Search results

Jump to navigation Jump to search
  • == The IDEF Self-Assessment Listing Service (SALS) == ...status through self-assessment with a set of common standards for reliable security, privacy, ease of use, cost savings, and user choice and declare their comm
    3 KB (506 words) - 00:00, 24 January 2020
  • ...e their own credentials is protected storage and ask the CSP to verify the security of those credentials. ...e functions of an [electronic] Identity Proofing and Credential Management Service, either in full or as a discrete component (i.e., a sub-set of the function
    3 KB (467 words) - 01:56, 15 May 2020
  • ...ish an integrity (aka health) claim for a device that, together with other security measures, is good evidence of the integrity of the information exchanged wi Integrity has two meanings in computer security. The first relates to the device not having been changed in any way since i
    12 KB (1,835 words) - 20:44, 5 November 2020
  • Service Provider CAs, FCPCA, EGCA) are out of scope. The document provides a detail '''Security''': The document is an information security policy and procedures document.
    2 KB (230 words) - 23:00, 18 February 2021
  • ...non-compulsory and (5) for PII to be protected after the termination of a service. '''Security''': The document is an information security policy.
    3 KB (373 words) - 23:01, 18 February 2021
  • ...ion assertions from another party such as an Identity Provider, Credential Service Provider (CSP), or Trusted Broker. (Sal/Krum) ...rds that UXC is recommending. ISO 29115 has already been submitted by the Security Committee as confirmed by Mary Ellen Condon.
    4 KB (682 words) - 03:58, 28 June 2018
  • ...the Social Security numbers and information as it relates to the military service of a customer. Draft legislation has been put together that covers how an o ...t access to the Social Security is the Holy Grail. Someone gets the Social Security number and then they can find out all kinds of information about the person
    7 KB (1,073 words) - 03:58, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''''draft'''''== *Review security requirements. #1 through #10 discussed in earlier meetings. However, ther
    2 KB (280 words) - 03:58, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''draft'''== #**Andrew - this can be an extension of Authentication service
    5 KB (753 words) - 03:58, 28 June 2018
  • ...? What if we created a graph and called out UXC issues around privacy and security around organizations vs individuals. ...rement. “Service providers in the ecosystem follow recognized information security standards, frameworks, and/or appropriate practices.” We could include s
    7 KB (1,070 words) - 03:58, 28 June 2018
  • ...number of actors involved in the process. It describes a case in which a Service Provider obtains information about a User sufficient to make an access cont ...ies and often dictates a specific authentication solution in order for the service provider to authenticate the user.
    7 KB (1,007 words) - 03:58, 28 June 2018
  • ##Credential Service Provider (CSP) (A trusted entity hosting a subset of the above roles.) (aka ###Service (silicon based life form, like a newsfeed)
    8 KB (1,315 words) - 19:29, 30 July 2020
  • <center>'''National Security Telecom Advisory Comm.(NSTAC) Report to the President on Identity Managemen <center>'''Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0'''</center>
    845 KB (86,833 words) - 04:00, 28 June 2018
  • <center>'''National Security Telecom Advisory Comm.(NSTAC) Report to the President on Identity Managemen <center>'''Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0'''</center>
    135 KB (15,051 words) - 04:00, 28 June 2018
  • National Security Telecommunications Advisory Committee (NSTAC) Report to the President on Id Sample agreement between “relying party” and “credential service provider.”
    13 KB (1,562 words) - 04:00, 28 June 2018
  • ...ing Party (RP) role. This case is specifically designed to include general security, privacy and user experience criteria that will apply by default to all oth ...organization acting through a user agent that needs to access resources of service providers (RPs).
    5 KB (810 words) - 04:00, 28 June 2018
  • This design pattern assumes the use of a device connected to internet service providers as described in the [[Common to any Internet Identity Ecosystem]] ...):''' A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes
    10 KB (1,596 words) - 20:11, 15 October 2019
  • == Terms and definitions specific to the IDESG Self-Assessment Listing Service (SALS) in 2016 == ...that exists, e.g., a person, organization, device, software application or service.
    11 KB (1,758 words) - 04:00, 28 June 2018
  • '''Title''': Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profi '''Security''': The document is an information security profile. It requires IdPs and RPs to use "approved cryptographic
    2 KB (214 words) - 04:00, 28 June 2018
  • A product, service, environment or facility which is usable by USERs with the widest range of A non-human application or service acting in the digital environment on behalf of a human USER. Synonymous wi
    11 KB (1,496 words) - 23:48, 5 September 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)