IIW 19 Proposed Topics
From IIW
What topics are you planning to present about or lead a discussion about at this IIW?
- Gluu Server Demo: New chroot and docker installs! Also .rpm and .deb's for mod_ox
- AXN
- M2M communication, TLS
- "co-operative identity personal cloud"
- Factors that influence a consumer's willingness to participate within the exchange of their personal information (doctoral research).
- UMA interop
- Open Reputation Framework based on block chain
- trust frameworks, provenance
- The Cynja's work with the Respect Network.
- Identity & The Internet of Things
- VRM+CRM
- Nameless authentication
- TIOMAMS (The Internet Of Me And My Stuff)
- User-Managed Access (UMA) Patient-centric health data sharing
- OpenID Connect interop testing and certification
- Validating identity against citizenship databases.
- Identity-based Credentials
- Identiity, Security, Internet of things, etc
- The intersection of VRM and CRM
- How a Trusted Execution Environment (TEE) can be used to implement cryptographic credentials
- Mozilla listens to IIW
- Mozilla and Intention
- Subscribe2Web
- User Personalization and Firefox
- Business and technology frameworks for creating IdPs; especially those that are privacy respecting.
- Known and how lightweight, easily interoperable technologies can help people represent themselves online as well as interact with existing identity frameworks.
- Personal APIs - Why Brands should support them AND Family IDs - sharing is caring
- "Funding the Web other than through advertising Privacy"
- Mozilla VRM pilot projects 2015
- COPPA
- "Identity Management Enterprise PKI"
- Interfederation - a report from the Internet Society's workshop data surveillance, commercial exploitation in education; FERPA and HIPAA; third party doctrine
- "Native Applications Threat-Based Authentication"
- UMA and OAuth for IoT
- User personalization
- personal clouds
- Data stewardship, Self-regulating communities, or Open data systems
- maybe some oauth2 stuff
- User consent, experience, numbers and stats (>500.000 users, >25 mio authentications)
- What is a federation? Delegated tasks, responsabilities, liabilities etc. of the federation operator
- Federation: stats and dollars. What we can learn from cost estimates and real time statistics.
- How do we liberate our social graph data from Facebook and Linkedin; also how do we integrate current behaviors into a new paradigm (e.g. Add me on FB/LI/email-me/etc)?
What are you hoping to learn about or hear a presentation about at IIW?
- industry directions for healthcare and identity management.
- Internet identity, identity protocols, security in authentication.
- OpenID Connect, UMA and VRM Deployment
- UMA
- latest solutions, framework for management the conversation.
- Webfinger, PKI, SCIM
- Personal cloud advances
- indieweb
- OpenID connect, ontology of personal data
- Market trends in area of privacy
- Zero Knowledge sync & backup
- VRM tools, XDI
- Safe social login, e.g. "Login with Respect"
- What Mozilla's working on, synergies with other work going on
- Progress in verticals: health, real estate, payments
- Authorization Privacy Consent Mobile
- OpenID Connect adoption
- I'm a beginner interested in everything
- Any new identity standards and protocols.
- Mobile SSO
- Identiity management and security around it
- OpenID connect, ontology of personal data
- frameworks and examples of identity systems
- Existing solutions, funding models
- Adoption of distributed identity systems by the big silos AND services that make Bring Your Own Identity a possibility - preferably with a self hosting option.
- scim
- Security assessment methods for SSO platforms
- The latest on UMA for the enterprise
- Maturity of OAUTH, OpenID, UMA
- New AUTH trust models
- Next-Gen Identity
- Identity management
- Current strategies for balancing identity and privacy
- Collaboration of IDPs against fraud and compromise.
- "Identity Management IaaS Single-sign-on mechanisms as provided by OAuth, Kerberos, or SAML."
- what NSA means, do users really care about identity security
- IndieWeb
- NSTIC, FCCX, & FICAM; FIDO
- What does "good" look like in an identity ecosystem?
- help from the white hats!
- personal clouds
- Simplifying complex trust relationships
- Economics of identity
- SCIM, IoT
- VRM, identity aggregation transaparency, opt-in and opt-out
- IoT, UMA, OpenId, new standards, something new
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
- scalability and complying with industry standards
- Trust & Accountability between persons, companies, governments - and things.
- Stop talking cloud
- Bringing more meaning to personal cloud and the equivalent
- Reactive vs. proactive consent Profiles for OAuth and OAuth-based technologies for solving the next wave of challenges"
- OpenID Connect adoption
- Cryptographic protocols for validating unique personhood while maintaining anonymity.
- Mobile
- What is an Identity. How do you balance usability with security? What about Internet of things? Best of standards etc
- What are the use cases that make this desirable? What real-world user research has taken place? What are the realistic business models for these technologies?
- What's real federation? Is "trust elevation" going to work? What will replace "levels of assurance?"
- How we bring the message to the masses (consumers and those who only read hacker news - the developers who need to implement)
- What should we replace password authentication with?
- How to eliminate passwords.
- Want to learn and discuss about account abuse, how my peers tackle and how we can work together to learn and benefit from each other
- How to make best use of the wide variety of identity sources that are now available
- How can we share data to protect our users in a way that respects privacy concerns?
- "IDaaS with Privacy By Design priciple Usable Security UMA"
- Delegated publication preferences
- I'm reengaging and so am coming to hear how the critical questions have changed. Although certificate authorities and DNS security gives me a chill.
- Can new technologies safeguard education records and "protected" health information"
- How to move away from centralized IAM (with a priori access control decisions) to a more distributed model that leverages existing business trust relationships... All while keeping it light, secure, available, etc..
- What are best/good practices to manage data fidelity in user-centric systems?