National identities

Results: 332



#Item
211Government / National security / Terrorist Screening Database / Terrorist Screening Center / Violent Gang and Terrorist Organization File / Terrorist Identities Datamart Environment / National Counterterrorism Center / National Crime Information Center / Counter-terrorism / Federal Bureau of Investigation / Security

Follow-up Audit of the Terrorist Screening Center

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2012-06-14 16:26:08
212National security / Terrorist Screening Database / National Counterterrorism Center / Federal Bureau of Investigation / FBI Counterterrorism Division / Terrorist Identities Datamart Environment / Terrorist Screening Center / Watchlist / Counter-terrorism / Security / Terrorism

Audit of the DOJ Terrorist Watchlist Nomination Processes

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2012-06-14 16:29:28
213Computer security / Consortia / Internet2 / Science and technology in the United States / National Strategy for Trusted Identities in Cyberspace / Educause / Middleware / Privacy / Identity management / Identity / Ethics

Policy and Privacy Considerations for Identity and Access Management in a Federated World Wednesday, Feb. 8, 2012 – 3 p.m. ET Ken Klingenstein, Director, Internet2 Middleware and Security Steven Carmody, Information Ar

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2012-02-08 12:44:02
214Computing / Federated identity / Identity assurance / OpenID / National Strategy for Trusted Identities in Cyberspace / Cloud computing / Identity / Identity management / Computer security

10TH SYMPOSIUM ON IDENTITY AND TRUST ON THE INTERNET (IDTRUST[removed]Identity and Access Management “Near the Horizon, Just Over the Horizon”

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2011-04-06 07:49:44
215Public safety / Surveillance / Identification / Crime prevention / Biometrics Institute / Private biometrics / Facial recognition system / Mass surveillance / Information privacy / Security / Biometrics / National security

7 Biometrics Institute Digital Identities and Authentication Seminar 2014

Add to Reading List

Source URL: www.privacy.org.nz

Language: English - Date: 2014-09-24 22:14:54
216Computer security / Computing / MAAWG / Internet privacy / Domain Name System Security Extensions / Internet / Computer network security / National Strategy for Trusted Identities in Cyberspace

From: Messaging Anti-Abuse Working Group (MAAWG) Date: July 19, 2010 Subject: Comments on the National Strategy for Trusted Identities in Cyberspace Thank you for the opportunity to review and comment on the National Str

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2010-11-23 17:52:45
217Cryptographic protocols / Certificate authorities / DigiCert / Electronic commerce / Public key certificate / X.509 / Public key infrastructure / National Strategy for Trusted Identities in Cyberspace / HTTP Secure / Cryptography / Public-key cryptography / Key management

07 July 2010 This Issue New SSL Tool P.1

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-09-29 16:25:35
218Aetna / Executive Office of the President of the United States / Gene Sperling / Howard Schmidt / Ari Schwartz / Barbara Mikulski / Paul Krugman / Economics / United States / Year of birth missing / Computer network security / National Strategy for Trusted Identities in Cyberspace

Colloquium on the National Strategy on Trusted Identities in Cyberspace (NSTIC) May 23, 2012 10am – 12pm The White House – Eisenhower Executive Office Building – Indian Treaty Room AGENDA

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-08 12:04:15
219Working group / Computer network security / National Strategy for Trusted Identities in Cyberspace / Stakeholder

Stakeholder Representation

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-20 17:38:46
220Interoperability / Standards map / Computing / Electronics / Telecommunications / Computer network security / National Strategy for Trusted Identities in Cyberspace

Management Council, Plenary, Committee, and Working Group Roles and Participation

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-20 17:39:49
UPDATE