IIW 16 Proposed Topics

From IIW
Jump to: navigation, search

What topics are you planning to present about or lead a discussion about at this IIW?

  • Update the conference about our company, our learnings and plans in the area of Personal Information Management.
  • Cryptographic authentication on mobile devices
  • OAuthOpenIDAPI driven developmentHawk
  • OpenID Connect, OAuth, JWT, JOSE
  • behavior-based model for digital interactions
  • OpenID Connect / OIDF Promotion
  • Personal Cloud IdentityPersonal Cloud Architecture
  • Maybe something around CIFER (Community Identity Framework for Education and Research), in order to elicit discussion and feedback from * IIW participants outside the R&E community.
  • Trustable identity, 2-factor authentication, mobile authentication
  • Management of reputation information in a non-consensus context.Legal, cultural and technical paradigms for balancing privacy concerns with the transparency needed for a well functioning
  • reputation based regulatory system.
  • Gratzi, an unhosted unmoney value system for personal clouds.
  • I need to think about it J
  • Our pilots and CPIM
  • Durable Trust - what makes an identity, especially one associated with stored data, trustworthy over time?
  • federated identity management
  • Current academic appraoches to online identity and privacy including recent U.S. survey results.
  • Open Mustard Seed
  • Trust Frameworks
  • Publicly Discoverable ePayment Address(es)
  • OAuth2 web session bootstrappingAre we losing the identity federation war?
  • SCIM
  • Talk about open 2nd factor crypto device we are developing for web use
  • Trust, reputation, identity fraud
  • Participate in OpenIDConnect Working Groups and related discussions
  • elimination of passwords
  • universal identity
  • The future of mobile in identity.
  • TBD
  • Identity Resolution
  • personal clouds
  • Strong two-factor authentication
  • authentication
  • Personal Cloud Networking
  • Patient ID for health information exchange
  • VRM and creating certainty of demand
  • OpenID Connect, UMA, SAML
  • Personal cloud business models
  • PICOs, Personal Clouds
  • UMA
  • Fixing patentsID binding

What are you hoping to learn about or hear a presentation about at IIW?

  • Hear from other companies involved in this space about what is working, what is not, new thingking etc.
  • Interesting uses and applications for the various open auth protocols.Interchange between open protocols and proprietary protocols.
  • Implementations of OpenID Connect, OAuth, JWT, JOSE
  • ICAM, NSTIC
  • are any general purpose trust framework efforts showing promise
  • OAuth 2.0 Dynamic Client Registration,OAuth 2.0 Resource Set Registration
  • Account ChooserBackplaneUMAPractical Implementations of OpenId Connect
  • Real world stories, Privacy in practice, new trends
  • just curious
  • OAuth, OpenID Connect, personal data stores, NSTIC, mobile,
  • Dynamic authentication NSTIC OIX UKIdentity proofing Identity Management Standards
  • OAuth2 scenarios Attribute exchange
  • federated identity, attribute assertion, policy control
  • OAuth and OpenID Connect happenings. SAML responses to those happenings. Things Attribute Providers should be doing to integrate into the identity ecosystem. UX/UI patterns for identity.
  • Authentication protocols - Open ID, Open ID Connect
  • Technical methods for storing data and descriptions of relationships between pieces of data in a distributed and non-consensus system.
  • Particular interest in technical methods for responsible management of multiple conflicting ontologies while minimizing latency concerns -- some brief thoughts on the subject have to do with varying scopes of a search -- searching only a subset of the data (let's assume it is a graph) in most instances.
  • Personal Cloud technology/architecture developments.
  • Developments on trust frameworks. Step up authentication. Standardization development on personal data stores, user centric attribute release.New initiatives in mobile and social authentication.
  • Universal login, storing personal data, security
  • Getting back in touch with ID community
  • schemas for attributes
  • Peer to peer and distributed trust models as envisioned for pClouds, VRM, NSTIC, etc.
  • VRM, Personal Clouds
  • Commercial approaches to the online reputation and data management.
  • 1. Technology: OpenID Connect, new protocols and existing protocol enhancements 2. Topics around identity provider discovery 3. TV-Everywhere topics 4. Personal data & personal cloud 5. Anything that's interesting
  • Future of
  • OpenId Connect -Oauth 2
  • Identity Attribute Exchange Networks
  • Personal Clouds!
  • SCIM, UMA, Authentication
  • More insights on how to make federation take off more
  • Trust Framework Interoperability
  • Trust, reputation, identity fraud
  • SCIM, OAuth2
  • Authentication, Authorization, and Identity issues in Web and Mobile Applications
  • standards for identity and account info exchange- what others are doing in identity simplification
  • Paths to adoption for new identity platforms
  • Commercials of integration of personal clouds
  • product strategy input, validation
  • Evolution of Indentity in the enterprise.
  • personal cloud security standards
  • XDI, VRM, User Centric IdM
  • VRM and creating certainty of demand
  • PICOs, Personal Clouds
  • OpenID Connect
  • ID federation
  • Health care IT

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • What standards are there now, what standards are emerging, what standards do we want t oget behind and support? Is there growth in uptake of User centric services? What do we need to do to accelerate growth?
  • Adopting simple enough protocols that they actually become ubiquitous
  • are any general purpose trust framework efforts showing promise
  • mobile payments
  • How to create momentum for OpenId, UMA, PDEC and VRM
  • Privacy in practice
  • when, where, why and how
  • state of the user-id community in North America, Europe, Asia
  • Maybe this: personal data vs enterprise data and the user experience. Who controls my data?
  • Potential for ORCID as IdP
  • How do we couple the form of credential (smartcard, etc.) from the identity itself?
  • Distributed Data Storage Methods for describing relationships Methods for enabling a community of users to self regulate and self co-ordinate despite a lack of complete consensus about not only who to trust and what attributes matter, but even the most fundamental elements of meaning -- i.e. what a specific entity "is."To unpack that a little bit, I'm interested in discuss the technical methods by which a user can disagree with much of what another user creates, yet isolate the components that are useful/relevant to her own experience and can make use of (whether by subscription, remix, republication etc...) those elements in ways that are relevant to her.
  • What sorts of products are well suited for distributed personal cloud systems, and how should we build them.
  • Privacy issues.Overall security. Role of government irt role of private sector.
  • current initiatives (industry, government, etc.) around identity and/or authentication
  • schemas for attributes
  • Trust durability, non-repudiation, revocation, detection and correction of breaches.
  • VRM Business Models
  • models on organizational collaboration
  • How this industry has evolved, on-going ethical/technical questions, opportunities and limits of these types of interventions.
  • Accreditation of Identity Providers...legal issues surrounding provenance & liability for the accuracy of identity attributes
  • Authentication, Personalization, and Security
  • Balancing privacy with profitability
  • Working to make personal clouds a "single" cloud for the person
  • how we can build a globally interoperable personal cloud network
  • Identity and trust. How do we create an open trusted identity framework? How can that feed into a global web of trust to enrich the content of the web and enable us to navigate more effectively?
  • Solution patterns for eliminating passwords
  • Controls to share data via identity as conveniently as email
  • what is the end user experience that establishes trust and gives consumers the right amount of choice without overwhelming them with detail?