Search results

Jump to navigation Jump to search

Page title matches

  • #REDIRECT [[Un and Underserved Use Case]]
    41 bytes (6 words) - 03:58, 28 June 2018
  • == Use Case Metadata == ====Use Case Lifecycle Status====
    7 KB (1,007 words) - 03:58, 28 June 2018
  • '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples:  authenticate to system with trusted identity, authenticate to
    925 bytes (109 words) - 04:00, 28 June 2018
  • == Use Case Metadata == A general use case which all other use cases can depend (unless they chose not to.)
    5 KB (810 words) - 04:00, 28 June 2018
  • '''Please note,''' that this is not a Use Case, but at this time the IDESG do not have a process for documents like this o '''Title''': IDESG Baseline Process Use Case (Example: IDBL - 0.2468)
    23 KB (3,525 words) - 04:00, 28 June 2018
  • == Use Case Metadata == ====Use Case Lifecycle Status====
    3 KB (328 words) - 21:41, 10 January 2020
  • '''Use Case Description''': ...er's PII, this use case describes a process for informing the user of such use or disclosure.
    676 bytes (77 words) - 04:01, 28 June 2018
  • #REDIRECT [[PIV-I Enrollment for Financial Institutions Use Case]]
    66 bytes (8 words) - 04:01, 28 June 2018
  • '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples:  authenticate to system with trusted identity, authenticate to
    881 bytes (102 words) - 04:02, 28 June 2018
  • ...000">Proposed</span> This Use Case is under development by members of the use cases ad hoc group. '''Use Case Description''':
    2 KB (375 words) - 04:02, 28 June 2018
  • Online Safety for Democracy Activists Use Case '''Use Case Description''':
    2 KB (258 words) - 04:02, 28 June 2018
  • '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples:  authenticate to system with trusted identity, authenticate to
    868 bytes (101 words) - 04:02, 28 June 2018
  • #REDIRECT [[PIV-I Enrollment for Educational Institutions Use Case]]
    68 bytes (8 words) - 04:02, 28 June 2018
  • '''Use Case Description''': This use case describes an educational institution as a PIV-I Electronic Credential Provi
    9 KB (1,241 words) - 04:02, 28 June 2018
  • '''Use Case Description''': '''Use Case Category''': Trust/Assurance, Authentication, Interoperability, Privacy
    6 KB (830 words) - 04:02, 28 June 2018
  • '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples:  authenticate to system with trusted identity, authenticate to
    1 KB (127 words) - 05:22, 31 March 2021
  • 1 KB (150 words) - 04:02, 28 June 2018

Page text matches

  • The goals set out the needs and constraints on an example for use by a Relying Party (RP) systems design. ...ncing technology is used to prevent linkage between different instances of use of the internet.
    24 KB (3,980 words) - 19:57, 13 November 2020
  • == Value and Context for Use in IDESG == ...or are unsure about the identity of the data controller in any particular case, you should consult your legal adviser or seek the advice of the Data Prote
    3 KB (416 words) - 00:25, 15 February 2020
  • == Use Case Metadata == ====Use Case Lifecycle Status====
    12 KB (1,835 words) - 20:44, 5 November 2020
  • which can be combined to implement identified IDESG Use Cases. # Test an initial use case against the basic functional model(s) (above)
    3 KB (421 words) - 03:58, 28 June 2018
  • ...ith him at the DMV and the Department of Housing in Virginia to be able to use that homeless shelter address along with other vetting documents that they ...e ID credential be converted to an authenticated e-ED?” He asked about the case where having a physical ID was not possible, i.e., homeless and elderly.
    5 KB (747 words) - 03:58, 28 June 2018
  • ##USE Case Gap Analysis with 4-party Authentication ##Use Case Mapping Template is included [not actually a Gap Analysis, but will help] �
    5 KB (796 words) - 03:58, 28 June 2018
  • #**Without another plan, could present the state of work related to use case analysis relative to draft functional elements #Use Case Analysis Feedback
    3 KB (466 words) - 03:58, 28 June 2018
  • ...statue on their books on the obligation of companies to securely store and use the Social Security numbers and information as it relates to the military s ...ent storage of those identifies, but in the civilian world that is not the case. Their ID needs to be protected as a civilian. Even going into a doctor’s
    7 KB (1,073 words) - 03:58, 28 June 2018
  • #**Without another plan, could present the state of work related to use case analysis relative to draft functional elements. ...onal elements, and potential definitional/consistency concerns between the use cases and functional elements. We will attempt to start addressing these by
    5 KB (753 words) - 03:58, 28 June 2018
  • ...scussion – topics are proceeding, Adam will post Sal’s meeting notes. Use case selection to be discussed later today. #Gap Analysis – 14 current use Cases will be examined using gap analysis templates (on-line wiki sources),
    3 KB (408 words) - 03:58, 28 June 2018
  • '''Use Case Description''': ...on the employee-employer relationship, it would work equally well for any case where their is a contractual relationship between the user and the identity
    3 KB (429 words) - 23:13, 20 May 2020
  • == Use Case Criteria and/or Questions to Ask == # Is the use case describing a function/capability that does not exist today or just another
    961 bytes (148 words) - 03:58, 28 June 2018
  • #REDIRECT [[Un and Underserved Use Case]]
    41 bytes (6 words) - 03:58, 28 June 2018
  • #REDIRECT [[Four Party Authentication and Authorization Use Case]]
    66 bytes (8 words) - 03:58, 28 June 2018
  • == Use Case Metadata == ====Use Case Lifecycle Status====
    7 KB (1,007 words) - 03:58, 28 June 2018
  • Use cases or user experiences can be created at any level within the taxonomy o This requirements doc is informed by the efforts of the use case and user experience committee.
    8 KB (1,315 words) - 19:29, 30 July 2020
  • The ability to use a resource or a service. More specifically, the Permissions or Entitlements To interact with a system entity in order to manipulate, use, gain knowledge of, and/or obtain a representation of some or all of a syst
    845 KB (86,833 words) - 04:00, 28 June 2018
  • Rules that have been established and implemented concerning use of, security in, and acceptable level of Risk for the System. Rules will cl ...n access, connection to the Internet, use of copyrighted works, unofficial use of Federal Government equipment, the assignment and limitation of System pr
    135 KB (15,051 words) - 04:00, 28 June 2018
  • '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples:  authenticate to system with trusted identity, authenticate to
    925 bytes (109 words) - 04:00, 28 June 2018
  • == Use Case Metadata == A general use case which all other use cases can depend (unless they chose not to.)
    5 KB (810 words) - 04:00, 28 June 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)