IIW 19 Proposed Topics

From IIW

What topics are you planning to present about or lead a discussion about at this IIW?

  • Gluu Server Demo: New chroot and docker installs! Also .rpm and .deb's for mod_ox
  • AXN
  • M2M communication, TLS
  • "co-operative identity personal cloud"
  • Factors that influence a consumer's willingness to participate within the exchange of their personal information (doctoral research).
  • UMA interop
  • Open Reputation Framework based on block chain
  • trust frameworks, provenance
  • The Cynja's work with the Respect Network.
  • Identity & The Internet of Things
  • VRM+CRM
  • Nameless authentication
  • TIOMAMS (The Internet Of Me And My Stuff)
  • User-Managed Access (UMA) Patient-centric health data sharing
  • OpenID Connect interop testing and certification
  • Validating identity against citizenship databases.
  • Identity-based Credentials
  • Identiity, Security, Internet of things, etc
  • The intersection of VRM and CRM
  • How a Trusted Execution Environment (TEE) can be used to implement cryptographic credentials
  • Mozilla listens to IIW
  • Mozilla and Intention
  • Subscribe2Web
  • User Personalization and Firefox
  • Business and technology frameworks for creating IdPs; especially those that are privacy respecting.
  • Known and how lightweight, easily interoperable technologies can help people represent themselves online as well as interact with existing identity frameworks.
  • Personal APIs - Why Brands should support them AND Family IDs - sharing is caring
  • "Funding the Web other than through advertising Privacy"
  • Mozilla VRM pilot projects 2015
  • COPPA
  • "Identity Management Enterprise PKI"
  • Interfederation - a report from the Internet Society's workshop data surveillance, commercial exploitation in education; FERPA and HIPAA; third party doctrine
  • "Native Applications Threat-Based Authentication"
  • UMA and OAuth for IoT
  • User personalization
  • personal clouds
  • Data stewardship, Self-regulating communities, or Open data systems
  • maybe some oauth2 stuff
  • User consent, experience, numbers and stats (>500.000 users, >25 mio authentications)
  • What is a federation? Delegated tasks, responsabilities, liabilities etc. of the federation operator
  • Federation: stats and dollars. What we can learn from cost estimates and real time statistics.
  • How do we liberate our social graph data from Facebook and Linkedin; also how do we integrate current behaviors into a new paradigm (e.g. Add me on FB/LI/email-me/etc)?

What are you hoping to learn about or hear a presentation about at IIW?

  • industry directions for healthcare and identity management.
  • Internet identity, identity protocols, security in authentication.
  • OpenID Connect, UMA and VRM Deployment
  • UMA
  • latest solutions, framework for management the conversation.
  • Webfinger, PKI, SCIM
  • Personal cloud advances
  • indieweb
  • OpenID connect, ontology of personal data
  • Market trends in area of privacy
  • Zero Knowledge sync & backup
  • VRM tools, XDI
  • Safe social login, e.g. "Login with Respect"
  • What Mozilla's working on, synergies with other work going on
  • Progress in verticals: health, real estate, payments
  • Authorization Privacy Consent Mobile
  • OpenID Connect adoption
  • I'm a beginner interested in everything
  • Any new identity standards and protocols.
  • Mobile SSO
  • Identiity management and security around it
  • OpenID connect, ontology of personal data
  • frameworks and examples of identity systems
  • Existing solutions, funding models
  • Adoption of distributed identity systems by the big silos AND services that make Bring Your Own Identity a possibility - preferably with a self hosting option.
  • scim
  • Security assessment methods for SSO platforms
  • The latest on UMA for the enterprise
  • Maturity of OAUTH, OpenID, UMA
  • New AUTH trust models
  • Next-Gen Identity
  • Identity management
  • Current strategies for balancing identity and privacy
  • Collaboration of IDPs against fraud and compromise.
  • "Identity Management IaaS Single-sign-on mechanisms as provided by OAuth, Kerberos, or SAML."
  • what NSA means, do users really care about identity security
  • IndieWeb
  • NSTIC, FCCX, & FICAM; FIDO
  • What does "good" look like in an identity ecosystem?
  • help from the white hats!
  • personal clouds
  • Simplifying complex trust relationships
  • Economics of identity
  • SCIM, IoT
  • VRM, identity aggregation transaparency, opt-in and opt-out
  • IoT, UMA, OpenId, new standards, something new


What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • scalability and complying with industry standards
  • Trust & Accountability between persons, companies, governments - and things.
  • Stop talking cloud
  • Bringing more meaning to personal cloud and the equivalent
  • Reactive vs. proactive consent Profiles for OAuth and OAuth-based technologies for solving the next wave of challenges"
  • OpenID Connect adoption
  • Cryptographic protocols for validating unique personhood while maintaining anonymity.
  • Mobile
  • What is an Identity. How do you balance usability with security? What about Internet of things? Best of standards etc
  • What are the use cases that make this desirable? What real-world user research has taken place? What are the realistic business models for these technologies?
  • What's real federation? Is "trust elevation" going to work? What will replace "levels of assurance?"
  • How we bring the message to the masses (consumers and those who only read hacker news - the developers who need to implement)
  • What should we replace password authentication with?
  • How to eliminate passwords.
  • Want to learn and discuss about account abuse, how my peers tackle and how we can work together to learn and benefit from each other
  • How to make best use of the wide variety of identity sources that are now available
  • How can we share data to protect our users in a way that respects privacy concerns?
  • "IDaaS with Privacy By Design priciple Usable Security UMA"
  • Delegated publication preferences
  • I'm reengaging and so am coming to hear how the critical questions have changed. Although certificate authorities and DNS security gives me a chill.
  • Can new technologies safeguard education records and "protected" health information"
  • How to move away from centralized IAM (with a priori access control decisions) to a more distributed model that leverages existing business trust relationships... All while keeping it light, secure, available, etc..
  • What are best/good practices to manage data fidelity in user-centric systems?