Oldest pages
Showing below up to 250 results in range #1 to #250.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- B2B (09:39, 15 June 2018)
- C2B (09:39, 15 June 2018)
- C2G (09:40, 15 June 2018)
- B2G (09:41, 15 June 2018)
- Claimant (15:19, 23 June 2018)
- Provider (15:23, 23 June 2018)
- Registry Metadata (21:02, 28 June 2018)
- Network Protocol (11:04, 10 July 2018)
- Subject (15:23, 25 July 2018)
- Security Boundary (11:11, 26 July 2018)
- Proof of Possession (09:27, 31 July 2018)
- Password (11:42, 31 July 2018)
- Building a Wiki (06:35, 8 August 2018)
- Free Speech (14:35, 11 August 2018)
- Enterprise (14:44, 12 August 2018)
- User Object (15:02, 12 August 2018)
- User Name (15:02, 12 August 2018)
- Business (15:17, 12 August 2018)
- Behavior (14:37, 14 August 2018)
- User Public Information (09:34, 17 August 2018)
- Personal Privacy (11:11, 19 August 2018)
- Understanding (10:56, 20 August 2018)
- Lorem ipsum (11:06, 20 August 2018)
- Syntax (11:16, 20 August 2018)
- Simplicity (19:18, 20 August 2018)
- U2F Financial (16:13, 21 August 2018)
- Circles (13:25, 29 August 2018)
- SAML 2.0 (14:12, 29 August 2018)
- FIDO UAF (12:30, 30 August 2018)
- Authorization Code (20:45, 31 August 2018)
- Tails (08:35, 1 September 2018)
- COPPA (17:59, 6 September 2018)
- Resource (10:11, 14 September 2018)
- Secure Node (10:58, 14 September 2018)
- SCIM 2.0 (21:37, 15 September 2018)
- Know Your Customer (12:37, 16 September 2018)
- Rule of Law (12:43, 16 September 2018)
- Best Practice in Finance (11:17, 17 September 2018)
- Site (10:16, 18 September 2018)
- Security Event Token (09:44, 2 October 2018)
- Revocation (09:07, 3 October 2018)
- Internet Bill of Rights (16:40, 7 October 2018)
- Hundred Points of Light (10:05, 13 October 2018)
- User Device (17:50, 18 October 2018)
- Scope (13:01, 24 October 2018)
- Right to be Forgotten (18:26, 2 November 2018)
- Federation API (17:26, 4 November 2018)
- Inference (17:39, 4 November 2018)
- Authentication Protocols (17:26, 8 November 2018)
- Apophenia (20:29, 8 November 2018)
- Compliance (22:08, 11 November 2018)
- Channel Binding (15:08, 13 November 2018)
- Innovation (11:35, 16 November 2018)
- Social Contract (16:32, 2 December 2018)
- PSD2 (18:49, 12 December 2018)
- Strong Authentication and Identity Workshop (19:19, 12 December 2018)
- User Information (13:16, 19 December 2018)
- Distributed Identity (11:20, 22 December 2018)
- URN (12:37, 28 December 2018)
- Authorization Service (12:45, 30 December 2018)
- Universal Resolver (08:26, 1 January 2019)
- Trusted Resolver (08:35, 1 January 2019)
- Artificial Identifier (15:11, 11 January 2019)
- Identity Model Overview (15:28, 24 January 2019)
- Trust Service (23:37, 14 February 2019)
- Trust Vector (23:43, 14 February 2019)
- Role (11:11, 12 March 2019)
- Pairwise Identifier (12:41, 13 March 2019)
- The Cloud (16:22, 19 March 2019)
- Baseline Functional Requirements (18:02, 22 March 2019)
- IDEF (18:04, 22 March 2019)
- Ephemeral (18:05, 22 March 2019)
- Identity Ecosystem Framework (18:06, 22 March 2019)
- National Law Enforcement Telecommunications System (NLETS) (18:12, 22 March 2019)
- OpenID Provider (12:19, 24 March 2019)
- Laws of Security (12:32, 24 March 2019)
- User Experience (12:34, 24 March 2019)
- Relying Party Authentication Use Case (11:18, 27 March 2019)
- Relying Party Registration Use Case (11:21, 27 March 2019)
- Security Token (12:20, 30 March 2019)
- Redress (11:28, 6 April 2019)
- Personal Identifier (16:56, 6 April 2019)
- Universal Serial Bus (USB) (10:19, 12 April 2019)
- URI (11:14, 12 April 2019)
- Principal (11:24, 18 April 2019)
- Secret Key Cryptography (16:11, 18 April 2019)
- Medical Records Identifier (17:48, 18 April 2019)
- Compliant Implementation of Trust Registry (20:37, 23 April 2019)
- Trusted Location (14:53, 25 April 2019)
- Deploy .NET to Azure (09:20, 3 May 2019)
- Framework Profile (10:13, 3 May 2019)
- Identity (10:00, 10 May 2019)
- IP address (14:25, 15 May 2019)
- Background process (09:47, 18 May 2019)
- Foreground process (09:49, 18 May 2019)
- Federated Ecosystem (18:25, 24 May 2019)
- Determinism (20:47, 28 May 2019)
- Hunting (13:27, 29 May 2019)
- Tribal Identifier (17:13, 30 May 2019)
- Entity (21:21, 21 June 2019)
- Identity Proofing (11:12, 5 July 2019)
- Safe Browsing (17:19, 7 July 2019)
- Use Case (16:59, 8 July 2019)
- Persistent (11:12, 13 July 2019)
- Health Care Native Application (17:03, 15 July 2019)
- Late Binding Token (15:29, 23 July 2019)
- Pseudonym (10:46, 24 July 2019)
- Ceremony (17:05, 5 August 2019)
- ASCII (16:09, 11 August 2019)
- EV Cert (18:17, 13 August 2019)
- Dualism (21:18, 14 August 2019)
- Binding (21:44, 15 August 2019)
- Digital Fingerprint (12:42, 21 August 2019)
- Trusted Root (13:36, 27 August 2019)
- Bayesian Identity Proofing (14:22, 29 August 2019)
- Consciousness (14:23, 29 August 2019)
- Identity Spoofing (21:40, 18 September 2019)
- Notification (09:45, 19 September 2019)
- Health Information Network (17:34, 7 October 2019)
- JOSE (13:16, 22 October 2019)
- Content Security Policy (18:17, 26 October 2019)
- Validated (20:45, 1 November 2019)
- Corroborated (20:52, 1 November 2019)
- Provenance (21:02, 1 November 2019)
- Verified Claim (09:11, 2 November 2019)
- Verified Information (11:46, 2 November 2019)
- IIS URL Rewrite (12:41, 8 November 2019)
- Utopia (10:04, 11 November 2019)
- Conformity (13:18, 11 November 2019)
- Exceptional Access (19:02, 12 November 2019)
- GUID (20:40, 12 November 2019)
- California Consumer Privacy Act of 2018 (15:16, 13 November 2019)
- Best Practice and Example Identifier Provider (18:30, 25 November 2019)
- The Dark Forest (14:04, 1 December 2019)
- Sender Constrained Token (13:40, 18 December 2019)
- Bound Token (14:33, 18 December 2019)
- Digital object identifier (11:14, 20 December 2019)
- Decentralized Resource Identifier (11:17, 20 December 2019)
- Fraud Detection (22:09, 3 January 2020)
- JWE (22:54, 15 January 2020)
- JWT (17:11, 16 January 2020)
- Base64 (16:57, 20 January 2020)
- Culture (17:08, 29 January 2020)
- Stability (12:30, 8 February 2020)
- Real Identifier (15:47, 11 February 2020)
- Compliant Implementation of Native User Agent (17:19, 19 February 2020)
- Deploy App to Android (17:23, 2 March 2020)
- Technology Solution (10:37, 5 March 2020)
- Legal Name (12:08, 9 March 2020)
- Brain (12:16, 9 March 2020)
- Consent Receipt Construction (12:17, 9 March 2020)
- User (12:24, 9 March 2020)
- Consumer (12:27, 9 March 2020)
- Natural Person (12:37, 9 March 2020)
- Silicon-based Life Form (13:03, 9 March 2020)
- Privacy Risk (15:15, 11 March 2020)
- Legal Person (15:28, 11 March 2020)
- Human Colossus Foundation (14:14, 13 March 2020)
- TEFCA (22:48, 18 March 2020)
- Blockchain Privacy (18:16, 25 March 2020)
- Intelligent Design (10:16, 30 March 2020)
- Privacy as the Enemy (11:56, 30 March 2020)
- Privacy in an Emergency (11:56, 30 March 2020)
- NIST SP 800-63-3 (21:29, 31 March 2020)
- ID Token (17:37, 5 April 2020)
- Identity Taxonomy (18:36, 8 April 2020)
- Problem Solving (13:11, 1 May 2020)
- IIS as Reverse Proxy (17:05, 10 May 2020)
- Identity Theft (16:34, 11 July 2020)
- Publish Project to AWS (22:42, 19 July 2020)
- Deploy .NET to AWS (15:00, 22 July 2020)
- Deploy MS SQL to AWS (18:22, 23 July 2020)
- Best Practice MS SQL (15:22, 27 July 2020)
- Developing with MS SQL (22:16, 28 July 2020)
- Self-issued Identifier (14:48, 9 August 2020)
- Windows Services (15:46, 9 August 2020)
- Windows Group Policy (17:25, 9 August 2020)
- Self-signed Certificate (12:13, 11 August 2020)
- Best Practice and Example Trust Registry (12:58, 11 August 2020)
- CBOR (19:06, 11 August 2020)
- Network Address Translation (10:47, 21 August 2020)
- GDPR Avoidance (11:00, 23 August 2020)
- Bearer Tokens Considered Harmful (13:42, 26 August 2020)
- Impersonation (13:45, 26 August 2020)
- Glossary (15:02, 26 August 2020)
- Content Addressable Storage (20:51, 29 August 2020)
- Distributed Consistency (14:33, 30 September 2020)
- Xamarin Forms (15:43, 30 September 2020)
- Open Banking (20:53, 30 September 2020)
- Change Password (12:06, 6 October 2020)
- The Doors of Perception (12:37, 16 October 2020)
- Attested (14:53, 16 October 2020)
- WebID Comparison (12:56, 18 October 2020)
- Electronic Data Interchange (11:36, 21 October 2020)
- Global Business Identifiers (11:51, 21 October 2020)
- Personal Information Agent (08:01, 27 October 2020)
- REST (08:23, 27 October 2020)
- Asynchronous (08:29, 27 October 2020)
- System for Cross-domain Identity Management (14:29, 28 October 2020)
- Federated Trust (15:00, 29 October 2020)
- HTTP/3 (13:12, 7 November 2020)
- CDN (17:23, 7 November 2020)
- Patient Monitoring (17:48, 11 November 2020)
- Subject ID (18:11, 16 November 2020)
- Subject Identifier (17:32, 19 November 2020)
- IPV6 (12:34, 20 November 2020)
- Hardware Protection (23:07, 25 November 2020)
- Nginx (15:24, 28 November 2020)
- Code of Hammurabi (18:57, 4 December 2020)
- Voltage Drop (21:58, 7 December 2020)
- Derived Credential (09:51, 18 December 2020)
- Design Pattern (15:31, 18 December 2020)
- Verifiable Claim (15:47, 18 December 2020)
- OpenID in Smartphones (15:16, 20 December 2020)
- Smart Card (16:37, 20 December 2020)
- Security Guard Extensions (10:31, 27 December 2020)
- Identity Pathology (18:08, 28 December 2020)
- Shared Data Protection (18:52, 28 December 2020)
- Linux UX (14:54, 31 December 2020)
- Agent-Human Collaboration (16:29, 5 January 2021)
- Logos (11:57, 8 January 2021)
- OpenID Connect Future (11:05, 22 January 2021)
- OpenID Apps (11:08, 22 January 2021)
- Smart Credentals (17:04, 22 January 2021)
- Persona (15:13, 23 January 2021)
- Decentralized ID (09:42, 25 January 2021)
- Proof of Control (15:08, 25 January 2021)
- Abstract Thinking (13:25, 27 January 2021)
- Best Practice in HealthCare (21:25, 28 January 2021)
- PKCS 12 (22:16, 31 January 2021)
- Creative Destruction (10:00, 10 February 2021)
- Relying Party (10:16, 14 February 2021)
- Data Controller (10:37, 14 February 2021)
- Notice (16:53, 16 February 2021)
- Trusted Computing (12:51, 17 February 2021)
- Authentication (12:18, 19 February 2021)
- Carbon-based Life Form (12:21, 19 February 2021)
- Personal Information Economics (13:08, 21 February 2021)
- Windows Vulnerabilities (11:46, 28 February 2021)
- Assertion (14:36, 2 March 2021)
- Provider Discovery (16:15, 5 March 2021)
- Linux (11:53, 6 March 2021)
- FHIR (19:45, 7 March 2021)
- To Trust or not to Trust (20:00, 7 March 2021)
- Meaning (18:49, 9 March 2021)
- User Interface (17:59, 12 March 2021)
- Health Care Identity Management (18:11, 14 March 2021)
- Data Controller Options (18:38, 17 March 2021)
- Healthcare Write-back (12:31, 19 March 2021)
- NFC (15:27, 19 March 2021)