IIW 15 Proposed Topics

From IIW

Proposed Topic List for IIW #15

What topics are you planning to present about or lead a discussion about at this IIW?

  • SCIM
  • Robust Security for Mobility Strong authentication for web
  • OpenID Connect (3)
  • transparency
  • Publish Trust Framework,
  • APA Trust Lab
  • OAuth,
  • Decentralized Data Sharing Using XDI
  • SCIM
  • OpenID Connect
  • OpenID Connect
  • OAuth, OpenID Connect
  • Advancing the Personal Cloud architecture.
  • OpenID Connect, OAuth, JOSE, JWT
  • Cloud Foundry or Activity Streams
  • OpenID Connect, Privacy, Smart Cards, Security in IdM, Privacy preserving IdM
  • Identity verification
  • Respect Network Founding Partners
  • Connect.Me Public Beta
  • Personal Clouds - Getting Real
  • XDI Connectors
  • Healthcare need for a national patient identifier
  • Enterprise OAuth Implementation
  • SCIM
  • Privacy Certification - Health Record Banking
  • Account Chooser
  • VRM
  • AAMVA (NSTIC) pilot
  • None
  • Backplane
  • Backplane
  • CRM 2.0 -> is this VRM?
  • How do we reinsure users about PDS security3) My identity and settings above browsers and Apps
  • XDI, Respect Network, FreedomBox
  • attribute authorities, trust frameworks,
  • online reputation
  • Smartcard security, OpenID
  • Investor and Entrepreneur Meetup
  • What does "fiduciary duty" mean to an infomediary?

What are you hoping to learn about or hear a presentation about at IIW?

  • Progress on the legal layer of 'trust' and identity, or at least a working roadmap
  • OAuth (3)
  • OpenID Connect (5)
  • SAML,
  • SCIM (3)
  • UMA,
  • User Privacy,
  • 22 Ways Skype's Identity System Sucks
  • VRM
  • Mozilla BrowserId
  • Identity technologies
  • open systems
  • attributes,
  • APIs,
  • privacy,
  • NSTIC,
  • NSTIC IDESG,
  • RPs,
  • futures,
  • innovation
  • The practicality, utility, pitfalls, and implications of community personas (+1)
  • OAuth, OpenID Connect, SAML, SCIM
  • OpenIDConnect, UMA, OAuth2, User Privacy,VRM
  • Mozilla BrowserId
  • SCIM
  • VRM
  • openid, oauth,
  • Big Data and Identity management.
  • Identity management and privacy (and VRM).
  • How VRM and CRM work together.
  • Examples of VRM solutions working with businesses
  • IdMaaS State of the Art and way forward, security for IdM in the cloud, smart card solutions
  • NSTIC Progress
  • oauth 2 mac tokens
  • Innovations
  • OAuth 2.0, SAML, OpenID Connect, next-gen web-of-trust
  • XDI & KRL Standards. VRM business models.
  • OAuth 2, OpenID Connect, SCIM,
  • OpenID Connect, OAUTH
  • OpenID Connect, OAuth
  • Progress in personal information ecosystems
  • AccountChooser, OpenID Connect
  • egal issues around a data cooperative of sorts
  • OpenID Connect, OAuth
  • OAuth security, authorization use cases, authorization security
  • current projects, protocols, standards and frameworks for online identity, privacy, data sharing, and reputation, including: OAuth, OpenID Connect, SAML, SCIM, as well as trust frameworks like NSTIC. Also, perspectives on Educause, Internet2, InCommon, CSG
  • OpenID ConnectOAuth 2.0
  • OpenID 2.0OAuth
  • NSTIC, economics of privacy
  • establishing identity, marketing personal data, business models for brokering agents
  • Standardization/Security/A brand project example/
  • online reputation
  • OpenID Connect, IdMaaS, OAuth
  • Current developments in the PDE

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW.

  • Should the identity and personal data communities enagage the larger privacy and IAM professional communities? If so, how?
  • Is NSTIC's tempo right?
  • Establishing and managing end user privacy
  • How can we securely federate identity providers?
  • paulmadsen
  • The important ones.
  • Establishing and managing end user privacy
  • paulmadsen
  • The important ones.
  • Moving the standards forward
  • Why is a 'v' all that stands between privacy and piracy?
  • Who's really doing it. Where is it working? Who are the key vendors and stakeholders who will drive it. What are the roadblocks and where are they being overcome.
  • Interoperability of the personal data ecosystemApps for the personal data ecosystemWhat's the MVP for a personal cloud?
  • How to prevent fraud in healthcare while allowing users to control attributes of their own identity
  • What is the right balance between convenience and security?
  • How to secure personal data.
  • Will NSTIC funding continue in a Romney administration?
  • convenient identity verification for consumers; capturing and enforcing user access permissions for their own data
  • trust frameworks
  • Identity Verification
  • How to design a secure user-centric identity scheme?
  • Security, PII,
  • Identity and privacy challenges at the intersection of fixed and mobile user experiences.
  • Especially interested in Person-to-Person selective conveyance of personal information.
  • My identity and settings above browsers and Apps
  • contextual privacy
  • online reputation
  • Education around PD and security
  • The cross between enterprise identity and social login based access.