IIW 23 Proposed Topics

From IIW

What topics are you planning to present about or lead a discussion about at this IIW?

  • Available to address the convergence of tech and notary practice, if people would like to hear.
  • Capabilities & IOT Security
  • FastFed
  • OIDC Identity federations
  • Microservice Security
  • Alternatives to knowledge-based verification for online identity proofing
  • personal data silos for pClouds
  • Managing external identity from partners/customers
  • Authentication Assurance Levels (AAL), Identity Assurance Levels (IAL), Authentication Assurance Requirements (AAR), Identity Assurance Requirements (IAR), * * Transaction Intent Verification (TIV). Why One Time Passwords (OTP) represent a higher assurance Knowledge Factor challenge, and not a Possession Factor challenge. How to incorporate Risk Scores and which user is trying to perform what operation against which data type into a dynamic authentication experience-- high friction for high risk, low friction for low risk.
  • Blockchain & identity, IoT Machine identity
  • Potential non-technical pathways to identity integrity, security and privacy for distributed data and identity systems.
  • Identity and security issues in financial services
  • using correlation to describe identity systems
  • Consent Reciepts, information Sharing Contracts
  • I'm a follower
  • Blockchain Reputation and Identity.
  • Kantara OTTO Federation API progress
  • Decentralized verification that isn't about Blockchain; Identity in the context of credit analysis; Personal data in fintech; Organic personal data contracts and consent
  • PDEC, Protection of Personal Data, the emerging Personal Data Ecosystem
  • Mainly listen this time
  • Future of Identity
  • Self-sovereign identityDistributed Ledger TechnologyThe Sovrin NetworkThe Sovrin FoundationThe Golden Triangle
  • nothing specific on mind for now. This is my first IIW and so would like to participate instead of lead for now
  • CEN Workshop 84 on a 'Self-Sovereign Identifier(s) for Personal Data Ownership and Usage Control' (CEN WS ISÆN) http://www.cen.eu/work/areas/ICT/Pages/WS-IS%C3%86N.aspx
  • Digital identity in emerging markets
  • Verifiable Claims
  • First one--I'm not sure
  • Distributed Session Management
  • HIE of One Patient-Centered Health Record
  • Given this is my first attendance, I'm unsure.
  • Emerging Identity protocols, like UMA and Open ID Connect•Blockchain & Identity •OAuth security / Being an OAuth provider•Alternatives to SSL•IoT (The Internet of Things)•OIDC vs SAML / OIDC OP Testing•IoM (The Internet of Me)•Privacy in the Age of Surveillance
  • JLINC, VRM, Customer Driven Leads
  • benefits of behavioral biometrics on authentication
  • Sociological self-sovereign identity theory
  • SET Security Events
  • MyData consent management architecture / OAuth profile
  • Identity Federation
  • Digital Identity Blockchain IdentityBiometric binding
  • MFA/u2F 101 session
  • Analytics as enabler of identity.
  • Personal Identity HostingSharded Personal Identity Information Storage
  • I am coming to learn and listen and network.
  • improved privacy in high assurance identity transaction; state of the art in attribute verification.
  • Maybe (in decending order): W3C Verifiable Claims, Decentralized Identifiers, Linked Data Signatures, Cross-domain and Privacy Preserving Identifiers


What are you hoping to learn about or hear a presentation about at IIW?

  • Learn about the state of identity on the web.
  • identity solutions, blockchain, opportunities to enhance notary and legal services
  • What's new
  • self sovereign technologies
  • OIDC, SAML, FastFed
  • IoT
  • SCIM, OIDC
  • Blockchain, biometrics for identity proofing/authentication
  • Differences between identification and identity
  • Updates on standards efforts (UMA, SCIM2, etc) + native app SSO on mobile
  • Blockchain & identity, IoT Machine identity, OIDC, OAuth, SAML.
  • Current challenges and concerns of identity stakeholders
  • How to establish flexible security infrastructure
  • UN SDG16.9
  • Smart Identities
  • Privacy
  • Personal APIs
  • The taxonomy of identity; Consent terms; Update on UMA; Commercializing technologies, protocols, and techniques that are vital to preserving the principles of agency we all care about.
  • GDRP, JLINC, NSTIC, Cheddar,
  • standards, authentication
  • Talk to FAPI WG members
  • Tying an internet identity to a real person
  • Use cases for the Golden Triangle
  • What Identity means to various orgs. Hoping to understand what Identity problems do other organizations have and whats there approach towards their identity solutions.
  • I'm coming by to see some old friends
  • UMA, OAuth
  • OIDC
  • Best practices for mobile authentication, OAuth for mobile, intersection of identity and MDM
  • Token Binding
  • decentralized, or self-sovereign identity management and challenges, current technologies and products.
  • IAM for Customers. Data at Rest and Transit
  • Challenges (and solutions) to identity/authentication pains in an enterprise environment
  • Blockchain Identity - how realistic it is?
  • trends in IAM and E to E encryption
  • Identity protocol development
  • Identity Landscape, blockchains and potential applicability to healthcare
  • RISC Events
  • Consent management, distributed ledger technologies (DLT)
  • Open ID connect and federation
  • Emerging standards and challenges for implementing digital identity
  • How will identity get adopted commercially
  • So many things, so little time
  • New Trends in user-centric and privacy-enabling identity management
  • OAuth, Open ID Connect, UMA, blockchain
  • Identity issues in financial services. Blockchain/distributed ledger. Self-sovereign ID
  • adoption in privacy enhancing high assurance credentials; Attribute verification technologies
  • UMA, JOSE signature stack, self-sovereign identity, human-centric identity


What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • "Impact of DHT. Impact of W3C Verifiable Claims. Progress on standardized identity."
  • electronic notarization, uberization of services, and more
  • user friendly blockchain ecosystem
  • Setting up SSO with SCIM user provisioning
  • Common Ontologies and normalized data
  • concerns about the impact of new European privacy laws taking effect in 2017.
  • Current state of machine identity (certificate based authentication) & future direction?"
  • Future of Blockchain & Sovereign identity?Current state of machine identity (certificate based authentication) & future direction?
  • How to measure various degrees of integrity of distributed, socio-techical information systems.
  • Should we require our users to download our app in order to have strong authentication? Does a stronger authentication method improve security overall if it is optional/advice vs. mandatory/obligatory?
  • distributed, privacy enhancing correlation management
  • Privacy, Sovereignty, and Security
  • Awareness of PDEC, of Project VRM,
  • In the financial environment
  • IoT and identity. Biometrics. Claiming an identity. Merging provisional identities.
  • The difference between user-centric and self-sovereign.
  • http://www.cen.eu/work/areas/ICT/Pages/WS-IS%C3%86N.aspx
  • How to balance security and usability on mobile? How to evaluate the feasibility of "big data" identity concepts like risk based authentication or authentication based on behavioral biometrics?
  • Sovereign Identity
  • how would an existing product incorporate self-sovereign identity solution?
  • How to secure the data and allow user control
  • What value do users derive from self-representation online?
  • How do we enable sovereign identity and still make this commercially viable and useful for counterparties
  • Mechanics of how and where data will be stored. Strategies to drive adoption.
  • Individual-centric approach to identity vis-a-vis sovereign identity
  • Differentiation between identity and entitlement; use of hardware-authentication
  • improving SSO and permission controls for users over their data
  • How do we get to a world where the user has control over their data? What stands in the way? What can financial institutions, media, technology do to help?
  • will decentralized identity take off, and what's really needed for it to do so?
  • How can we bridge the gap between the JOSE JWT community, self-sovereign identity community, cross-origin identifier and same-origin identifier communities.