Iiw12 Proposed Topics

From IIW
Jump to: navigation, search

What topics are you planning to present about or lead a discussion about at this IIW?

  • - Open Reputation Framework- relationship of reputation to identity
  • Activity Streams, Microformats,
  • Backplane
  • Browser-based identity systems, client-side service discovery
  • Building a federated signon protocol based on OAuth2
  • Centering identity data in the browser - maybe
  • "Continuing development of the FreshBooks Add-on Store and gadget environment; efforts at The Small Business Web to standardize ""app stores""
  • Digital Birth Certificates (as described by Siegel) / PDS for things
  • Ethically Monetize Data.Calculating Privacy Risk.Data context and blurring models.
  • Identity and digital assets on the web. User centric distributed data stores.
  • Inconsistency Robustness
  • Information sharing agreements
  • Legal Standards, Market and community rules structures, risk and liabilitiy mitigation online, addressing privacy and security issues
  • multiple identities
  • Not planning to lead, since this is my first. However, I can bring a perspective on how an MSO is approaching Identity.
  • Not sure yet
  • NSTIC
  • NSTIC - Industry partnership
  • NSTIC revisited, in the US and EU
  • OAuth in the enterpriseStrong auth
  • OAuth, JWT, SWD, OpenID
  • openID ABC
  • OpenID Evolution To A 4-Party Model (IdP,RP,User, AP (Attribute Provider).OpenID Proxies, Good or Bad Idea?NSTIC
  • OpenID, OAuth
  • OpenID, OAuth, Enterprise, OpenStack
  • PDS, personal trust frameworks
  • Portable Contexts & The Portable Context Community Prototype
  • Privacy and identity
  • PuSHEE - PubSubHubbub Enterprise Engine
  • Security analysis of double-redirection protocols + PKAuth: social login for unregistered applications
  • Social web and Mozilla. Drumbeat website. Ongoing work on Identity and Badges.
  • SquareTag - Enabling unconnected things to participate in the Internet of Things
  • The opportunities afforded by wide-spread adoption of transparency, unique-identity and real-identity verification, and trust networks.
  • The state of Activity Streams.
  • UMA; user-centric identity; risks involved; quality
  • User experience design of Smart manager
  • User Managed Access (3)
  • Using the DNS as a personal contact info repository.Explanation of .tel domains.
  • VPI; Mydex community prototype
  • VRM / Personal RFP
  • VRM / Fourth Parties
  • VRM / r-button / emancipay
  • VRM / health care / self-tracking / personal informatics
  • VRM / GRM (government relationship management)
  • VRM + CRM
  • web security

What are you hoping to learn about or hear a presentation about at IIW?

  • 3rd party data access -- sites that scrape data I maintain on my primary site/profile. How is that protected, governed...
  • All
  • as much as I can
  • Authentication, authorization and social login protocols
  • business caseattribute verificationsocial sign on in relation to data agregators
  • Business models that would enable a large financial institution to succeed as an Identity Provider for its customers.
  • connect.me, universal login, government id
  • Digital Death, Information Privacy, VRM
  • economics of identity, models of privacy and security, stable equilibria in the identity space
  • Evolution of trustworthy identity and credentialing
  • Evolving business modelsRegulatory landscapeData gathering toolsSemantic tools for organizing free-form data
  • Federated login. OpenIdConnect.
  • gnarly problems
  • Grounding in 'big picture' issues, especially challenges of a multi-faceted identity, and some practical info. about implementation in institutions
  • I want to become more familiar with the existing community of developers.
  • I would like to learn about how identity providers can offer or enable a wide range of applications without operating each service infrastructure.
  • Identity and Access Management used on the Internet for B2C. Mutual Authentication/Assurance of the Identity and it's lifecycle (from provisioning to end of life)
  • implementing Trust Frameworks; Refining OpenID ABC
  • many thoughts related to human centric view of management and use of identity
  • Methods for coalescing identity, working with personal data stores
  • Neat Things
  • NSTIC
  • OAuth 2 progress, PDS/PDX
  • OAuth 2, OpenIDConnect, OpenSocial, SAML (3)
  • OAuth 2.0, OpenID Connect
  • OAuth 2Consumer/Enterprise identity bridges
  • OAuth, JWT, OpenID Connect, SAML, use cases that cross the enterprise/individual divide
  • OAuth2
  • OAuth2, OpenID ABC progress, security
  • Oauth2, UMA, PDS, verified claims (3)
  • Ongoing work in open standards re: identity.
  • OpenID ABC, OAuth2, Identity in the Browser, Login UX
  • OpenID Connect, UMA, OAuth (2)
  • OpenID Strategic DirectionPersonal Data Exchanges
  • OpenID, OAuth
  • OpenID, OAuth, OpenID Connect, authentication, privacy, security
  • PDS (databanks),
  • VRM, VRM+CRM,
  • future of media, future of advertising,
  • future of TV, Quora as Disputation Arena,
  • real-time location-based services in the personal data ecosystem;
  • what does it mean if this person and his ideas (http://www.tubechop.com/watch/126638) are leading the US Dept. of Commerce and informing President Obama's long term vision for our country and the world?
  • PDS topics, VRM, Portable Identity
  • Personal Data Ecosystem (2)
  • personal data stores
  • Personal data stores, data portability
  • privacy and user-centric identity; protocol flows
  • Standardization, especially relating to OAuth and OpenId
  • Take it all in and hope I understand it.
  • The death of internet identity.
  • The status of online identity; sharing experiences and getting inspiration for future directions
  • The status of OpenID Connect.
  • Trust frameworks for consumer web sites
  • User expedrience case studies
  • What is the impact of NSTIC?
  • Whatever is next
  • Whether OpenID is still relevant to anyone.

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW.

  • applications and implications of formal identity verification vs. aggregation of reputation
  • development milestones/challenges, adoption milestones/adoption, user acceptance,
  • Feedback on client-side discovery systems; whether anyone would adopt as relying or originating party; client-side claim discovery and relay systems
  • How are others controlling and even redacting access from vendors outside of the IdP?
  • how best to move forward
  • How do Identity providers address the need to provide multi-tenant Identity environments. Are there there issues around Identity that should impact a company's data management strategy?
  • how do you make incentives on the vendor side.
  • How to create a federated signon ecosystem in the Internet based on open authentication standards
  • how to ensure quality and privacy with user centric protocols
  • How to get past the present state of internet identity.
  • How to insure real privacy and security in Federated Identity Systems.
  • IDaasManaging identity and user data across enterprises and clouds
  • Is OpenID Dead? If so, where next?
  • Is there an alternative to Facebook?
  • Liability issues for Identity Providers
  • Linkage of user-centric identities between audience and advertiser ecosystems
  • Need for strong identification of relying party without registration (2)
  • Next evolutionary steps
  • Oauth2, UMA, PDS, verified claims
  • Possible improvements to the ux design of Smart manager
  • Standards and adoption
  • standards, VRM, personal data stores/services, 4th party services
  • Universal Cloud ID by way of reinventing the password while providing maximum security with absolute simplicity.
  • Ways of making it easy for the data producer to control data dissemination.Measurement of, and patterns in, user privacy sensitivity ratings
  • What are all users needs. What do we want the systems to do
  • What are the major privacy issues, and how are they addressed.
  • what creates value what are we protecting against
  • What does a competitive identity ecosystem look like? What are the features of stable equilibria? How do we avoid a winner-take-all market model.
  • What non-technical challenges most hinder wide-spread adoption of better security and authentication?
  • What role, if any, should government and the law play in facilitating the emergence of the PDS / VRM paradigm?
  • where do we see the business case for LoA 2 and higher, who will drive the market? Why are service providers reluctant to adopt infrastructure. To much technology push?
  • Whether federated social networking systems will ever create sufficient value to cross the initial chasm of significant usage.
  • Why choose which balance between the user's and the identity/service provider's interest; what privacy concerns are reasonable