Proposed Topics IIW11
From IIW
What are the critical questions about user-centric identity you hope to discuss with peers at IIW.
- how to easily gathering new data
- Personal Application Ecosystems
- Deepening understanding of requirements to ensure end-user trust and technical interoperability
- How do you justify and value being an identity provider for users
- risks, remedies, and opportunities for individuals and organizations
- Status of development standards
- How can we leverage user-centric initiatives into organizational identity, what impact do smartphones and NFC have on user-centric progress?
- How to get traction for personal data stores
- How trustworthy are the identities. If they are trustworthy, then how can I protect my privacy
- The potential role for Swisscom in this Personal Data ecosystem
- Access Control Models
- how to easily gathering new data
- "all sorts of ""real world users"" issues and quiestions"
- Anonymity and Identity
- What's the adoption status of the various protocols? What's the completion status of OpenID 2.0?
- Identity in the Cloud
- Our things are our proxies
- The market for customer control of Personal Data
- Moving the protocols forward
- I fear that Facebook Connect and Twitter Connect are the new AOL
- current and future business cases
- Need for web agent (browser) externsions. psuedonym, NSTC
- Understanding what has stabilized about protocols so we can standardize our partners on them
- Open Identity Trust Framework
- Future of authentication from a user perspective.
- What are the components of a personal data ecosystem? What rights and protections do we need to articulate in law and enforce through social norms?
- Best applications and issues for combining social information
- how do we want to represent identity in the OS/browser
- "all sorts of ""real world users"" issues and questions"
- How to make this stuff invisible
- "what are all stakeholder identity needs; what system ""metrics"" would help them"
- how/if their ideas apply when a domain name or IP address is the only identifier
- Where do we go from here?
- "How do we start the path to laws that give power to people over ""their data""
- What's on the horizon, how are people bridging consumer & enterprise identity protocols, how does OAuth change things, what about Info Cards, etc., etc.
- zero password initiatives
- adoption of OpenID and OIX Trust Frameworks
- Personal data store interop
- "Multiple ""Identities"" and the requirement to be conscious of them"
- Full session life-cycle management
- UMA / Personal Datastore
- how to make this all user comprehensible
What topics are you planning to present about or lead a discussion about at this IIW?
- Webfinger, Phone number mapping
- trust frameworks and public policy implications
- mobile authentication (includes voice biometrics)
- Information Sharing, Personal Data Stores
- User perceived value and ownership over identity
- Value Network analysis to define values for all participants in personal information and data ecosystem.
- Business Models in a PDS Ecosystem
- user-centric identity vs. org. centric identity, colliding on your smartphone?
- personal data store
- Public ids
- Identity Management and Cloud Hosters
- OpenID
- VRM and the real world
- Kynetx Event Processing
- Web Security Happenings
- OAuth in the Enterprise
- Connected devices vs telecom infrastructure
- VRM maybe
- Trust Frameworks
- User-Managed Access, OAuth, OpenID
- OpenID Connect, Portable Contacts
- Enterprise Requirements for OAuth
- NSTIC
- Project planning for data portability policies and practices
- social network logins and identity for learning games
- The Open Identity Exchange and The OpenID Foundation
- Personal data stores
- Digital Identity for people who are not techies.
- OAuth 2
- XDI Personal Data Stores
- Oauth 2.0, Open Graph
- OpenID Connect
- OpenID User Experience
- activitystreams
- identity in the device
- IC3
- WebID
- User-Managed Access
- User-Managed Access, OAuth, OpenID
- OpenID Connect, Portable Contacts
- Enterprise Requirements for OAuth
- NSTIC
- JSON Web Tokens (JWTs)
- maybe health/vrm and/or startup
- Open Enterprise Systems
- "authentication, ""strong"" identities"
- NSTIC, Secuire/Private IDP, Psuedonyms Extenstion to OpenID
- Building an App Store with Open Identity
- Universal Cloud ID
- JSON Activity Streams, Open Graph Protocol
- Supporting multiple users / accounts.
- Skype as a PDS; Data Portability Policy working sessions
- merging social information from multiple social accounts
- Bringing OSW together with OpenSocial
- user-managed access
- OAuth Multiple Scoped Token
- OAuth in the enterprise
- VRM and the real world
What are you hoping to learn about or hear a presentation about at IIW?
- Identity Management and Cloud Hosters
- Simple Cloud Identity Management
- VRM, personal data store
- Activity Streams
- Stronger identity for stronger commerce
- Implications of the PDE
- strong, anonymous authentication
- More information about Personal Data Ecosystem: timing, players, businessmodel
- Kynetx
- UMA, SAML2
- Techniques identity providers can use to limit the imposition of identity transfer
- Comprehenive sense of data and information related to individuals and entities, holder of that information, and value currently or planned to be created from that information.
- Personal Identity Services and Ecosytem
- VRM, Personal Data Stores
- personal data stores
- What other people are doing in this space
- Identity Management and Cloud Hosters
- VRM, personal data store
- Anonymity and persistent identifiers; trust and identity
- Commercial Applications & Personal Data Services
- Tor, OpenID
- Personal data ecosystem, externalized authorization
- PDS, UMA
- Consumer identity opportunities and relationships
- What's happening next!
- The value of Personal Data
- Identity Assurance
- system coordination sticking points
- UMA, OAuth, OpenID
- latest thinking on reputation and certification of identities/identifiers
- What everyone else has been up to lately
- "Legal frameworks backing up citizen ""ownership"" of their data"
- New developments, consumer/enterprise identity bridging, OAuth 2, etc.
- zero password initiatives
- Open Identity standards and technology
- Personal data stores
- Identity Commons 3.0
- What are Google and Facebook doing to provide tools to manage this data?
- How close to viability are the tools for end-users?
- What can we plug into that isn't Facebook?
- personal data stores
- Internet Identity
- SSO and social sign-on
- OAuth 2
- Progress on OpenID Next Connect
- Various different implementations of SAML2 systems & how mobile use cases are being considered.
- openid connect
- activitystreams, oauth, ...
- oauth 2.0
- SSO and VRM
- OAuth 2
- The state of identity and auth as well as interoperability
- small business infrastructure- simplifying vendor/customer relationship
- hot topics since IIW Fall 08
- Google PsuedoID, OpenID Directions
- Integrating third party apps with Open Identity
- OpenID, SAML
- What projects folks are up to.
- monetization of social identity management
- trust frameworks, levels of assurance
- OAuth2.0
- usability, signature standards/key management for internet identity
- open ID as it relates to the non-geek world