IIW 16 Proposed Topics
From IIW
What topics are you planning to present about or lead a discussion about at this IIW?
- Update the conference about our company, our learnings and plans in the area of Personal Information Management.
- Cryptographic authentication on mobile devices
- OAuthOpenIDAPI driven developmentHawk
- OpenID Connect, OAuth, JWT, JOSE
- behavior-based model for digital interactions
- OpenID Connect / OIDF Promotion
- Personal Cloud IdentityPersonal Cloud Architecture
- Maybe something around CIFER (Community Identity Framework for Education and Research), in order to elicit discussion and feedback from * IIW participants outside the R&E community.
- Trustable identity, 2-factor authentication, mobile authentication
- Management of reputation information in a non-consensus context.Legal, cultural and technical paradigms for balancing privacy concerns with the transparency needed for a well functioning
- reputation based regulatory system.
- Gratzi, an unhosted unmoney value system for personal clouds.
- I need to think about it J
- Our pilots and CPIM
- Durable Trust - what makes an identity, especially one associated with stored data, trustworthy over time?
- federated identity management
- Current academic appraoches to online identity and privacy including recent U.S. survey results.
- Open Mustard Seed
- Trust Frameworks
- Publicly Discoverable ePayment Address(es)
- OAuth2 web session bootstrappingAre we losing the identity federation war?
- SCIM
- Talk about open 2nd factor crypto device we are developing for web use
- Trust, reputation, identity fraud
- Participate in OpenIDConnect Working Groups and related discussions
- elimination of passwords
- universal identity
- The future of mobile in identity.
- TBD
- Identity Resolution
- personal clouds
- Strong two-factor authentication
- authentication
- Personal Cloud Networking
- Patient ID for health information exchange
- VRM and creating certainty of demand
- OpenID Connect, UMA, SAML
- Personal cloud business models
- PICOs, Personal Clouds
- UMA
- Fixing patentsID binding
What are you hoping to learn about or hear a presentation about at IIW?
- Hear from other companies involved in this space about what is working, what is not, new thingking etc.
- Interesting uses and applications for the various open auth protocols.Interchange between open protocols and proprietary protocols.
- Implementations of OpenID Connect, OAuth, JWT, JOSE
- ICAM, NSTIC
- are any general purpose trust framework efforts showing promise
- OAuth 2.0 Dynamic Client Registration,OAuth 2.0 Resource Set Registration
- Account ChooserBackplaneUMAPractical Implementations of OpenId Connect
- Real world stories, Privacy in practice, new trends
- just curious
- OAuth, OpenID Connect, personal data stores, NSTIC, mobile,
- Dynamic authentication NSTIC OIX UKIdentity proofing Identity Management Standards
- OAuth2 scenarios Attribute exchange
- federated identity, attribute assertion, policy control
- OAuth and OpenID Connect happenings. SAML responses to those happenings. Things Attribute Providers should be doing to integrate into the identity ecosystem. UX/UI patterns for identity.
- Authentication protocols - Open ID, Open ID Connect
- Technical methods for storing data and descriptions of relationships between pieces of data in a distributed and non-consensus system.
- Particular interest in technical methods for responsible management of multiple conflicting ontologies while minimizing latency concerns -- some brief thoughts on the subject have to do with varying scopes of a search -- searching only a subset of the data (let's assume it is a graph) in most instances.
- Personal Cloud technology/architecture developments.
- Developments on trust frameworks. Step up authentication. Standardization development on personal data stores, user centric attribute release.New initiatives in mobile and social authentication.
- Universal login, storing personal data, security
- Getting back in touch with ID community
- schemas for attributes
- Peer to peer and distributed trust models as envisioned for pClouds, VRM, NSTIC, etc.
- VRM, Personal Clouds
- Commercial approaches to the online reputation and data management.
- 1. Technology: OpenID Connect, new protocols and existing protocol enhancements 2. Topics around identity provider discovery 3. TV-Everywhere topics 4. Personal data & personal cloud 5. Anything that's interesting
- Future of
- OpenId Connect -Oauth 2
- Identity Attribute Exchange Networks
- Personal Clouds!
- SCIM, UMA, Authentication
- More insights on how to make federation take off more
- Trust Framework Interoperability
- Trust, reputation, identity fraud
- SCIM, OAuth2
- Authentication, Authorization, and Identity issues in Web and Mobile Applications
- standards for identity and account info exchange- what others are doing in identity simplification
- Paths to adoption for new identity platforms
- Commercials of integration of personal clouds
- product strategy input, validation
- Evolution of Indentity in the enterprise.
- personal cloud security standards
- XDI, VRM, User Centric IdM
- VRM and creating certainty of demand
- PICOs, Personal Clouds
- OpenID Connect
- ID federation
- Health care IT
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
- What standards are there now, what standards are emerging, what standards do we want t oget behind and support? Is there growth in uptake of User centric services? What do we need to do to accelerate growth?
- Adopting simple enough protocols that they actually become ubiquitous
- are any general purpose trust framework efforts showing promise
- mobile payments
- How to create momentum for OpenId, UMA, PDEC and VRM
- Privacy in practice
- when, where, why and how
- state of the user-id community in North America, Europe, Asia
- Maybe this: personal data vs enterprise data and the user experience. Who controls my data?
- Potential for ORCID as IdP
- How do we couple the form of credential (smartcard, etc.) from the identity itself?
- Distributed Data Storage Methods for describing relationships Methods for enabling a community of users to self regulate and self co-ordinate despite a lack of complete consensus about not only who to trust and what attributes matter, but even the most fundamental elements of meaning -- i.e. what a specific entity "is."To unpack that a little bit, I'm interested in discuss the technical methods by which a user can disagree with much of what another user creates, yet isolate the components that are useful/relevant to her own experience and can make use of (whether by subscription, remix, republication etc...) those elements in ways that are relevant to her.
- What sorts of products are well suited for distributed personal cloud systems, and how should we build them.
- Privacy issues.Overall security. Role of government irt role of private sector.
- current initiatives (industry, government, etc.) around identity and/or authentication
- schemas for attributes
- Trust durability, non-repudiation, revocation, detection and correction of breaches.
- VRM Business Models
- models on organizational collaboration
- How this industry has evolved, on-going ethical/technical questions, opportunities and limits of these types of interventions.
- Accreditation of Identity Providers...legal issues surrounding provenance & liability for the accuracy of identity attributes
- Authentication, Personalization, and Security
- Balancing privacy with profitability
- Working to make personal clouds a "single" cloud for the person
- how we can build a globally interoperable personal cloud network
- Identity and trust. How do we create an open trusted identity framework? How can that feed into a global web of trust to enrich the content of the web and enable us to navigate more effectively?
- Solution patterns for eliminating passwords
- Controls to share data via identity as conveniently as email
- what is the end user experience that establishes trust and gives consumers the right amount of choice without overwhelming them with detail?