Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

National Strategy for Trusted Identities in Cyberspace

Known as: NSTIC, National Strategy for Trusted Identities in Cyberspace (NSTIC) 
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a US government initiative announced in April 2011 to improve the privacy… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Identity management systems store attributes associated with users and employ these attributes to facilitate authorization. The… Expand
  • figure 3.1
  • figure 3.2
  • figure A.1
2012
2012
Many European states have issued electronic identities (eID) to its citizens since the early 2000s. Several have reached full… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2012
Highly Cited
2012
Large-scale personal data has become the new oil of the Internet. However, personal data tend to be monopolized and siloed by… Expand
  • figure 1
Highly Cited
2011
Highly Cited
2011
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure… Expand
2011
2011
Password-centric attacks are increasingly common, and reliance on weak password technology has been a growing attack vector that… Expand
2011
2011
There has been much academic discussion of federated authentication, and quite some political manoeuvring about ‘e-ID'. The grand… Expand
2011
2011
As a result of potential damage to our national infrastructure due to cyber attacks, a number of cyber-security bills have been… Expand
  • figure 1
  • figure 2
  • figure 2
  • table 1
  • figure 3
2011
2011
Federated identity management (FIM) enables a user to authenticate once and access privileged information across disparate… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
2011
2011
OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this… Expand