Notes IIW-East

From IIW

Complete Book of Proceedings for IIW-East in PDF form

THURSDAY

Session 1

T1A: Role of Government as Identity Oracle (Attribute Provider)

T1B: B2B and B2C: How to Balance the Difference and Challenges of Each Environment

T1C: Proofing the Masses

F1D: NSTIC 101 (wtf?)

T1E: More Government Employees at IIW Next Time

T1F: PDX Ecosystem

T1G: High Assurance Consumer Identity

Session 2

T2A: Certifying Use Location for Politics Governance

T2B: Useability: Addressing the click - click - click problem

T2D: Leveraging Identity to Enable and Foster Scientific Collaboration

T2C: Identity and Cross Domain Systems (multilayer security)

T2E: Should We Create "Ownership Rights" in Law for Personal Data?

T2F: Personal Data Vision of Future: Video

T2G: Attributes Claims - Identify Attributes LOA

Session 3

T3A: Are Mediation Tools Useful in Authentication?

T3B: Open Identity for Closed Government: NSTIC the Cybersecurity Answer?

T3C: Wholesale Privacy

T3D: Building Standards for "Trustable" ID Providers

T3E: Liability and Financial models for Identity Providers, Attribute Providers and Identity Proofers

T3F: Personal Data Stores and Context Automation

T3D: Patient Centric Medical Record Federation - Securing HData

T3H: How to Make HTTP Authentication Useful Again?

Session 4

T4A: PRIVACY - Did We Solve Privacy for Web Identity Systems (technically already?)

T4C: Personal Data Store/Archive

T4D: Service Chaining and Trust

T4E: Extending OpenID Assertions with SAML+

T4F: NSTIC - "Identity Ecosystem"

T4G: Cross Federation Trust w/Meta Data

FRIDAY

Session 1

F1A: OAUTH - What Topics Should We Focus On Next?

F1D: Liability for ldps, APs, RPs... Continued

F1E: Getting More .gov @IIW

F1F: Identity Commons "3.0" Big Tent Creation

Session 2

F2A: Government Relationship Management

F2E: Enterprise Open ID

F2C: Identity in the Browser (F2C)

Session 3

F3B: "Today Geekdom, Tomorrow the World"

F3D: Personal Data Locker? What is it and Why?

F3E: Ownership Rights in Data Pt2

F3F: Information Security Standards and "Levels of Protection"

F3G: Certification Coordination - OIX, Kantara, ID Commons

Session 4

OAUTH Signing #2

F4D: Making NST IC Open/Making NST IC Happen

F4E: Hybrid Online/Offline Debate BYO Issue

F4F: Roadmap for Personal Data Store Ecology: Let's Make One

F4G: Demo