National identities

Results: 332



#Item
161Incentives and information flows in online identity Seth Schoen Electronic Frontier Foundation June 28, 2011

Incentives and information flows in online identity Seth Schoen Electronic Frontier Foundation June 28, 2011

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-29 13:46:33
162NIST/NSTIC-IDtrust 2012-Search for Viable Business Models

NIST/NSTIC-IDtrust 2012-Search for Viable Business Models

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 10:01:58
163Microsoft Word - CertiPath_NOI Response.docx

Microsoft Word - CertiPath_NOI Response.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-28 12:04:50
164NIST/NSTIC-IDtrust 2012-Privacy Mgmt: A Positive Perspective on Privacy Standardization

NIST/NSTIC-IDtrust 2012-Privacy Mgmt: A Positive Perspective on Privacy Standardization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 10:10:28
165FOR IMMEDIATE RELEASE September 20, 2012 Contact: Claire O’Brien, AAMVA Marketing Coordinator[removed]; [removed]

FOR IMMEDIATE RELEASE September 20, 2012 Contact: Claire O’Brien, AAMVA Marketing Coordinator[removed]; [removed]

Add to Reading List

Source URL: www.aamva.org

Language: English - Date: 2012-09-20 15:52:04
166Creating a More Environment (continued from front page) “What we’re doing is telling them explicitly, ‘This is what professionalism is made of,’ and they learn to integrate that into their own identities.”

Creating a More Environment (continued from front page) “What we’re doing is telling them explicitly, ‘This is what professionalism is made of,’ and they learn to integrate that into their own identities.”

Add to Reading List

Source URL: www.uphs.upenn.edu

Language: English - Date: 2009-02-27 09:02:16
167Response to the Request for Comment on Notice of Inquiry Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace Adam Shane AMAG Technology, Product Manager, Identity and Systems

Response to the Request for Comment on Notice of Inquiry Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace Adam Shane AMAG Technology, Product Manager, Identity and Systems

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-11 04:00:30
168Microsoft Word[removed]Chamber Comments NSTIC Governance v3

Microsoft Word[removed]Chamber Comments NSTIC Governance v3

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-21 14:39:24
169Microsoft Word - Microsoft NSTIC Notice of Inquiry.docx

Microsoft Word - Microsoft NSTIC Notice of Inquiry.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-10 15:53:10
170[[[I am not exactly sure how to do the addressing at the top of this. ]]] Response to [Docket No[removed]02] Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace From:

[[[I am not exactly sure how to do the addressing at the top of this. ]]] Response to [Docket No[removed]02] Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace From:

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-17 11:51:00