National identities

Results: 332



#Item
231National Strategy for Trusted Identities in Cyberspace / FIPS 201 / Computer security / Computing / Abstraction / Identity management / Identity assurance / Interoperability

PSCR 2010 Winter Conference Access, Cyber Threat, and Identity Management Mark Adams Northrop Grumman Information Systems

Add to Reading List

Source URL: www.pscr.gov

Language: English - Date: 2010-12-02 09:24:30
232Counter-terrorism / 9/11 Commission / Terrorist Screening Database / United States Department of Homeland Security / Terrorism / Terrorist Screening Center / Terrorist Identities Datamart Environment / Homeland security / National Counterterrorism Center / Government / National security / Security

The Honorable Robert Aderholt Committee on Appropriations Subcommittee on Homeland Security Opening Statement: Terrorist Travel Witnesses:

Add to Reading List

Source URL: appropriations.house.gov

Language: English - Date: 2011-04-01 12:19:00
233Public economics / Computer network security / National Strategy for Trusted Identities in Cyberspace / Funding Opportunity Announcement / Federal grants in the United States / Economic policy / Government / National Institute of Standards and Technology / Grant / Federal assistance in the United States / Public finance / Grants

May 20, 2013 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Cooperative Agreement Program for the Evaluation of Pilots Using Trusted Online Credentials fo

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-05-17 14:30:00
234Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 20:59:34
235Computer network security / National Strategy for Trusted Identities in Cyberspace / Federated identity / OpenID / SAFE-BioPharma Association / HID Global / ActivIdentity / Identity management / Internet privacy / Cryptography / Computer security / Computing

NSTIC Privacy Workshop Registered Attendees

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-16 09:25:15
236Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 21:02:13
237Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / International Cybercrime / Government / Library of Congress / Cyberwarfare

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-06-09 20:43:25
238Business / Technology / Project management / Computer network security / National Strategy for Trusted Identities in Cyberspace / WorkPLAN

The Proposed Identity Ecosystem Steering Group Workplan Outline

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-08-03 08:41:09
239Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 21:02:01
240Committee / Politics / Structure / Social psychology / Computer network security / National Strategy for Trusted Identities in Cyberspace / Ecosystem management

Recommendations for Establishing an Identity Ecosystem Steering Group

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-26 14:28:50
UPDATE