Proposed Topics IIW11

From IIW
Jump to: navigation, search

What are the critical questions about user-centric identity you hope to discuss with peers at IIW.

  • how to easily gathering new data
  • Personal Application Ecosystems
  • Deepening understanding of requirements to ensure end-user trust and technical interoperability
  • How do you justify and value being an identity provider for users
  • risks, remedies, and opportunities for individuals and organizations
  • Status of development standards
  • How can we leverage user-centric initiatives into organizational identity, what impact do smartphones and NFC have on user-centric progress?
  • How to get traction for personal data stores
  • How trustworthy are the identities. If they are trustworthy, then how can I protect my privacy
  • The potential role for Swisscom in this Personal Data ecosystem
  • Access Control Models
  • how to easily gathering new data
  • "all sorts of ""real world users"" issues and quiestions"
  • Anonymity and Identity
  • What's the adoption status of the various protocols? What's the completion status of OpenID 2.0?
  • Identity in the Cloud
  • Our things are our proxies
  • The market for customer control of Personal Data
  • Moving the protocols forward
  • I fear that Facebook Connect and Twitter Connect are the new AOL
  • current and future business cases
  • Need for web agent (browser) externsions. psuedonym, NSTC
  • Understanding what has stabilized about protocols so we can standardize our partners on them
  • Open Identity Trust Framework
  • Future of authentication from a user perspective.
  • What are the components of a personal data ecosystem? What rights and protections do we need to articulate in law and enforce through social norms?
  • Best applications and issues for combining social information
  • how do we want to represent identity in the OS/browser
  • "all sorts of ""real world users"" issues and questions"
  • How to make this stuff invisible
  • "what are all stakeholder identity needs; what system ""metrics"" would help them"
  • how/if their ideas apply when a domain name or IP address is the only identifier
  • Where do we go from here?
  • "How do we start the path to laws that give power to people over ""their data""
  • What's on the horizon, how are people bridging consumer & enterprise identity protocols, how does OAuth change things, what about Info Cards, etc., etc.
  • zero password initiatives
  • adoption of OpenID and OIX Trust Frameworks
  • Personal data store interop
  • "Multiple ""Identities"" and the requirement to be conscious of them"
  • Full session life-cycle management
  • UMA / Personal Datastore
  • how to make this all user comprehensible

What topics are you planning to present about or lead a discussion about at this IIW?

  • Webfinger, Phone number mapping
  • trust frameworks and public policy implications
  • mobile authentication (includes voice biometrics)
  • Information Sharing, Personal Data Stores
  • User perceived value and ownership over identity
  • Value Network analysis to define values for all participants in personal information and data ecosystem.
  • Business Models in a PDS Ecosystem
  • user-centric identity vs. org. centric identity, colliding on your smartphone?
  • personal data store
  • Public ids
  • Identity Management and Cloud Hosters
  • OpenID
  • VRM and the real world
  • Kynetx Event Processing
  • Web Security Happenings
  • OAuth in the Enterprise
  • Connected devices vs telecom infrastructure
  • VRM maybe
  • Trust Frameworks
  • User-Managed Access, OAuth, OpenID
  • OpenID Connect, Portable Contacts
  • Enterprise Requirements for OAuth
  • NSTIC
  • Project planning for data portability policies and practices
  • social network logins and identity for learning games
  • The Open Identity Exchange and The OpenID Foundation
  • Personal data stores
  • Digital Identity for people who are not techies.
  • OAuth 2
  • XDI Personal Data Stores
  • Oauth 2.0, Open Graph
  • OpenID Connect
  • OpenID User Experience
  • activitystreams
  • identity in the device
  • IC3
  • WebID
  • User-Managed Access
  • User-Managed Access, OAuth, OpenID
  • OpenID Connect, Portable Contacts
  • Enterprise Requirements for OAuth
  • NSTIC
  • JSON Web Tokens (JWTs)
  • maybe health/vrm and/or startup
  • Open Enterprise Systems
  • "authentication, ""strong"" identities"
  • NSTIC, Secuire/Private IDP, Psuedonyms Extenstion to OpenID
  • Building an App Store with Open Identity
  • Universal Cloud ID
  • JSON Activity Streams, Open Graph Protocol
  • Supporting multiple users / accounts.
  • Skype as a PDS; Data Portability Policy working sessions
  • merging social information from multiple social accounts
  • Bringing OSW together with OpenSocial
  • user-managed access
  • OAuth Multiple Scoped Token
  • OAuth in the enterprise
  • VRM and the real world

What are you hoping to learn about or hear a presentation about at IIW?

  • Identity Management and Cloud Hosters
  • Simple Cloud Identity Management
  • VRM, personal data store
  • Activity Streams
  • Stronger identity for stronger commerce
  • Implications of the PDE
  • strong, anonymous authentication
  • More information about Personal Data Ecosystem: timing, players, businessmodel
  • Kynetx
  • UMA, SAML2
  • Techniques identity providers can use to limit the imposition of identity transfer
  • Comprehenive sense of data and information related to individuals and entities, holder of that information, and value currently or planned to be created from that information.
  • Personal Identity Services and Ecosytem
  • VRM, Personal Data Stores
  • personal data stores
  • What other people are doing in this space
  • Identity Management and Cloud Hosters
  • VRM, personal data store
  • Anonymity and persistent identifiers; trust and identity
  • Commercial Applications & Personal Data Services
  • Tor, OpenID
  • Personal data ecosystem, externalized authorization
  • PDS, UMA
  • Consumer identity opportunities and relationships
  • What's happening next!
  • The value of Personal Data
  • Identity Assurance
  • system coordination sticking points
  • UMA, OAuth, OpenID
  • latest thinking on reputation and certification of identities/identifiers
  • What everyone else has been up to lately
  • "Legal frameworks backing up citizen ""ownership"" of their data"
  • New developments, consumer/enterprise identity bridging, OAuth 2, etc.
  • zero password initiatives
  • Open Identity standards and technology
  • Personal data stores
  • Identity Commons 3.0
  • What are Google and Facebook doing to provide tools to manage this data?
  • How close to viability are the tools for end-users?
  • What can we plug into that isn't Facebook?
  • personal data stores
  • Internet Identity
  • SSO and social sign-on
  • OAuth 2
  • Progress on OpenID Next Connect
  • Various different implementations of SAML2 systems & how mobile use cases are being considered.
  • openid connect
  • activitystreams, oauth, ...
  • oauth 2.0
  • SSO and VRM
  • OAuth 2
  • The state of identity and auth as well as interoperability
  • small business infrastructure- simplifying vendor/customer relationship
  • hot topics since IIW Fall 08
  • Google PsuedoID, OpenID Directions
  • Integrating third party apps with Open Identity
  • OpenID, SAML
  • What projects folks are up to.
  • monetization of social identity management
  • trust frameworks, levels of assurance
  • OAuth2.0
  • usability, signature standards/key management for internet identity
  • open ID as it relates to the non-geek world