Notes iiw8
From IIW
Internet Identity Workshop #8 - 2009A
IIW8 Notes.pdf This contains all the notes on this page.
"Official" Notes from Conference
MONDAY
Session 1:
- A: Identity Doesn't Matter - Authorization Does, Alan Karp
- C: Distributed Identity Based on Relationships, Pat Sankar from Rel-ID
- D: Do People want to Own and Manage Their Identity? If so, How?, Ernie.....combined with State of OpenID - Authoratatives Discussoin RE: State of 1) Trust/Security 2) User Experience 3) Nascarization 4) Attribute Exchange 5) Adoption by David Eyes
- E: Defining an Architecture and Lexicon for VRM and Volunteered Personal Information building on VRM Workshop Dialogue - Iain Henderson (video)
Session 2:
- A: Authentication or Authorization? Can we move to verification Now?, Doug Whitmore
- B: Financial Institutions as Identity Providers, Guiyom
- D: Missing NotesIdentity and Privacy - Who to Trust with Your Data, Mainak
- E: Identity Quartet and User Driven Identity, Joe Andrieu (video)
- F: Identity Services Business Models, Bob Blakley
- G: OpenID For Desktop Applications: How? When?, Infinity Linden
- J: Sharing Permission RESTfully with Web-Keys, Tyler Close.... combined with... Authorization without boring crypto (It is possible and it is secure), Hans Granquist
Session 3:
- C: Filtering the Noise in the Activity Streams How to <3 your stream..., Monica
- D: Role as Identity and Organizational Trust, Justin Richer
- E: Higgins Cloud Selector (a way to use i-cards without installing anything on your Machine), Markus (video)
- G: Keeping User Happy on the Desktop vs. On the Web (OS-level vs Online ID Management), Aridren N. (Apple) / Ariel G. (MSFT) ... combined with...What would it look like if Apple designed OpenID?, Chris Messina
TUESDAY
Session 4:
- A: Action Cards (Part 1) What are they, How do they Work, what are the Issues, Drummond Reed (also see opening talk (video) by Drummond)
- C: Becoming an OpenID Relying Party, Luke Shepard (Facebook) and George Fletcher (AOL)
- E: Enhanced Transaction Model Using InfoCards, Jeff Stollman
- F: Distributed Expertise Location, Terrell Russell
- G: Characteristics of VRM Joe (video) (also see opening talk (video) by Doc Searls)
- J: Claims, Tickets and OAuth Yaron Y. Goland
Session 5:
- A: Action Cards (Part 2) Building Action Cards with Kynetx (Demo), Phil Windley
- B: Identity Brokers What are they? How do they Work?, Ben Sapiro
- C: Claims, Tickets and OAuth Yaron Y. Goland Value of Identity (end user) and SEO,
- E: ID-Legal "straw man" blog, Lucy
- F: Self Asserted Attributes When to Trust Them, AssertID
- G: Missing Notes Claims, Tickets and OAuth Yaron Y. GolandVRM 1st and 4th Parties, Doc (video)
- H: User-Managed Identity Use-Case Gathering (To Identity Symergy), Trent Adams
- J: Missing Notes Developing a Secure Discovery Based Messaging System, Nika
Session 6:
- A: Are there "standards" for Registering to Call an API, Angus Logan
- C: Protect Serve Relationship Management for User-Driven Access Control, Eve Maler (video)
- E: VRM and Media, Doc
- F: OAuth for High Value Transactions, Jeff Shan
- G: Managing Alternative Identities, Infinity Linden
Lunch:
- E: Introduction to Discovery or How Do we Interact with the Unknown, Eran Hammer
- F: Big Dialogue and Online Community Identity Rules MIT Media Lab/ Harvard Berkman Center
- G: Innovation Games, Nancy Frishberg (video)
- H: Assurance in the Real World Levels, Communities, Certificates, Governments, Protocols, Bob Morgan ....combined with.... Discovering Federation and Trust Levels for OpenID Info-Card SAML, John Bradley....combined with...Next-Gen O PenID Discovery: LRDD, XRD, signed delegation etc., Dirk Balfanz
Session 7:
- A: OpenID UX OpenID UI Extension Best Practices, Allen Tom
- B: Confetti Stop Storing Passords and Start using Delegation -> Get more users, Kevin Marks
- C: Use Cases for User-Managed Access, Eve Maler, Alan K, Trent A, Paul T. Dazza G.
- E: Failed Identity Businesses, Chris
- F: Contextual Friends Lists and Sexuality Online, Sarah Dopp
- G: Kantara Initiative, Brett McDowell
- J: Activity Strea.ms Formalizing Draft Spec
Session 8:
- A: Detecting User Login State and Preferences Brian E, Luke Shepard (Facebook)
- B: Microformats *distributed data, *in HTML, *in Google SERPs, Kevin Marks (video)
- C: User Driven Search, Joe Andrieu
- F: Personal Relationship Management What about starting an Open-Source project?
- G: Web 2.0 vs. Rich Internet Apps (RIA), Brett McDowell
- I: OAuth for Installed Applications, Nathan Beach, Eric Sachs
- J: Identity and the Future of Money, Giyom
- K: Having Fun with Wakame, Asa Hardcastle (video)
After Closing (before Dinner)
- E: How to talk to Business People, Mike Ozburn
WEDNESDAY
Session 9:
- A: 9A: Use Case Selection and Metrics, Eve Maler, Alan Karp
- E: Activity Streams, Twitter API, Facebook, Open Social, Yahoo! Updates, Kevin Marks (QT video)
- J: Simpler OAuth For Lower Risk Use Cases, Brian Eaton, Eric Sachs
Session 10:
- A: Use Case Selection and Metrics Part 2: See 9A: Use Case Selection and Metrics
- B: What does and RP need to survive compromise of user@idp? Breno (Google), Luke Shepard (Facebook)
- E: Missing Notes OSIS Testing John Bradley
- F: Innovation Design and Serious Games To Make Your Products Rock, Kaliya and Nancy F (QT video)
- G: Identity in 10 Years - How People Change Chris
- J: OAuth for Enterprise Use Cases (2 legged), Eric Sachs
Session 11:
- A: Personal Hype Quotient: OAuth in Use - meet the OAuthors
- C: Visual e-ID (Certificate Image Extension
- E: InfoGrid sneak preview, Johannes Ernst
- F: WebFinger (Personal Web Disco)
- G: Internal and External Identity in the Enterprise, Justin Richer
- J: What if an IDP allows logins to multiple accounts at the same time? RP Impact?, Eric Sachs
Session 12:
- C: NASCAR DEMO with Action Cards, Phil Windley and Drummond
- D: OpenID, Open Social and Mobile, Jeff
- E: Open Liberty Released - Wakame VI.O ID-WSF FUN, Asa Hardcastle (QT video)
- F: Validation Extension for OpenID, Henrick
- G: Use Cases for Identity Brokers Ben S. Ashish J.
- H: OpenID PGP and Thawte Key Signing, SignpollyMa, Will Norris
Closing:
Post Close:
- Whisper Priority Messaging with XDI, Markus and Drummond
Left Overs
These are sessions that were posted at one point but didn't happen at the conference their conveners are free to post notes about them
- OpenID and WS-* Selector, Paul Trevithick
- Near Field Communication (NFC) based Phone Selector
- iPhone Selector Study mWalled
- Delegating Permission to Access Web-Based Instant Messaging, Angus Logan
- The Usability Conundrum What are the trade offs between ease of use and security privacy, Bill Smith (SUN)
- How to Make My Mother Understand OpenID and why it is useful, Andrew N. (Apple)
- Personal Discovery Service Brian E.
Links Out To Web
Videos:
- Brief Conference Report on IIW8
- Videos from selected sessions
- iiw2009a: Introduction To Discovery (Part 1)
Blog Posts by Attendees:
- The Future is Selector Based
- Internet Identity Workshop & OpenInfoCard
- Digital Identity, Like Putting on your Sunday Best
- Open Stack at IIW by Yahoo Developer Network
- Phil Windley
- Selectors: The Corpus of Identity
- Protect Serve summary by Dave Kearns
- Angus Logan - Blog Reflections and Notes from Sessions
- Micheal Froomkin on the Privacy Myopia Economics of, a lunch conversation reflection
- Michael Froomkin on Succumbing to Twitter
- Dave Kearns on Giving IIW another Shot
- Henrick's Post about IIW translated by Google Translate
- Comments on the Diamond Framework by David Kearns
- The Diamond Framework by Paul Trevithick
- Working on OpenInfoCard Again by Axel Nennker
Coverage:
Photos: