Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • (i)Integrity controls (Addressable). Implement security measures to ensure that electron
    28 KB (4,415 words) - 17:28, 21 March 2021
  • The Device Integrity is defined in the "Device Integrity supporting User Authentication Use Case" at [[https://www.idecosystem.org/w
    17 KB (2,712 words) - 19:20, 28 November 2021
  • The Device Integrity is defined in the "[[Device Integrity supporting User Authentication]] use case"
    9 KB (1,467 words) - 20:46, 9 September 2018
  • ...firms do the right thing for their customers whilst keeping them, and the integrity of the markets in which they operate, at the heart of everything that they
    10 KB (1,662 words) - 23:06, 24 April 2019
  • ...es are distributed among parties that are responsible for the validity and integrity of the attributes.
    10 KB (1,662 words) - 19:21, 27 April 2020
  • ...and updates are needed to be sure that as new attacks succeed against the integrity of conformant sites, these must be addressed in a timely fashion.
    7 KB (1,184 words) - 04:47, 23 August 2020
  • The Device Integrity is defined in the "Device Integrity supporting User Authentication Use Case" at [[https://www.idecosystem.org/w
    14 KB (2,167 words) - 01:45, 15 May 2021
  • ...es are distributed among parties that are responsible for the validity and integrity of the attributes. ...The architecture for remote attestation consists of two major components: Integrity measurement architecture and remote attestation protocol.</blockquote>
    14 KB (2,290 words) - 21:36, 30 March 2020
  • [[Category:Integrity]]
    3 KB (550 words) - 22:57, 18 February 2021
  • ## not dependant on the underlying transport media for any integrity.
    16 KB (2,576 words) - 19:23, 24 July 2020
  • # SYSTEM AND INFORMATION INTEGRITY
    2 KB (236 words) - 20:30, 17 March 2020
  • ...eas that, it can be argued, have a pronounced effect on the reputation and integrity of the profession. Each of the society codes requires members to perform se
    7 KB (1,033 words) - 23:32, 20 May 2020
  • * In Finance the integrity of the money supply as well as the costs of illegal activity in drugs and s
    5 KB (834 words) - 00:18, 24 August 2020
  • * [[Device Integrity supporting User Authentication]] Use case from 2013
    2 KB (293 words) - 22:05, 14 January 2021
  • ...re mathematical algorithms routinely used to validate the authenticity and integrity of a message. ...security protocols to protect the confidentiality, privacy, security, and integrity of the mDL data, through its full lifecycle.
    30 KB (4,866 words) - 16:56, 9 June 2021
  • ===User Agent Integrity===
    8 KB (1,238 words) - 16:37, 26 August 2021
  • # Bodily Integrity. Being able to move freely from place to place; to be secure against violen
    13 KB (1,906 words) - 19:16, 2 July 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)