptographic Secret Recovery
  141. DRAFT Financial Use Case
  142. Data Controller
  143. December 1, 2015 UXC Meeting Page
  144. December 11, 2014 Meeting Page
  145. December 12, 2017 UXC Meeting Page
  146. December 13, 2016 UXC Meeting Page
  147. December 14, 2016 VPWG Meeting Page
  148. December 18, 2014 Meeting Page
  149. December 19, 2017 UXC Meeting Page
  150. December 2, 2013 Meeting Page
  151. December 20, 2016 UXC Meeting Page
  152. December 22, 2015 UXC Meeting Page
  153. December 5, 2013 Meeting Page
  154. December 5, 2017 UXC Meeting Page
  155. December 6, 2016 UXC Meeting Page
  156. December 8, 2015 UXC Meeting Page
  157. December 9, 2013 Meeting Page
  158. Definitions
  159. Delegate Credentials Use Case
  160. Delegate to Trusted Assistant Use Case
  161. Delegated Authentication Use Case
  162. Delegated Authentication for User Managed Access
  163. Delegation
  164. Design Pattern: Common to any Internet Identity Ecosystem
  165. Design Pattern: Dual use user agent
  166. Design Pattern: Role Based Access
  167. Design Pattern: Selecting an Identity
  168. Device Integrity supporting User Authentication
  169. Digital Entity
  170. Digital Identity
  171. Digital Travel Credentials
  172. Disclose Storage of PII Use Case
  173. Discover Attributes about Credentials Use Case
  174. Discover Attributes about Individual Use Case
  175. Distributed Attributes for a Resilient Identity Ecosystem
  176. Distributed Identity Assurance
  177. Do Not Track
  178. Docker
  179. Draft and Candidate Attributes Practices for Review
  180. Draft and Candidate Functional Models for Review
  181. E-Deliberation-Procedures
  182. EV Cert 1.1
  183. Economic Inclusion Breakout Use Case
  184. Electronic Health Record
  185. Eliza
  186. Emergency Access
  187. Emergency Contact Information Use Case
  188. End User to Cloud Authentication Use Case
  189. Enterprise SSO Authentication Use Case
  190. Enterprise to Cloud Authentication Use Case
  191. Enterprise to Cloud to End User Authentication Use Case
  192. Enterprise to Cloud to Enterprise Authentication Use Case
  193. Entity
  194. Entity Statement
  195. Exam Certification Preparation Study Guide - 310-302
  196. Exampdf 000-979 Exam Questions And Answers
  197. Example
  198. Example Login Scenario
  199. Example Requirements for UXC Review
  200. FBCA CP 2.25
  201. FBCA Cross-certification Methodology 3.0
  202. FHIR Use Case
  203. FHIR to the Patient Use Case
  204. FICAM Privacy Guidance for Assessors
  205. FICAM TFPAP 1.0.1
  206. FIDO Universal 2nd Factor (U2F) 1.x
  207. FIDO Universal Authentication Framework (UAF) 1.x
  208. FIPS 140-2
  209. FIPS 140-2 Derived Test Requirements
  210. FIPS 186-3
  211. FIPS 201-1
  212. FIPS 201-2
  213. FIRE Mins 2019-10-29
  214. FMWG NSTIC Derived Rqmts WS
  215. FMWG Work Plan
  216. FMWG Work Plan Assumptions
  217. February 10, 2017 VPWG Meeting Page
  218. February 12, 2015 Meeting Page
  219. February 13, 2014 Meeting Page
  220. February 14, 2017 UXC Meeting Page
  221. February 16, 2016 UXC Meeting Page
  222. February 19, 2015 Meeting Page
  223. February 2, 2016 UXC Meeting Page
  224. February 20, 2014 Meeting Page
  225. February 21, 2017 UXC Meeting Page
  226. February 23, 2016 UXC Meeting Page
  227. February 24, 2015 Meeting Page
  228. February 24, 2017 VPWG Meeting Page
  229. February 26, 2015 Meeting Page
  230. February 27, 2014 Meeting Page
  231. February 28, 2017 UXC Meeting Page
  232. February 5, 2015 Meeting Page
  233. February 6, 2014 Meeting page
  234. February 6, 2015 UXC Meeting Page
  235. February 7, 2017 UXC Meeting Page
  236. February 9, 2016 UXC Meeting Page
  237. Federated Strong Employee ID
  238. Financial Profile
  239. Financial Profile Sandbox
  240. Financial Services Committee
  241. Four Party Authentication and Authorization Use Case
  242. Framework Management Office
  243. Framework Profiles
  244. Functional Model Ad-Hoc Workgroup Work Plan Space
  245. Functional Model Ad-hoc Workgroup Deliverables
  246. Functional Model Ad-hoc Workgroup Meeting Attachments
  247. Functional Model Ad-hoc Workgroup Minutes
  248. Functional Model Committee
  249. Functional Model Deliverable
  250. Functional Model Discussion Guide
  251. Functional Model Parking Lot
  252. Functional Model Proposal
  253. Functional Model Work Plan 1
  254. Functional Model Work in Process
  255. Functional Requirements
  256. GGG
  257. GGG-R-Z
  258. GGG-Sources
  259. GNAP
  260. Game Avatar as Pseudonymous Identity Use Case
  261. General Data Protection Regulation
  262. General IDESG Use Case
  263. Generalized Presumptive Authentication
  264. Global Healthcare Information Interchange
  265. Glossary
  266. Glossary Term Example
  267. Guardian
  268. Health Care Profile
  269. Health Care Profile Sandbox
  270. Health Consent
  271. Health IT Record Location Service (Data Aggregation)
  272. Healthcare OpenID
  273. High Assurance AZ Token
  274. How to use IDESG Identirama
  275. Https://www.idecosystem.org/wiki/User Registration Ceremony ARR
  276. ICAM IMI Profile 1.0.1
  277. ICAM OpenID 2.0 Profile 1.0.1
  278. ICAM SAML 2.0 WB SSO Profile 1.0.2
  279. IDEF Functional Model
  280. IDEF Functional Model AUTHENTICATION
  281. IDEF Functional Model AUTHORIZATION
  282. IDEF Functional Model CREDENTIALING
  283. IDEF Functional Model INTERMEDIATION
  284. IDEF Functional Model REGISTRATION
  285. IDEF Glossary
  286. IDEF Glossary DIGITAL IDENTITY MANAGEMENT FUNCTIONS
  287. IDEF Glossary PERSONAL INFORMATION
  288. IDEF Glossary References
  289. IDEF Glossary USERS
  290. IDEF Registry
  291. IDEF Requirements Index
  292. IDESG Approved SDO List
  293. IDESG Baseline Process Use Case
  294. IDESG Code of Conduct
  295. IDESG Code of Ethics
  296. IDESG Competitive Analysis
  297. IDESG Deliverables Dashboard
  298. IDESG Functional Model
  299. IDESG Marketing for Product
  300. IDESG Product Features, Current and Future
  301. IDESG Product Group Meeting Notes, 19 August 2015 - draft
  302. IDESG Product Group Meeting Notes, 5 August 2015 - draft
  303. IDESG Productization
  304. IDESG Reference Lexicon
  305. IDESG Responsible for Development of Identity Ecosystem Framework
  306. IDESG Standards Registry
  307. IDESG Wiki News
  308. IDESG moving forward
  309. ID Ecosystem Root
  310. IETF ID SCIM 1.0
  311. IETF ID SWD
  312. IETF RFC 2026
  313. IETF RFC 2510
  314. IETF RFC 2560
  315. IETF RFC 3647
  316. IETF RFC 4122
  317. IETF RFC 5280
  318. IETF RFC 6750 - OAuth 2.0 Bearer Token Usage
  319. IETF RFC 7009 - OAuth 2.0 Token Revocation
  320. IETF RFC 7591
  321. IIW
  322. IRS Identity Theft
  323. ISO's Framework for identity management - part1 - terminology and concepts
  324. ISO-IEC Directives Part 2
  325. ISO/IEC 27018 Privacy in the Cloud
  326. ISO/IEC 29100 Privacy Framework
  327. ISO/IEC 29115 Entity Authentication Assurance
  328. ISO 27001
  329. ISO 27002
  330. ISO 9241-210 Ergonomics of human–system interaction
  331. ISO 98-1: Uncertainty of measurement — Part 1
  332. Identifier
  333. Identifier Resolver
  334. Identifying Attribute
  335. Identity
  336. Identity Assurance Costs
  337. Identity Design Patterns
  338. Identity Ecosystem
  339. Identity Ecosystem Framework (IDEF)
  340. Identity Ecosystem Framework enables individuals to protect their privacy through clear FIPPS rules
  341. Identity Ecosystem Framework protects individuals from unbounded liability in particular for losses that they were powerless to prevent.
  342. Identity Federation
  343. Identity Model
  344. Identity Model Overview
  345. Identity Modeling Introduction
  346. Identity Proofer
  347. Identity Proofing
  348. Identity Proofing Use Case
  349. Identity Provider
  350. Identity Repository
  351. Identity Statement
  352. Immunization Information System
  353. InCommon Glossary
  354. InCommon IAAF 1.1
  355. InCommon IAP 1.1
  356. Inclusive
  357. Individuals Can Choose and Change Identity Account Providers and Can Use Between and Manage Multiple Different Interoperable Credentials
  358. Inform User of Disclosure of PII Use Case
  359. Information Blocking
  360. Information Ethics and Human Capability
  361. Information Sharing Agreement
  362. Interaction Model Working Group Collaboration Space
  363. Intermediary
  364. Interop Best Practice A
  365. Interop Best Practice B
  366. Interop Best Practice C
  367. Interop Best Practice D
  368. Interop Best Practice E
  369. Interop Best Practice F
  370. Interop Best Practice G
  371. Interop Req 1
  372. Interop Req 2
  373. Interop Req 3
  374. Interop Req 4
  375. Interop Req 5
  376. Interop Req 6
  377. Interop Req 7
  378. Interop Req 8
  379. Is The Ap Or Clep Exams Better For Homeschoolers
  380. January 10, 2017 UXC Meeting Page
  381. January 13, 2017 VPWG Meeting Page
  382. January 14, 2014 Meeting Page
  383. January 14, 2016 UXC Meeting Page
  384. January 15, 2015 Meeting Page
  385. January 15, 2015 Plenary Breakout Meeting Page
  386. January 17, 2017 UXC Meeting Page
  387. January 19, 2016 UXC Meeting Page
  388. January 22, 2015 Meeting Page
  389. January 23, 2014 Meeting page
  390. January 23, 2018 Agile Advisory Team
  391. January 24, 2014 Meeting Page
  392. January 24, 2017 UXC Meeting Page
  393. January 29, 2015 Meeting Page
  394. January 30, 2014 Meeting page
  395. January 30, 2018 Agile Advisory Team
  396. January 31, 2017 UXC Meeting Page
  397. January 5, 2016 UXC Meeting Page
  398. January 8, 2015 Meeting Page
  399. January 9, 2014 Meeting Page
  400. July 09, 2015
  401. July 10, 2014 Meeting Page
  402. July 11, 2013 Meeting Page
  403. July 14, 2015 UXC Meeting Page
  404. July 16, 2015 Meeting Page
  405. July 17, 2014 Meeting Page
  406. July 19, 2016 UXC Meeting Page
  407. July 2, 2015 Meeting Page
  408. July 21, 2015 UXC Meeting Page
  409. July 23, 2015 Meeting Page
  410. July 24, 2014 Meeting Page
  411. July 25, 2017 UXC Meeting Page
  412. July 26, 2016 UXC Meeting Page
  413. July 27, 2015 UXC Working Meeting Page
  414. July 3, 2014 Meeting Page
  415. July 30, 2015 Meeting Page
  416. July 30, 2015 UXC Meeting Page
  417. July 31, 2014 Meeting Page
  418. July 7, 2016 UXC Meeting Page
  419. July 9, 2015 Meeting Page
  420. June 09, 2015 Meeting Page
  421. June 11, 2015 Meeting Page
  422. June 12, 2014 Meeting Page
  423. June 13, 2013 Meeting Page
  424. June 14, 2016 UXC Meeting Page
  425. June 17, 2017 UXC Meeting Page
  426. June 18, 2015 Meeting Page
  427. June 2, 2015 Meeting Page
  428. June 21, 2016 UXC Meeting Page
  429. June 23, 2015 Meeting Page
  430. June 26, 2014 Meeting Page
  431. June 27, 2017 UXC Meeting Page
  432. June 30, 2015 Meeting Page
  433. June 30, 2016 UXC Meeting Page
  434. June 4, 2015 Meeting Page
  435. June 5, 2014 Meeting Page
  436. June 9, 2015 Meeting Page
  437. Kantara Federal Privacy Criteria
  438. Kantara IAF 1000
  439. Kantara IAF 1100
  440. Kantara IAF 1200
  441. Kantara IAF 1300
  442. Kantara IAF 1400
  443. Kantara IAF 1600
  444. Kantara SAML 2.0 Profile
  445. Key Roll-over
  446. Level of Assurance
  447. Logical Token
  448. Main Page
  449. March 1, 2016 UXC Meeting Page
  450. March 10, 2015 Meeting Page
  451. March 10, 2017 VPWG Meeting Page
  452. March 12, 2015 Meeting Page
  453. March 13, 2014 Meeting Page
  454. March 14, 2017 UXC Meeting Page
  455. March 15, 2016 UXC Meeting Page
  456. March 20, 2014 Meeting Page
  457. March 21, 2017 UXC Meeting Page
  458. March 22, 2016 UXC Meeting Page
  459. March 24, 2013 Meeting Page
  460. March 24, 2017 VPWG Meeting Page
  461. March 26, 2015 Meeting Page
  462. March 27, 2014 Meeting Page
  463. March 28, 2017 UXC Meeting Page
  464. March 29, 2016 UXC Meeting Page
  465. March 5, 2015 Meeting Page
  466. March 6, 2014 Meeting Page
  467. March 7, 2017 UXC Meeting Page
  468. Match Names between Identity Systems Use Case
  469. May 1, 2014 Meeting Page
  470. May 10, 2016 UXC Meeting Page
  471. May 12, 2015 UXC Meeting Page
  472. May 14, 2014 Meeting Page
  473. May 14, 2015 Meeting Page
  474. May 15, 2014 Meeting Page
  475. May 15, 2015
  476. May 15, 2015 Meeting Page
  477. May 15, 2015 UXC Meeting Page
  478. May 16, 2017 UXC Meeting Page
  479. May 19, 2015 UXC Meeting Page
  480. May 2, 2014 Meeting Page
  481. May 21, 2015 Meeting Page
  482. May 22, 2014 Meeting Page
  483. May 22, 2015 UXC Meeting Page
  484. May 23, 2017 UXC Meeting Page
  485. May 24, 2016 UXC Meeting Page
  486. May 28, 2015 Meeting Page
  487. May 29, 2014 Meeting Page
  488. May 3, 2016 UXC Meeting Page
  489. May 30, 2017 UXC Meeting Page
  490. May 31, 2016 UXC Meeting Page
  491. May 5, 2015 UXC Meeting Page
  492. May 7, 2015 Meeting Page
  493. May 8, 2014 Meeting Page
  494. May 9, 2017 UXC Meeting Page
  495. Medicare Patient logs into MyMedicare.gov site to access their records
  496. Meeting notes for IDESG Productization group
  497. Meeting notes from April 28, 2014
  498. Meeting notes from July 28, 2014
  499. Meeting notes from July 7, 2014
  500. Meeting notes from June 16, 2014

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)