IDEF Knowledge Base

Category: Identifier

SECURE-7. TOKEN CONTROL

Table of Contents: SECURE-7. TOKEN CONTROL

SECURE-6. CREDENTIAL UNIQUENESS

Table of Contents: SECURE-6. CREDENTIAL UNIQUENESS

PRIVACY-15. ATTRIBUTE SEGREGATION

Table of Contents: PRIVACY-15. ATTRIBUTE SEGREGATION

PRIVACY-12. ANONYMITY

Table of Contents: PRIVACY-12. ANONYMITY

PRIVACY-4. CREDENTIAL LIMITATION

Table of Contents: PRIVACY-4. CREDENTIAL LIMITATION

PRIVACY-3. ATTRIBUTE MINIMIZATION

Table of Contents: PRIVACY-3. ATTRIBUTE MINIMIZATION