IIW 28 Proposed Topics

From IIW
Jump to: navigation, search

Register here for IIW 28: https://iiw28.eventbrite.com

What topics are you planning to present about or lead a discussion about at this IIW?

  • Continuous Access Evaluation Protocol (CAEP)
  • Decentralized Autonomic Data items and DIDs Delegated Attenuated Authorizations using DIDs. Marriage of Object Capabilities and DIDs
  • The interplay between human nature and IT systems and platforms. How does that influence creation of our digital/online identity.
  • Just want to learn
  • OAuth, Security, OpenID Connect
  • Since this is my first IIW I am not sure I could lead any discussion but would be honoured to contribute to discussions regarding enrollment, issuance and verification of identity claims.
  • Robotic Process Automation identity governance standardization
  • Interoperability of identity wallet providers
  • nature of identity in IoT/AI/AR environment
  • Bots, SCIM, Oauth, UMA
  • MyAI
  • OAuth, IndieAuth
  • SSI interoperability as presented during DIF call
  • I'm relatively new to the SSI space and am interested in learning. I'm pursuing a use case associated with allowing an organization to manage components associated with reputational risk under their control.
  • Standards for self-sovereign technology.
  • How to capture digital identity in a way that doesn't include PII.
  • Not sure – this is my first time attending. I'm mainly looking to learn from other attendees and discuss how Blockstack is approaching identity.
  • decentralized identity, DPKI, personal datastores
  • Delegation of Authority using Verifiable Credentials / Verified Relationships between people and organizations. Agent Protocols in Hyperledger Indy.
  • DID Universal Resolver and Universal Registrar
  • Me2B Alliance; Mutually Negotiated Terms of Service; Terms to support non-surveillant biz models
  • Using AI to solve common identity and access challenges.
  • Indy Catalyst Agent and agent-to-agent protocols
  • Indy Catalyst Agent and Agent to Agent communications
  • GS1 Digital Link - Standard that makes standardized identifiers for things, places, organizations and assets - web resolvable.
  • "Two-Factor Authentication
  • OAuth
  • Identity and Privacy in Healthcare"
  • OAuth with clients issuing access_token
  • Identity Trust Assurance
  • Dynamic Authorization using ABAC for structured and unstructured data.
  • "Identity as it relates to healthcare
  • Physician and Patient Privacy and Soverignty"
  • A relying party perspective of managing self-sovereign identities.
  • "Kantara Initiative Consent Receipt specification interoperability
  • ID Proofing and Verification standards project at ISO"
  • I'm presenting SSI 101 with Heather Vescent. I can also do DID intro sessions for developers via the BTCR method. I have slide decks and demos
  • "Permissioned Data & Information Sharing
  • MyData Global
  • Data Commons/Co-ops for Smart Cities"
  • "OpenID Connect and Decentralized Identity"
  • "shared public claims Rwanda PKI"
  • Not decided yet but might be in the area of DID Auth such as AAL2 compliance, MFA, organizations, ...
  • I will be absorbing information this session. I work in blockchain for social impact, and self-sovereign identity has been a key concept that *I am looking forward to learning more about.The intersection of privacy, identity, and trust online. The implications of those considerations for what legal rules should govern online identity and privacy.
  • SSI, DID, DKMS, OpenSSI, Sovrin Governance Framework
  • Facilitating customer adoption of SSI in financial services in a manner consistent with SSI tenants
  • Identity for Workloads and Trust
  • SSI through distributed ID's
  • web authn, authentication, identity proofing, identity management, FIDO
  • DID based key management with SeedQuest and Didery
  • networked identity
  • Philosophy of Identity and Difference: sameness and diversity, how can we develop more of our true essence through our online identity
  • Distributed storage for identity
  • Claim structure interoperability, Trust Market
  • IEEE Workshop: Digital Inclusion, Identity, Transparency, and Agency Open Space Event in India
  • Standards related to Data Identity and Management
  • Identity-Tech Workbench
  • Microsoft's ongoing decentralized identity efforts.
  • Data fiduciaries and human dignity at scale
  • UMA 101
  • Key Recovery with a Visual Mnemonic
  • Protecting/controlling “financial identity” vis-a-vis 10,000+ “financial institutions” (big/medium-sized banks, community banks, credit unions) and non-bank lenders using free credit report freezes mandated by federal law (recently-amended Fair Credit Reporting Act (FCRA)) pursuant to consumer demand.
  • Protecting identity with WebAuthn
  • Taxonomy and Self-Sovereign Identity
  • Blockchain
  • Demo early stage products leveraging some of the ideas we have around SSI."
  • "SSI as a space and how we intend to build a cohesive community, unification of strategy across the community.
  • Bridging strategies between SSI and current internet identity standards such as OAuth and OpenId connect.
  • Identity Wallets, DIDs, BTCR DID Method, #SmartCustody of digital assets


What are you hoping to learn about or hear a presentation about at IIW?

  • Security for privacy and identity
  • More DID, zksnarks
  • Everything
  • Ledger/blockchain identity technologies. I would also like to hear some case studies where those technologies are deployed and how the user reception has been.
  • I will be listening for the challenges this community sees and advances this community has made in the space of online identity.
  • SSI, identity blockchain, DID, Verifable claim, in depth sovrin engineering, uport
  • Self-sovereign identity
  • I have strong interested in understanding how traditional PKI-based ID system could be replaced with distributed or federated identity solutions.
  • what are the incentives for identity issuers, providers and verifiers in respect of the citizen (user) privacy.
  • Standards processes, identity governance topics
  • identity hubs
  • SCIM and fastfed
  • all aspects of identity in platform era
  • Self Sovereign Identity
  • Overlays
  • Standards in this area, user-centric identity in relation to other digital identity such as for product / connected devices
  • interoperability
  • I'm hoping to learn how SSI is going to affect the enterprise.
  • Adoption of self-sovereign technology and business models to support it.
  • Mobile security best practices and emerging technology
  • How practitioners think and talk about this problem/solution domain.
  • Self Sovereign Identity
  • The latest in the OpenID Connect space
  • Basically anything since I'm curious to hear how other people are generally approaching identity these days
  • DID-Auth. Interoperability across Agents rooted in different DID networks.
  • SSI Wallets, SSI Agents, SSI Key Recovery, Sovrin dependents
  • UMA 2.0, SSI use cases, Privacy & Consent, Government and Healthcare Identity Solutions
  • Privacy, Cryptographic and ZKP systems
  • Data Portability, Mutually
  • Passwordless security, Just-tin time access,Cross IDP federation.
  • Secure peer-to-peer communication and identity solutions
  • How identities are passed between nodes in a distributed system
  • Identity and how it relates to Blockchain/DLT
  • Self-sovereign Identity and emerging ecosystem. Identity and privacy frameworks. Emerging standards.
  • DID
  • "Personal Sovereignty Multisignal Authentication Authentication in the Enterprise/Extended Enterprise Secured authentication Improve security and usability in authenitcation"
  • Two-Factor Authentication (U2F)
  • Making OAuth2 Secure
  • International Perspectives
  • Identity in the Context of Mobile Device Managment
  • Personal Sovereignty
  • Self-Sovereign Identity
  • Self-Sovereign Identity for regular people, Verifiable Credentials, Delegation - User Experience
  • Sovrin Identity, WebAuthn
  • OpenSSI Project
  • I want to learn more about zero trust identity.
  • everything- I am building a platform, and want to do it right.
  • Privacy measures/best practices
  • User Centric AI
  • What others are working on
  • "DIDs & Verifiable Claims & other open protocols Private, internal service authentication"
  • I am most excited in learning about how the IIW group is thinking about adoption strategy. I know that the work in British Columbia has been promising, but how does this extend to the broader internet community, particularly when identity provider incumbents hold so much sway?
    • How to protect people from untrustworthy entities or organizations online when a lot of them are, and people have to go online anyway.
  • Agent-to-Agent protocol, SSI interop
  • "OAuth2 Authorization frameworks Identity Proofing"
  • Distributed Identity
  • Technical barriers and case studies relevant to birth registration on the blockchain in low resource areas
  • DIDs, Key management & recovery
  • How to accelerate SSI adoption so as to accrue cost-benefits to both Consumers and Businesses. Why and how to use SSI in the Enterprise vs. the *Consumer arena.
  • Trust and Identity
  • "-Projects in the works to create distributed identities -SSI and data protection"
  • Web Authn, identity management, Identity providers
  • Decentralized Identity
  • producing intangible social capital such as "feeling safe" online
  • UMA 2.0, SSI use cases, Privacy & Consent, Government and Healthcare Identity Solutions
  • DL and Blockchain identity issues
  • Current state/trends in SSI, DIDs and credential interoperability
  • Children's Identity Online and Data Governance
  • Trying to develop a journalistic bird's eye view of the ecosystem.
  • This will be my first conference.
  • Mostly what other decentralized identity enthusiasts are doing.
  • Data fiduciaries and human dignity at scale
  • Standards
  • Individual-controlled data sharing imperatives
  • "FIDO webauthn adoption by browsers Insights on Google YOLO adoption"
  • Self-Sovereign Identities, object capabilities
  • Decentralized Identity, Key Recovery, Key Management
  • Continuous Access Evaluation Protocol
  • A realistic game plan to successfully implement SSI to actively compete with incumbent identity ecosystems and linear (“pipeline”) business models controlled by oligopolies.
  • CAEP
  • Changing/establishing government policy on SSI.
  • "Self-Sovereign Identity Blockchain-based identity User Managed Access Personal Sovereignty"
  • Self-Sovereign Identity
  • Everything!
  • CIAM


What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • Context specific identities
  • What can we implement today!
  • how I can help build the tools necessary to make SSI happen sooner.
  • How anonymous identities can be used in conjunction with the deterministic ledger-based technologies.
  • How we can adopt SSI with government?
  • How a user could get (co)ownership on verifiable claims that hold value only because they have been vetted by a trusted tier?
  • How to on-board governments as trusted providers in a fair, open and sustainable online identity framework?"
  • Privacy and anonymity of users.
  • Where are we at right now?
  • How to educate end user of identity solutions? I believe there is a huge gap to fill.
  • How to better integrate Design into Internet Identity so it's a better experience for the end-user.
  • I'm interested in learning how SSi is going to affect the enterprise.
  • Move away from federated identity.
  • How user data is being protected from a mobile perspective
  • What does likely future look like.
  • How to empower mainstream usage of private-key-based auth / decentralized identity solutions. And how that maps to distributed storage from a UX and technical perspective.
  • Enabling SSI and OpenIDConnect.
  • How do we transition to SSI
  • "How can we achieve a true unique identity in a world of hybrid cloud enterprise environments?
  • How to leverage AI to prevent the insider threat and at the same time, provide a seamless authentication experience?"
  • Authenticaiton and verification of identities between nodes
  • The dangers of centralization of identity systems. How to use decentralized solutions to improve identity systems.
  • Stories of adoption of blockchain-based and self-sovereign identity. Are we any closer to Bring-Your-Own-ID?
  • Democracy
  • Want to understand how the GS1 system of standards for identification and data exchange within supply chain - may be leveraged in an overall decentralized identity world - as verifying body or other.
  • "Privacy in the Age of Surveillance Data protection and privacy Trends in CIAM"
  • "Data Protection Recent Deployments Offline personal authentication"
  • Making it all work for everyday people
  • How can relying parties rely on the identity proofing and lifecycle management of one node in a global network of networks
  • "What are the roadblocks to adopting zero trust identity?
  • What are the best practices for using zero trust identity data effectively for dynamic authorization use cases?"
  • How to keep it secure and self sovereign, how to ensure access, how to make it user friendly, how to ensure interoperability.
  • SSI ecosystem interop
  • How to get the social benefits of aggregating personal data with user centric identity
  • Using standards to accelerate new work and its adoption
  • biometrics, self-sovereign identity, rebooting web of trust
  • How do we ensure that representation from developing countries and regions with limited internet connectivity now have a seat at this table so that their identity needs are met?
  • What legal/regulatory infrastructure is needed to permit user-centric identity and data to work in the real commerical world.
  • SSI interop
  • How to mitigate an Internet user's data privacy concerns?
  • Whats the progress others are making towards building, deploying, and standardizing distributed identity schemes. Whats working well and whats not? How mature is the technology?
  • Issues around birth registration on the blockchain in low resource countries (guardianship, public key recovery, multistaleholder engagement, etc)
  • How to justify the high per-user cost of Identity Services in the Enterprise vs. providing, sponsoring, or facilitating a much lower per-user cost for Customers (ideally less than 1% of the Enterprise cost).
  • "-how to make a system where the user owns verifiable online identities-taking back the ownership of our online identities-how can we get rid of passwords and increase our data protection through ownership of online identity and data"
  • &DIDs,
  • How to help non technical users properly manage their DID's
  • blockchain-based privacy models
  • "-User-centric and self sovereign identity standards - Consent revocation"
  • Peer DID, credential interoperability
  • Data management and data ownership
  • "How can we build and maintain a collective journalistic resource for identity-tech ecosystem, and use that to effectively steer the community - reducing the number of independent silos, reducing the confusion due to competition and hidden corporate agendas, promote adoption by creating a community-driven consensus around key issues, such as Identity vs. Identifier, Owning Data vs. Controlling and Managing Data, Claims vs. Credentials, the landscape of proofs, validations, etc. - specifically in areas where there *is* undocumented convergence.

How can we break the american/euro-centric and capitalist dominated approach to identity-tech which continues to leave the bulk of the world's population untouched while it focuses in the first-world problems of privileged elites and the overly systematized and dehumanized societies."

  • Data storage, standard APIs for data storage, compare designs for all things DIDs.
  • How do we fix this mess we got ourselves into?
  • Key management and recovery.
  • How do we crack the problem of providing a secure and usable backup factor for 2FA?
  • Best methods for cryptographic key recovery and key management
  • Key management, KYC, organization ID management
  • "As currently envisioned, how will consumers extract value from blockchain SSI?
  • What plan do SSI proponents have to convince average consumers that blockchain ID is safe when cryptocurrency is not safe from theft, and *bitcoin is not immune to fraud."
  • Risk based authentication