IIW 18 Proposed Topics

From IIW

What topics are you planning to present about or lead a discussion about at this IIW?

  • Authentication
  • Privacy enabled identity solutions
  • Not sure yet. Need to think about this
  • Open Architectures for Personal Clouds
  • Project Eureka
  • XDI and Personal Clouds
  • Diversity, interoperability and standards: how the VRM supply community can work together
  • Extreme Relevancy
  • OpenID Connect, JWT, JOSE, Proof-of-Possession (PoP)
  • Privacy manager deployments and adaptation to other attribute flows
  • Trustmarks 2.0
  • Points of Individual Control in Identity Systems, Outsourcing Moral Authority
  • Derived credentials, secure and private mobile messaging, secure enterprise mobile SSO
  • Use cases for nymity in civic identity systems
  • FreedomBox
  • Security and the Internet of Things
  • Cryptoledgers as persistent namespaces, and maybe I'll think of something else as well
  • Personal data stores and big data in healthcare.
  • Internet of Things
  • Payments
  • Personal Clouds
  • Security
  • Data and Privacy of Deceased
  • Mobile Identity
  • Big data in state longitudinal data systems (education) and all payer all claims databases (health care). Fair Information Policies and Practices. Privacy Bill of Rights. wireless mesh networked distributed cloud
  • If possible I'd like to talk about research in distributed, network, and peer-to-peer economies with a focus on identity. Also, I may talk about work at the W3C Web Payments CG.
  • Indieweb, indieauth, fragmentions
  • Internet and advertising technologies
  • Using identity to protect APIs
  • Using social identity for business (BYOI)
  • Respect Network, personal clouds, XDI
  • Anonymity

What are you hoping to learn about or hear a presentation about at IIW?

  • NSTIC, FIDO etc...
  • OpenID Connect, Accountchooser, UMA VRM
  • New ideas and updates from many areas
  • Udate on E-ID initiatives
  • Personal Clouds
  • sharing experience with others about actual technology and standards implementations
  • VRM, personal clouds
  • ROI of VPI
  • Identity protocol work
  • OpenID Connect
  • Standards, OpenID, mobile, authN, authZ, NSTIC,
  • Identity
  • Balancing Zero Trust with Cloud Identity.
  • Private compute platforms, unhosted apps, non-sharing uses of personal data
  • Open Connect, personal cloud, credentials
  • Authorization Management. Hybrid or Blended Enterprise/Internet Identity scenarios. A read on the level of interest in Identity in various industries.
  • Progress with personal cloud technology, user-centric ID, federated ID authentication
  • Personal data stores that any muggle can setup and use.
  • OAuth2 and OpenID Connect adoption, provisioning and SCIM 2.0.
  • Meeco
  • Indiebox, OwnCloud & similar self-hosting options
  • Projects in the market *now*.
  • Identity and users' perception
  • OpenID, FIDO, mobile trends
  • How to slow down BIG DATA and the speeding internet train before we all become victims of identity theft (as my husband and I have this tax season)!
  • distributed cloud networking and storage
  • All of them. Current peripheral thinking is on the developing world, technology/behavioral leapfrogging and the opportunities for Identity and VRM in the non-western world (where is our M-Pesa moment?).
  • What security aspects go into identity.
  • Ending passwords
  • Open ID Connect, SAML, Device identity
  • Network and absorb from passionate thought leaders.
  • VRM, first-person technology
  • The state of the human-driven web

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW.

  • Internet of things
  • Personal Clouds
  • Ways in which we can work with others in this space
  • Does an ID document has to play a role in online ID verification
  • Unlocking VRM market
  • Privacy and technology in practice
  • Case Studies
  • OpenID Connect adoption, Proof-of-Possession (PoP)
  • Consent, attribute management, linkability
  • proof of knowledge
  • 2FA, MFA
  • Balancing Zero Trust with Cloud Identity.
  • What are the moral hazards of identity systems?
  • Where will individual/user identity & credentials be authoritatively bestowed? How will individuals control PII and 3rd party collection of behavior data across networks be realized? How will implicit and explicit individual data attributes evolve?
  • What options are available for user-centric ID online? Which options are likely to be the most widely supported?
  • Is there any consensus on the use case and requirements for pseudo/anonymous identity?
  • Enrollment and lifecycle management of identities.
  • How do we assure that our intellectual property (specifically our identity!) is not being give (on the taxpayer dime) to corporations and their third party vendors? How do we evaluate proprietary software for compliance with privacy laws like FERPA and HIPAA and consumer protection laws? Can we create better ways to protect our privacy while keeping the internet accessible? Is the Computer Matching and Privacy Protection Act of 1988 magical thinking in this day and age of hacking and back-doors to data?
  • reputation management
  • Contact manager
  • Ditto to the same thing that I would present about. I hope to learn something and make important connections.
  • Avoiding silos and monoculture
  • How we commercialize it and lead the change we want.
  • How to use identity to protect APIs
  • How to use social identity for business (BYOI)
  • How to make it real
  • Anonymity/pseudonymity linked to identity