Search Data.gov
Found 42 dataset(s) matching "authentication".
-
The present invention extends to trusted third party authentication for Web services. Web services trust and delegate user authentication responsibility to a trusted third party that acts as an...
-
<p>Design Pattern: �Authentication, Authorization & Audit. Describes how applications should consume the enterprise internal user authentication services</p>
-
Methods and systems are provided for controlling the scope of delegation of authentication credentials within a network environment. A server (210) is configured to provide a trusted third-party...
-
Development and validation of new analytical or data tools for seized drug analysis require demonstration of the approach's ability to accurately detect the components of complex, realistic drug...
-
<p>Provides architectural guidance and constraints associated with authentication of internal users to VA applications via internal single sign-on solutions, Active Directory, and PIV-only...
-
Development and validation of new analytical or data tools for seized drug analysis require demonstration of the approach's ability to accurately detect the components of complex, realistic drug...
-
The Foreign Service Act of 1980 mandated a comprehensive revision to the operation of the Department of State and the personnel assigned to the US Foreign Service. As the statutory authority, the...
-
<p>Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable electronic transactions with...
-
A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of...
-
Living wills are often considered by physicians who are faced with a dying patient. Although popular with the general public, they remain problems of authenticity and authority. It is difficult...
-
Distributes NIST estimate of official U.S. time over the Internet in real time, using Network Time Protocol (NTP) and other time data formats to automatically synchronize clocks in computers and...
-
The CAMS system consists of a set of tables and packages that provide authentication services to all other North Pacific Groundfish and Halibut Observing Program (NPGOP) subsystems.
-
This database supports the authentication of individuals for SSA's Electronic Access (EA).
-
The NIST Digital Manufacturing Certificate (DMC) Toolkit is a toolkit designed specifically to provide certification -- digital signature using software and hardware certificates, and verification...
-
Database for Internet User Authentication and Identity-proofing.
-
Current studies on nontarget analysis and toxicities of PFASs are disconnected, due to the challenges posed by the large numbers (>1,000) and diverse structures of PFASs. The SECC method provides...
-
In rheumatic diseases, autoantibody-producing cells of interest are often hidden in a polyclonal B-lymphocyte population. Immunoglobulin gene fingerprinting is a useful approach to screen for...
-
Atmospheric oxidation of sesquiterpenes has been of considerable interest recently because of their likely contribution to ambient organic aerosol, but farnesene oxidation has been reported in...
-
The connection securing process (L4) between a digital word terminal (PDA2) and local information network (WLAN2) coupled to a mobile telephone network with an authentication center (AU2) has a...