IIW 23 Proposed Topics
From IIW
What topics are you planning to present about or lead a discussion about at this IIW?
- Available to address the convergence of tech and notary practice, if people would like to hear.
- Capabilities & IOT Security
- FastFed
- OIDC Identity federations
- Microservice Security
- Alternatives to knowledge-based verification for online identity proofing
- personal data silos for pClouds
- Managing external identity from partners/customers
- Authentication Assurance Levels (AAL), Identity Assurance Levels (IAL), Authentication Assurance Requirements (AAR), Identity Assurance Requirements (IAR), * * Transaction Intent Verification (TIV). Why One Time Passwords (OTP) represent a higher assurance Knowledge Factor challenge, and not a Possession Factor challenge. How to incorporate Risk Scores and which user is trying to perform what operation against which data type into a dynamic authentication experience-- high friction for high risk, low friction for low risk.
- Blockchain & identity, IoT Machine identity
- Potential non-technical pathways to identity integrity, security and privacy for distributed data and identity systems.
- Identity and security issues in financial services
- using correlation to describe identity systems
- Consent Reciepts, information Sharing Contracts
- I'm a follower
- Blockchain Reputation and Identity.
- Kantara OTTO Federation API progress
- Decentralized verification that isn't about Blockchain; Identity in the context of credit analysis; Personal data in fintech; Organic personal data contracts and consent
- PDEC, Protection of Personal Data, the emerging Personal Data Ecosystem
- Mainly listen this time
- Future of Identity
- Self-sovereign identityDistributed Ledger TechnologyThe Sovrin NetworkThe Sovrin FoundationThe Golden Triangle
- nothing specific on mind for now. This is my first IIW and so would like to participate instead of lead for now
- CEN Workshop 84 on a 'Self-Sovereign Identifier(s) for Personal Data Ownership and Usage Control' (CEN WS ISÆN) http://www.cen.eu/work/areas/ICT/Pages/WS-IS%C3%86N.aspx
- Digital identity in emerging markets
- Verifiable Claims
- First one--I'm not sure
- Distributed Session Management
- HIE of One Patient-Centered Health Record
- Given this is my first attendance, I'm unsure.
- Emerging Identity protocols, like UMA and Open ID Connect•Blockchain & Identity •OAuth security / Being an OAuth provider•Alternatives to SSL•IoT (The Internet of Things)•OIDC vs SAML / OIDC OP Testing•IoM (The Internet of Me)•Privacy in the Age of Surveillance
- JLINC, VRM, Customer Driven Leads
- benefits of behavioral biometrics on authentication
- Sociological self-sovereign identity theory
- SET Security Events
- MyData consent management architecture / OAuth profile
- Identity Federation
- Digital Identity Blockchain IdentityBiometric binding
- MFA/u2F 101 session
- Analytics as enabler of identity.
- Personal Identity HostingSharded Personal Identity Information Storage
- I am coming to learn and listen and network.
- improved privacy in high assurance identity transaction; state of the art in attribute verification.
- Maybe (in decending order): W3C Verifiable Claims, Decentralized Identifiers, Linked Data Signatures, Cross-domain and Privacy Preserving Identifiers
What are you hoping to learn about or hear a presentation about at IIW?
- Learn about the state of identity on the web.
- identity solutions, blockchain, opportunities to enhance notary and legal services
- What's new
- self sovereign technologies
- OIDC, SAML, FastFed
- IoT
- SCIM, OIDC
- Blockchain, biometrics for identity proofing/authentication
- Differences between identification and identity
- Updates on standards efforts (UMA, SCIM2, etc) + native app SSO on mobile
- Blockchain & identity, IoT Machine identity, OIDC, OAuth, SAML.
- Current challenges and concerns of identity stakeholders
- How to establish flexible security infrastructure
- UN SDG16.9
- Smart Identities
- Privacy
- Personal APIs
- The taxonomy of identity; Consent terms; Update on UMA; Commercializing technologies, protocols, and techniques that are vital to preserving the principles of agency we all care about.
- GDRP, JLINC, NSTIC, Cheddar,
- standards, authentication
- Talk to FAPI WG members
- Tying an internet identity to a real person
- Use cases for the Golden Triangle
- What Identity means to various orgs. Hoping to understand what Identity problems do other organizations have and whats there approach towards their identity solutions.
- I'm coming by to see some old friends
- UMA, OAuth
- OIDC
- Best practices for mobile authentication, OAuth for mobile, intersection of identity and MDM
- Token Binding
- decentralized, or self-sovereign identity management and challenges, current technologies and products.
- IAM for Customers. Data at Rest and Transit
- Challenges (and solutions) to identity/authentication pains in an enterprise environment
- Blockchain Identity - how realistic it is?
- trends in IAM and E to E encryption
- Identity protocol development
- Identity Landscape, blockchains and potential applicability to healthcare
- RISC Events
- Consent management, distributed ledger technologies (DLT)
- Open ID connect and federation
- Emerging standards and challenges for implementing digital identity
- How will identity get adopted commercially
- So many things, so little time
- New Trends in user-centric and privacy-enabling identity management
- OAuth, Open ID Connect, UMA, blockchain
- Identity issues in financial services. Blockchain/distributed ledger. Self-sovereign ID
- adoption in privacy enhancing high assurance credentials; Attribute verification technologies
- UMA, JOSE signature stack, self-sovereign identity, human-centric identity
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
- "Impact of DHT. Impact of W3C Verifiable Claims. Progress on standardized identity."
- electronic notarization, uberization of services, and more
- user friendly blockchain ecosystem
- Setting up SSO with SCIM user provisioning
- Common Ontologies and normalized data
- concerns about the impact of new European privacy laws taking effect in 2017.
- Current state of machine identity (certificate based authentication) & future direction?"
- Future of Blockchain & Sovereign identity?Current state of machine identity (certificate based authentication) & future direction?
- How to measure various degrees of integrity of distributed, socio-techical information systems.
- Should we require our users to download our app in order to have strong authentication? Does a stronger authentication method improve security overall if it is optional/advice vs. mandatory/obligatory?
- distributed, privacy enhancing correlation management
- Privacy, Sovereignty, and Security
- Awareness of PDEC, of Project VRM,
- In the financial environment
- IoT and identity. Biometrics. Claiming an identity. Merging provisional identities.
- The difference between user-centric and self-sovereign.
- http://www.cen.eu/work/areas/ICT/Pages/WS-IS%C3%86N.aspx
- How to balance security and usability on mobile? How to evaluate the feasibility of "big data" identity concepts like risk based authentication or authentication based on behavioral biometrics?
- Sovereign Identity
- how would an existing product incorporate self-sovereign identity solution?
- How to secure the data and allow user control
- What value do users derive from self-representation online?
- How do we enable sovereign identity and still make this commercially viable and useful for counterparties
- Mechanics of how and where data will be stored. Strategies to drive adoption.
- Individual-centric approach to identity vis-a-vis sovereign identity
- Differentiation between identity and entitlement; use of hardware-authentication
- improving SSO and permission controls for users over their data
- How do we get to a world where the user has control over their data? What stands in the way? What can financial institutions, media, technology do to help?
- will decentralized identity take off, and what's really needed for it to do so?
- How can we bridge the gap between the JOSE JWT community, self-sovereign identity community, cross-origin identifier and same-origin identifier communities.