IIW 28 Proposed Topics
From IIW
Register here for IIW 28: https://iiw28.eventbrite.com
What topics are you planning to present about or lead a discussion about at this IIW?
- Continuous Access Evaluation Protocol (CAEP)
- Decentralized Autonomic Data items and DIDs Delegated Attenuated Authorizations using DIDs. Marriage of Object Capabilities and DIDs
- The interplay between human nature and IT systems and platforms. How does that influence creation of our digital/online identity.
- Just want to learn
- OAuth, Security, OpenID Connect
- Since this is my first IIW I am not sure I could lead any discussion but would be honoured to contribute to discussions regarding enrollment, issuance and verification of identity claims.
- Robotic Process Automation identity governance standardization
- Interoperability of identity wallet providers
- nature of identity in IoT/AI/AR environment
- Bots, SCIM, Oauth, UMA
- MyAI
- OAuth, IndieAuth
- SSI interoperability as presented during DIF call
- I'm relatively new to the SSI space and am interested in learning. I'm pursuing a use case associated with allowing an organization to manage components associated with reputational risk under their control.
- Standards for self-sovereign technology.
- How to capture digital identity in a way that doesn't include PII.
- Not sure – this is my first time attending. I'm mainly looking to learn from other attendees and discuss how Blockstack is approaching identity.
- decentralized identity, DPKI, personal datastores
- Delegation of Authority using Verifiable Credentials / Verified Relationships between people and organizations. Agent Protocols in Hyperledger Indy.
- DID Universal Resolver and Universal Registrar
- Me2B Alliance; Mutually Negotiated Terms of Service; Terms to support non-surveillant biz models
- Using AI to solve common identity and access challenges.
- Indy Catalyst Agent and agent-to-agent protocols
- Indy Catalyst Agent and Agent to Agent communications
- GS1 Digital Link - Standard that makes standardized identifiers for things, places, organizations and assets - web resolvable.
- "Two-Factor Authentication
- OAuth
- Identity and Privacy in Healthcare"
- OAuth with clients issuing access_token
- Identity Trust Assurance
- Dynamic Authorization using ABAC for structured and unstructured data.
- "Identity as it relates to healthcare
- Physician and Patient Privacy and Soverignty"
- A relying party perspective of managing self-sovereign identities.
- "Kantara Initiative Consent Receipt specification interoperability
- ID Proofing and Verification standards project at ISO"
- I'm presenting SSI 101 with Heather Vescent. I can also do DID intro sessions for developers via the BTCR method. I have slide decks and demos
- "Permissioned Data & Information Sharing
- MyData Global
- Data Commons/Co-ops for Smart Cities"
- "OpenID Connect and Decentralized Identity"
- "shared public claims Rwanda PKI"
- Not decided yet but might be in the area of DID Auth such as AAL2 compliance, MFA, organizations, ...
- I will be absorbing information this session. I work in blockchain for social impact, and self-sovereign identity has been a key concept that *I am looking forward to learning more about.The intersection of privacy, identity, and trust online. The implications of those considerations for what legal rules should govern online identity and privacy.
- SSI, DID, DKMS, OpenSSI, Sovrin Governance Framework
- Facilitating customer adoption of SSI in financial services in a manner consistent with SSI tenants
- Identity for Workloads and Trust
- SSI through distributed ID's
- web authn, authentication, identity proofing, identity management, FIDO
- DID based key management with SeedQuest and Didery
- networked identity
- Philosophy of Identity and Difference: sameness and diversity, how can we develop more of our true essence through our online identity
- Distributed storage for identity
- Claim structure interoperability, Trust Market
- IEEE Workshop: Digital Inclusion, Identity, Transparency, and Agency Open Space Event in India
- Standards related to Data Identity and Management
- Identity-Tech Workbench
- Microsoft's ongoing decentralized identity efforts.
- Data fiduciaries and human dignity at scale
- UMA 101
- Key Recovery with a Visual Mnemonic
- Protecting/controlling “financial identity” vis-a-vis 10,000+ “financial institutions” (big/medium-sized banks, community banks, credit unions) and non-bank lenders using free credit report freezes mandated by federal law (recently-amended Fair Credit Reporting Act (FCRA)) pursuant to consumer demand.
- Protecting identity with WebAuthn
- Taxonomy and Self-Sovereign Identity
- Blockchain
- Demo early stage products leveraging some of the ideas we have around SSI."
- "SSI as a space and how we intend to build a cohesive community, unification of strategy across the community.
- Bridging strategies between SSI and current internet identity standards such as OAuth and OpenId connect.
- Identity Wallets, DIDs, BTCR DID Method, #SmartCustody of digital assets
What are you hoping to learn about or hear a presentation about at IIW?
- Security for privacy and identity
- More DID, zksnarks
- Everything
- Ledger/blockchain identity technologies. I would also like to hear some case studies where those technologies are deployed and how the user reception has been.
- I will be listening for the challenges this community sees and advances this community has made in the space of online identity.
- SSI, identity blockchain, DID, Verifable claim, in depth sovrin engineering, uport
- Self-sovereign identity
- I have strong interested in understanding how traditional PKI-based ID system could be replaced with distributed or federated identity solutions.
- what are the incentives for identity issuers, providers and verifiers in respect of the citizen (user) privacy.
- Standards processes, identity governance topics
- identity hubs
- SCIM and fastfed
- all aspects of identity in platform era
- Self Sovereign Identity
- Overlays
- Standards in this area, user-centric identity in relation to other digital identity such as for product / connected devices
- interoperability
- I'm hoping to learn how SSI is going to affect the enterprise.
- Adoption of self-sovereign technology and business models to support it.
- Mobile security best practices and emerging technology
- How practitioners think and talk about this problem/solution domain.
- Self Sovereign Identity
- The latest in the OpenID Connect space
- Basically anything since I'm curious to hear how other people are generally approaching identity these days
- DID-Auth. Interoperability across Agents rooted in different DID networks.
- SSI Wallets, SSI Agents, SSI Key Recovery, Sovrin dependents
- UMA 2.0, SSI use cases, Privacy & Consent, Government and Healthcare Identity Solutions
- Privacy, Cryptographic and ZKP systems
- Data Portability, Mutually
- Passwordless security, Just-tin time access,Cross IDP federation.
- Secure peer-to-peer communication and identity solutions
- How identities are passed between nodes in a distributed system
- Identity and how it relates to Blockchain/DLT
- Self-sovereign Identity and emerging ecosystem. Identity and privacy frameworks. Emerging standards.
- DID
- "Personal Sovereignty Multisignal Authentication Authentication in the Enterprise/Extended Enterprise Secured authentication Improve security and usability in authenitcation"
- Two-Factor Authentication (U2F)
- Making OAuth2 Secure
- International Perspectives
- Identity in the Context of Mobile Device Managment
- Personal Sovereignty
- Self-Sovereign Identity
- Self-Sovereign Identity for regular people, Verifiable Credentials, Delegation - User Experience
- Sovrin Identity, WebAuthn
- OpenSSI Project
- I want to learn more about zero trust identity.
- everything- I am building a platform, and want to do it right.
- Privacy measures/best practices
- User Centric AI
- What others are working on
- "DIDs & Verifiable Claims & other open protocols Private, internal service authentication"
- I am most excited in learning about how the IIW group is thinking about adoption strategy. I know that the work in British Columbia has been promising, but how does this extend to the broader internet community, particularly when identity provider incumbents hold so much sway?
- How to protect people from untrustworthy entities or organizations online when a lot of them are, and people have to go online anyway.
- Agent-to-Agent protocol, SSI interop
- "OAuth2 Authorization frameworks Identity Proofing"
- Distributed Identity
- Technical barriers and case studies relevant to birth registration on the blockchain in low resource areas
- DIDs, Key management & recovery
- How to accelerate SSI adoption so as to accrue cost-benefits to both Consumers and Businesses. Why and how to use SSI in the Enterprise vs. the *Consumer arena.
- Trust and Identity
- "-Projects in the works to create distributed identities -SSI and data protection"
- Web Authn, identity management, Identity providers
- Decentralized Identity
- producing intangible social capital such as "feeling safe" online
- UMA 2.0, SSI use cases, Privacy & Consent, Government and Healthcare Identity Solutions
- DL and Blockchain identity issues
- Current state/trends in SSI, DIDs and credential interoperability
- Children's Identity Online and Data Governance
- Trying to develop a journalistic bird's eye view of the ecosystem.
- This will be my first conference.
- Mostly what other decentralized identity enthusiasts are doing.
- Data fiduciaries and human dignity at scale
- Standards
- Individual-controlled data sharing imperatives
- "FIDO webauthn adoption by browsers Insights on Google YOLO adoption"
- Self-Sovereign Identities, object capabilities
- Decentralized Identity, Key Recovery, Key Management
- Continuous Access Evaluation Protocol
- A realistic game plan to successfully implement SSI to actively compete with incumbent identity ecosystems and linear (“pipeline”) business models controlled by oligopolies.
- CAEP
- Changing/establishing government policy on SSI.
- "Self-Sovereign Identity Blockchain-based identity User Managed Access Personal Sovereignty"
- Self-Sovereign Identity
- Everything!
- CIAM
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
- Context specific identities
- What can we implement today!
- how I can help build the tools necessary to make SSI happen sooner.
- How anonymous identities can be used in conjunction with the deterministic ledger-based technologies.
- How we can adopt SSI with government?
- How a user could get (co)ownership on verifiable claims that hold value only because they have been vetted by a trusted tier?
- How to on-board governments as trusted providers in a fair, open and sustainable online identity framework?"
- Privacy and anonymity of users.
- Where are we at right now?
- How to educate end user of identity solutions? I believe there is a huge gap to fill.
- How to better integrate Design into Internet Identity so it's a better experience for the end-user.
- I'm interested in learning how SSi is going to affect the enterprise.
- Move away from federated identity.
- How user data is being protected from a mobile perspective
- What does likely future look like.
- How to empower mainstream usage of private-key-based auth / decentralized identity solutions. And how that maps to distributed storage from a UX and technical perspective.
- Enabling SSI and OpenIDConnect.
- How do we transition to SSI
- "How can we achieve a true unique identity in a world of hybrid cloud enterprise environments?
- How to leverage AI to prevent the insider threat and at the same time, provide a seamless authentication experience?"
- Authenticaiton and verification of identities between nodes
- The dangers of centralization of identity systems. How to use decentralized solutions to improve identity systems.
- Stories of adoption of blockchain-based and self-sovereign identity. Are we any closer to Bring-Your-Own-ID?
- Democracy
- Want to understand how the GS1 system of standards for identification and data exchange within supply chain - may be leveraged in an overall decentralized identity world - as verifying body or other.
- "Privacy in the Age of Surveillance Data protection and privacy Trends in CIAM"
- "Data Protection Recent Deployments Offline personal authentication"
- Making it all work for everyday people
- How can relying parties rely on the identity proofing and lifecycle management of one node in a global network of networks
- "What are the roadblocks to adopting zero trust identity?
- What are the best practices for using zero trust identity data effectively for dynamic authorization use cases?"
- How to keep it secure and self sovereign, how to ensure access, how to make it user friendly, how to ensure interoperability.
- SSI ecosystem interop
- How to get the social benefits of aggregating personal data with user centric identity
- Using standards to accelerate new work and its adoption
- biometrics, self-sovereign identity, rebooting web of trust
- How do we ensure that representation from developing countries and regions with limited internet connectivity now have a seat at this table so that their identity needs are met?
- What legal/regulatory infrastructure is needed to permit user-centric identity and data to work in the real commerical world.
- SSI interop
- How to mitigate an Internet user's data privacy concerns?
- Whats the progress others are making towards building, deploying, and standardizing distributed identity schemes. Whats working well and whats not? How mature is the technology?
- Issues around birth registration on the blockchain in low resource countries (guardianship, public key recovery, multistaleholder engagement, etc)
- How to justify the high per-user cost of Identity Services in the Enterprise vs. providing, sponsoring, or facilitating a much lower per-user cost for Customers (ideally less than 1% of the Enterprise cost).
- "-how to make a system where the user owns verifiable online identities-taking back the ownership of our online identities-how can we get rid of passwords and increase our data protection through ownership of online identity and data"
- &DIDs,
- How to help non technical users properly manage their DID's
- blockchain-based privacy models
- "-User-centric and self sovereign identity standards - Consent revocation"
- Peer DID, credential interoperability
- Data management and data ownership
- "How can we build and maintain a collective journalistic resource for identity-tech ecosystem, and use that to effectively steer the community - reducing the number of independent silos, reducing the confusion due to competition and hidden corporate agendas, promote adoption by creating a community-driven consensus around key issues, such as Identity vs. Identifier, Owning Data vs. Controlling and Managing Data, Claims vs. Credentials, the landscape of proofs, validations, etc. - specifically in areas where there *is* undocumented convergence.
How can we break the american/euro-centric and capitalist dominated approach to identity-tech which continues to leave the bulk of the world's population untouched while it focuses in the first-world problems of privileged elites and the overly systematized and dehumanized societies."
- Data storage, standard APIs for data storage, compare designs for all things DIDs.
- How do we fix this mess we got ourselves into?
- Key management and recovery.
- How do we crack the problem of providing a secure and usable backup factor for 2FA?
- Best methods for cryptographic key recovery and key management
- Key management, KYC, organization ID management
- "As currently envisioned, how will consumers extract value from blockchain SSI?
- What plan do SSI proponents have to convince average consumers that blockchain ID is safe when cryptocurrency is not safe from theft, and *bitcoin is not immune to fraud."
- Risk based authentication