IIW 24 Session Notes

From IIW
Revision as of 22:18, 3 May 2017 by Nobnatu (talk | contribs) (Session 4)

Jump to: navigation, search

Tuesday May 2, 2017

Session 1

11:00 - 12:00

1A/ Self Sovereign Identity Container

1B/ Introduction to OAuth2

1D/ Decentralized Names and ID’s Working Group – DID101

1E/ IDPro

1G/ oram v1.0 bit.ly/joram100

1H/ OIDF Modrna WG UpDate

1J/ 12 Competencies for Network Leadership

1K/ Digital Inclusion

Session 2

12:00 - 1:00

2A/ Digital India

2B/ ntroduction to OpenID Connect

2D/ Decentralized Names and ID’s (continued)

2F/ JLINC overview demo discussion

2G/ Delegated Account Recovery – Kill the “forgot password” email

2H/ Build Badass Identity Team

2I/ Consent-Informed Attribute Release for SAML/OIDC at Scale

Session 3

2:00 - 3:00

3A/ Privacy Preservation and Controlling Correlation

3B/ 101 Introduction to User Managed Access (UMA) 2.0

3C/ IEEE 2410 Biometric Open Protocol Standard (“BOPS”) EXPLAINED!

3D/ If You’re Hiring a Student w/a Masters in IDM – What do you think they should know?

3F/ Your Terms that Sites Agree To (rather than the other way around)

3G/ OpenID Connect Account Parking Overview

3H/ Hybrid Personal Cloud – Applying devops open source tech to personal IoT

3J/ Identity Storage and Compute Working Group

Session 4

3:00 - 4:00

4A/ Intro to Fast Fed (new passport standard)

4B/ 101 MFA, 2FA, FIDO

4C/ Intent in Open Source

4D/ 10_Foot Platforms – Device Pairing

4E/ AI DAO’s & ID

4F/ JLINO Deep Dive – Tip Toe in Shallow End

4G/ End-to-End Crypto SDK for Deve

4H/ Picos Everywhere

4J/ Identity Storage and Compute (contained)

Session 5

4:00 - 5:00

5A/ Token Binding – Proof-of-Possession for cookies, ID Tokens JWt’s & OAuth Tokens

5B/ Blockchain 101

5C/ Why isn’t IIW Wiki Secure?

5D/ HashO: IO Protocol – Web of Trust + Blockchain + Proof of Work + IPFS

5F/ Intro to Sovrin

5G/ Intuition, Identity, Internet

5H/ Beyond OAuth2: End-to-End Microservice Security

Wednesday May 3, 2017

Session 1

9:30 - 10:30

1A/ DID 101 – Decentralized Identifiers & how they are the key to interoperable self-sovereign ID

1C/ IEEEE/SA, Evernym, iRespond, SWIRLS – ADV The Human STD Hackathon (100K Refugee Framework)

1G/ Fair Dice Roll’s in On-Line Game’s using Blockchains

1I/ Application Identity and Trust in Healthcare and beyond

Session 2

10:30 - 11:30

2A/ How to Live with Shadow IT

2C/ Neural Science of Persuasion

2G/ Attestations and Identity Data Formats

2H/ ID PRO Body of Knowledge & Taxonomy

2J/ Intro to Verifiable Cliams by W3C VCWG Members

2K/ Publice vs Private Data – What can we share?

Session 3

11:30 - 12:30

Session 4

2:30 - 3:30

4A/ Digital India II (part 2)

4B/ libsovrin Hacking – Zero Knowledge Proofs Selective Disclosure and Predicate Proofs

4C/ 5 Types of Privacy on DLT

4D/ End-User Identity Paradox “Curing Identity” – Don’t lose your phone #

4F/ Using Sovrin for Decentralized Student Profiles – A Proof of Concept

4G/ Identity Hubs Technical Resolutions and Planning

4H/ Correlation Marketing Solicitation (not criminal) and Identity

4I/ Trust Frameworks!

Session 5

3:30 - 4:30

Thursday May 4, 2017

Session 1

9:30 - 10:30

Session 2

10:30 - 11:30

Session 3

11:30 - 12:30

Session 4

12:30 - 2:00

Session 5

2:00 - 3:00