IIW 14 Proposed Topics

From IIW
Jump to: navigation, search

What topics are you planning to present about or lead a discussion about at this IIW?

  • Multi-assertion authentication
  • Attribute Exchange Trust Frameworks. Attribute Provider Networks.
  • OpenID Connect, OAuth, FICAM, NSTIC
  • SCIM
  • XDI, OpenID Connect 1.0
  • Roadmap for rapidly advancing VRM adoption.
  • OpenID Connect, OIX, OAuth, Identity Provider Businessmodels
  • VRM
  • Customer Care for federated identities
  • customer commonsuser-driven personal data
  • Trust Framework Meta Model
  • NSTIC, Identity Ecosystem Business Models, Identity Attributes
  • OpenID ConnectOAuthJSON Cryptography
  • Step-up authentication, mobile 2-factor AuthN
  • Customer Care for federated identities
  • customer commonsuser-driven personal data
  • Trust Framework Meta Model
  • NSTIC, Identity Ecosystem Business Models, Identity Attributes
  • OpenID ConnectOAuthJSON Cryptography
  • Step-up authentication, mobile 2-factor AuthN
  • Backplane 2.0
  • standards/techniques for proxy authentication
  • NSTIC - pre secretariat effort
  • ACBio
  • Personal data stores: cloud based? Local based? mix? level of security? ... <-> Benefits to individuals
  • Personal data tagging: an utopia? what would be the requirements? the benefits?
  • In a VRM world, how to manage the transparency of the relationship? Trusted identities?
  • SCIM, OAuth, OpenID Connect
  • UMAAPI access control
  • Metadata for scalability in OpenID Connect
  • Interested in business opportunities associated with user-centric identity, personal data stores, VRM.
  • explaining identity to non-technical stakeholders
  • SCIM
  • Standard Information Sharing Labels
  • Building a VRM Startup
  • Building a "Fourth Party" for a Vertical Market
  • The effect of identity and privacy polices on people in marginalized communities
  • accessibility, disability, and identity online
  • Initiatives for distributed networks (e.g. FreedomBox) and their role in PDE and VRM

What are you hoping to learn about or hear a presentation about at IIW?

  • AttributeExchange, OpenIdConnect, OAuth2, UMA, NSTIC, OIX
  • Roadmap for rapidly advancing VRM adoption.
  • SCIM, BYOI
  • SCIM
  • Current standards and new directions and ideas.
  • VRM and Personal Data Ecosystem efforts, OpenID Connect, Account Chooser, Backplane Exchange
  • Business value of an IDP
  • NSTIC
  • OpenID Connect, OAuth 2
  • Customer Care for federated identities
  • customer commonsuser-driven personal data
  • Trust Framework Meta Model
  • NSTIC, Identity Ecosystem Business Models, Identity Attributes
  • OpenID ConnectOAuthJSON Cryptography
  • Step-up authentication, mobile 2-factor AuthN
  • Giving users control of their data, building tools that access that data without giving it to another service provider.
  • NSTIC, OpenID Directions, Personal Data Directions, Real Privacy for Everyone
  • ImplementationsInterop
  • 2-factor AuthN, interested in NSTIC
  • OAuth2, SCIM, OpenID Connect
  • Federation
  • actual technology privacy problems and trends for solving these issues, both theoretical as well as practical
  • transitioning large organizations to standards based identity
  • OAuth, OpenID Connect, NSTIC, Privacy, enterprise awareness, cutting edge advancements
  • identity provisioning, identity sync
  • Networking, VRM, User-Centric Identity, Networking, Networking
  • OAuth2 future steps/4th party auth/Auth in mobile platforms/Auth for e-commerce sites
  • Lots been said and promoted about Identity Trust Frameworks. Are there any alternatives to Trust Frameworks that can help enforce

compliance with agreements amongst IDM players (IDP, Attribute Provider, RP, User) and also liability in case of non-performance?

  • Interoperability standards (between browsers, databases, companies and organizations)-Identity standards-VRM interoperabilty with CRM?
  • OAuth OpenID etc. NSTIC. Identity business models.
  • OAuth, OpenID Connect, JWT futuresNSTIC and FICAM news
  • AccountChooser
  • Use cases of how OpenID/Connect is being used
  • Use cases of online identity verification and what organizations are looking for in these solutions. Including challenges; leading technologies/services being implemented and; what’s working and what’s not. Additionally, any updates on any of the identity verification Pilots that are being discussed and/or taking place.
  • Better understand the state-of-the-art and future direction in IDM, PDS, user-centric identity, personal data ecosystems, VRM...
  • secure authentication strategies for distributed identity management
  • OAuth, SCIM
  • SCIM
  • Challenges, opportunities and informed investors for startups implementing VRM principles and user centric identity
  • How technology development is affecting identity and privacy standards….

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • How to get VRM on wheels
  • locus of control
  • Verification of user-provided identity attributes. How can we know that what users tell us about themselves is true?
  • Customer Care for federated identities
  • customer commonsuser-driven personal data
  • Trust Framework Meta Model
  • NSTIC, Identity Ecosystem Business Models, Identity Attributes
  • OpenID ConnectOAuthJSON Cryptography
  • Step-up authentication, mobile 2-factor AuthN
  • How can we build client web applications that access a distributed social data network, which do not require each user to copy their data to the
  • company that built the client application?
  • shortcomings of identity as the uniting metaphor for trust frameworks
  • Claims ProvidersBusiness Models
  • Is there a market for user controlled mobile phone based 2-factor AuthN?
  • responsibility, whose responsibility is privacy, who is liable for what, etc.
  • how to choose when to use cloud based identity credentials versus client based credentials
  • Define the intersection of user-centric, enterprise, relying parties, who, when, how? Define OAuth in layman's terms.
  • standards and security related to interop between identity providers and identity consumers
  • privacy and security
  • To make timely progress on solutions based on open standards, it seems essential that user-centric identity requirements are debated in the community,
  • solidified and then formalized in an appropriate standards body to drive technical specifications development.
  • Identity recognition and management: where are we today? Where are we going tomorrow?
  • How VRM companies can become supportive of each other
  • I’d be interested in examples of levels of assurance.
  • User-centric ID is the focus here and the right thing to do, but funding and the big winners on the business side are FB, Google, LI and so on.
  • How can user-centric ID be commercially successful? What can we do as an industry to move the needle?
  • Identity management for minors
  • Why are we still talking "user-centric"?

8 User experience

  • What kind of control can people have over their own data?