IIW 25 Proposed Topics

From IIW
Revision as of 17:56, 28 September 2017 by Nobnatu (talk | contribs)

Jump to: navigation, search

What topics are you planning to present about or lead a discussion about at this IIW?

  • Kantara OTTO WG
  • Functional Identity, SDG 16.9, identity in developing countries
  • Blockchain Biometric Authentication
  • Discussion: Notaries in the Digital Age; Hands-On Session: How to Embed Data into Blockchains
  • Ways of Knowing: Intuition
  • Awareness relating to relationships with technology and how it is influenced by our core human nature. Awareness of the balance related to the forces regarding the trade off between anonymity/freedom vs. notoriety/influence. How human nature can own, or be owned by, the forces of the IT considering the influences of Culture, Current Politics and Pop Culture.
  • decentralized identity, blockchain IDs, personal datastores
  • indieweb
  • Microservice Security
  • Identity for Industrial IoT
  • consent access
  • Sovrin, XDI
  • owning personal data
  • DNS Next Generation - DNS has served us for over 30 years, but what do we need now?
  • Kantara/ConsentJLINC/Information Sharing
  • communities of interest around shared risks, distributed governance, economic models for user-centric identity
  • Credentials-based user-centric identity management, Blockchain-based identity solutions, Identity solutions for the blockchain
  • OIDC
  • Identity Proofing
  • RealMe
  • Happy to speak about applications in the humanitarian sector or about models for public-private collaboration at scale
  • OpenID Certification, OpenID Financial API
  • identity and privacy education for K-12
  • MFAOauth-based standardsAuthenticationPrivacy
  • Distributed Identity protocols based on blockchains
  • Open Source Identity Management in Higher Education
  • Bring your own identitySocial Ledger
  • Yubikey UsabilityKey Management
  • How to do OAuth2 + FHIR + Smart on FHIR Auth
  • Verified Organizations, using enabling self-sovereign identity for Government Services. Enabling the digital economy for organizations.
  • Owner authentication
  • Self-Sovereign Technology
  • Future of eID, eIDAS and PKI


What are you hoping to learn about or hear a presentation about at IIW?

  • Beginners origami
  • Identity and Access Management
  • Looking for nuggets relevant to my work.
  • Meaning of identity
  • Biometrics
  • Identity Proofing - Including knowledge-based authentication, and new techniques including virtual in-person proofing.Real world identity proofing in the financial industry, health care, government, etc.
  • Identity verification for Internet payments - Including biometric authentication of payments on mobile phones, and new European regulations on Internet payment security.
  • Identity and privacy in health care
  • FIDO
  • API of the W3C
  • Cryptographic Credentials -Including anonymous credentials and quantum resistant credentials
  • Effort to "reboot the Web of trust"
  • Multisignal authentication
  • Authentication of US government employees
  • Authentication in the enterprise and the extended enterprise
  • Identity in the context of mobile device management
  • News in identity
  • It all relates to my interest so I will expect many pleasant impacts. Im coming as a whiteboard of listening.
  • Identity use on blockchain, OpenIdConnect/OAuth2, Biometrics-based multifactor authentication
  • Monitoring of the health of authentication tools and their dependencies. Sovereignty. IoT.
  • Authentication standards, new attestation format work
  • New developments in the IAM field
  • OIDC Session Management
  • anything about identity except blockchain
  • more on persona data economy
  • personal naming systemscooperative naming
  • Something new
  • Sovrin, OpenID Connect, OAuth, consent, registry design,etc.
  • Identity, using as little identity as we can, using blockchain for either
  • Blockchain Biometric AuthenticationIdentity for Industrial IoT
  • Identity and Blockchain, privacy models, GDPR
  • Sovrin Foundation, Sovereign identity, Extension of the Web of Trust, Micropayments facilitated by Blockchain tech.
  • decentralized identity, consent access
  • What new things others are driving/creating
  • identity and privacy in healthcare
  • blockchain based identity - self sovereign identity
  • distributed identityblockchain and identitytrust frameworks
  • OAuthBlockchain
  • More about Blockchain
  • Other efforts using blockchains
  • New technologies in Identity Management
  • OpenID Connect, FIDO, blockchain identity, biometrics based authenticaiton
  • uPort service DiscoverySovrin AgentsOrganization relationship managementUMA 2.0
  • OAuth/OIDCBlockchain
  • Self Sovereign IdentityDLT\SLT technologyUMA
  • token exchange.Instead of Indian, how about Nepali? Momos will be a hit! Yes, veg and non-veg momos., aloo achar.
  • Decentralized identity solutions; extending self-sovereign identity to organizations that delegate authority. Authentication via Self-Sovereign Identity.
  • how self sovereign identity can be brought into reality for businesses, governments, and other orgs. +verified claims
  • Go to market strategy. Educate the younger generation that there is hope to protect privacy and personal data.
  • Future of authentication & identification protocols, solutions, principles


What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • How do we give sovereign control over identity information to individuals with nothing
  • Navigate the myriad of upcoming identity credential standards, formats, etc.
  • Components of remote identity proofing. Emerging standards. Relation to blockchains and decentralized apps.
  • How our Real-IT (relationship with IT) reflects into and affects our Reality.
  • Two factor authentication and integration points with older single-factor auth systems like AD user/password
  • why we don't do more awareness of the benefits about user-centricity
  • common ontology
  • Bringing DLT identity technology into our university setting
  • What are current big problems you are facing?
  • Do we always have to think identity, when we say authnetication? Authorization? Attribute?
  • How do we give sovereign control over identity information to individuals with nothing
  • Is a web of trust and personal sovereignty an emergent inevitability, how much push will it take for adoption to take hold or is it impossible to get major adoption. How much will it be embraced vs fought against.
  • Deployment
  • I'm interested in trust from the POV of, well, humans (vs companies / orgs / service providers, etc.). I've been thinking for a few years about this issue and whether there's a way to a better mechanism to trust or not trust service providers and also to more easily do what's needed to allow SPs to trust them without giving up too much in return.
  • Consent of user data
  • privilege delegation in webs of trust
  • What role can large NGOs play to make self sovereign identity a reality?How can a company or organization incorporate self sovereign identity concepts into their IAM program?
  • How do I build a cold storage identity wallet with PHI?
  • Enabling organizations to manage their delegations of authority and individuals to act on behalf of organizations.
  • How we balance ease of adoption and various concerns (e.g. privacy) for Agents and Verified Claims
  • Do you believe there is a demand for user-centric identity and data (present, future?)- Will this disrupt businesses of big corperations- Obsticles of success
  • Do you believe there is demand (latent, emerging or existing) for user-centric identity and data?2) Will this disrupt or add value to existing corporations?3) What are the hurdles to success? (Marketing, Technical, Funding, Government regulation, other?)
  • The failure of federation and how to move on. What do we keep, and what do we abandon.
  • Browsers and large web estates have agendas that do not match with my interests
  • Which protocols to use when designing new services and systems? Which solutions are on the way out and which ones are coming in? How do online identities, authentication and data privacy mix?