gptkbp:instance_of
|
gptkb:publishing_company
|
gptkbp:bfsLayer
|
5
|
gptkbp:bfsParent
|
gptkb:NIST_Special_Publication_800-90_B
|
gptkbp:addresses
|
gptkb:Company
|
gptkbp:aims_to
|
Security and Privacy
|
gptkbp:amended_by
|
gptkb:2020
|
gptkbp:applies_to
|
Online Services
E-Government Services
|
gptkbp:collaborated_with
|
Academic Institutions
Industry Stakeholders
|
gptkbp:developed_by
|
gptkb:NIST_Information_Technology_Laboratory
|
gptkbp:first_published
|
gptkb:2017
|
gptkbp:focuses_on
|
Digital Identity
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-63
|
gptkbp:includes
|
gptkb:seal
Authentication Requirements
Risk Assessment Guidelines
|
gptkbp:is_adopted_by
|
State Governments
Access Control Systems
Private Sector Organizations
|
gptkbp:is_aligned_with
|
International Standards
|
gptkbp:is_analyzed_in
|
Identity Risks
|
gptkbp:is_available_on
|
NIST Website
|
gptkbp:is_cited_in
|
gptkb:FIPS_201
Research Papers
Compliance Frameworks
|
gptkbp:is_considered
|
Best Practice
|
gptkbp:is_designed_to
|
Public Sector Organizations
|
gptkbp:is_discussed_in
|
Conferences
Webinars
|
gptkbp:is_evaluated_by
|
Security Metrics
Compliance Assessments
|
gptkbp:is_incorporated_in
|
Training Programs
|
gptkbp:is_influential_in
|
Identity Verification Standards
|
gptkbp:is_informed_by
|
User Feedback
User Experience Research
|
gptkbp:is_part_of
|
gptkb:Company
gptkb:National_Cybersecurity_Strategy
gptkb:NIST_Special_Publication_series
Digital Identity Guidelines
|
gptkbp:is_promoted_by
|
Public Awareness Campaigns
Cybersecurity Agencies
|
gptkbp:is_referenced_in
|
gptkb:Federal_Information_Security_Modernization_Act
Security Policies
Legal Documents
|
gptkbp:is_related_to
|
gptkb:Company
Privacy Framework
|
gptkbp:is_reviewed_by
|
Policy Makers
Industry Experts
|
gptkbp:is_supported_by
|
gptkb:document
Federal Grants
|
gptkbp:is_used_by
|
Federal Agencies
|
gptkbp:is_used_for
|
User Authentication
|
gptkbp:is_used_to
|
Establish Identity
|
gptkbp:is_utilized_in
|
gptkb:software
Incident Response Plans
Credentialing Processes
|
gptkbp:provides
|
Technical Requirements
Implementation Guidance
|
gptkbp:provides_information_on
|
Identity Proofing
Identity Assurance Levels
|
gptkbp:published_by
|
gptkb:NIST
|
gptkbp:supports
|
Interoperability
|
gptkbp:updates
|
gptkb:battle
|