This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
New Pathways in Identity Management
November/December 2010 (vol. 8 no. 6)
pp. 64-67
Paul C. Clark, Naval Postgraduate School
Glenn R. Cook, Naval Postgraduate School
Edward L. Fisher, Naval Postgraduate School
John D. Fulp, Naval Postgraduate School
Valerie Linhoff, Naval Postgraduate School
Cynthia E. Irvine, Naval Postgraduate School
The US Naval Postgraduate School has established a comprehensive identity management education program. The four-course certificate program is the centerpiece of an effort that also includes training and awareness, executive education, and graduate-degree programs.

1. P. Steiner, "On the Internet, Nobody Knows You're a Dog," cartoon, New Yorker,5 July 1993, p. 61.
2. "Policy for a Common Identification Standard for Federal Employees and Contractors," Homeland Security Presidential Directive 12, Office of the Press Secretary, The White House, 27 Aug. 2004.
3. "Personal Identity Verification (PIV) of Federal Employees and Contractors," Federal Information Processing Standards Publication 200-1, US Nat'l Inst. Standards and Technology, Mar. 2006.
4. B. Nuckols, "MD Revises Procedures after Wrong Inmate Released," Washington Times,3 Mar. 2010.
5. S. Greene, "Evidence Proves Innocence after 24 Years," Denver Post,25 July 2007.
6. F.N. Rasmussen, "Unknown Soldier—but Not Forgotten Honor," Baltimore Sun,14 Nov. 1998.
7. "Fake Cisco Serial Numbers in $1 Million Chinese Computer Parts Scheme," Homeland Security Newswire,4 Dec. 2009.
8. S.J. Murdoch et al., "Chip and PIN Is Broken," Proc. 2010 IEEE Symp. Security and Privacy, IEEE Press, 2010, pp. 433–446.

Index Terms:
biometrics, identity management, Naval Postgraduate School, identification, verification, passwords, security and privacy
Citation:
Paul C. Clark, Glenn R. Cook, Edward L. Fisher, John D. Fulp, Valerie Linhoff, Cynthia E. Irvine, "New Pathways in Identity Management," IEEE Security & Privacy, vol. 8, no. 6, pp. 64-67, Nov.-Dec. 2010, doi:10.1109/MSP.2010.183
Usage of this product signifies your acceptance of the Terms of Use.