Pages with the fewest revisions

From IIW
Jump to: navigation, search

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Strangers in the Net: When the RP is a Real Person (TH5H)‏‎ (2 revisions)
  2. How Agents + Decentralized Interfaces Help The De-Siloazation of IoT‏‎ (2 revisions)
  3. What is the MYDEX Prototype?‏‎ (2 revisions)
  4. Put a Roter File into a Blockchain‏‎ (2 revisions)
  5. Lawyers + Accountants‏‎ (2 revisions)
  6. MAFA Mistaking AUTHN for AUTHZ‏‎ (2 revisions)
  7. PDE- Why would anyone adopt?‏‎ (2 revisions)
  8. Personal Analytics and Insight for Consumers – using Personal Data to Enlighten the Individual‏‎ (2 revisions)
  9. Crypto SSO on Mobile‏‎ (2 revisions)
  10. Personal Data Startups Connect and Catalyze – next steps and PDEC StartUp Map (stages, models, patterns)‏‎ (2 revisions)
  11. Hardware Based ID Exchange for Social Networks‏‎ (2 revisions)
  12. Surveillance Identity and YOU‏‎ (2 revisions)
  13. Where Does Your Project/Product Fit in the Personal Cloud Markey Matrix‏‎ (2 revisions)
  14. RP Challenges to Federated Login‏‎ (2 revisions)
  15. 4B/ libsovrin Hacking – Zero Knowledge Proofs Selective Disclosure and Predicate Proofs‏‎ (2 revisions)
  16. Enterprise OAuth BOF‏‎ (2 revisions)
  17. SCIM 101‏‎ (2 revisions)
  18. 5J/ How do People Manage Identities? Prelim findings from user research in India‏‎ (2 revisions)
  19. Identity Quartet and User Driven Identity‏‎ (2 revisions)
  20. A Self Sovereign Technology of Stack HIE of ONE‏‎ (2 revisions)
  21. VRM + CRM Part2 The VRM Strikes Back‏‎ (2 revisions)
  22. Shifting Global Economy w-Identity‏‎ (2 revisions)
  23. Personal Hype Quotient:‏‎ (2 revisions)
  24. OAuth 2 Bootstrapping from device to browser (technical)‏‎ (2 revisions)
  25. Higgins 2: Open Source personal data service‏‎ (2 revisions)
  26. Telco/Web/Data Meta Story‏‎ (2 revisions)
  27. Digital Idenity in Smart-Device eve‏‎ (2 revisions)
  28. Blockchain Auth: Passwordless login with the Blockchain using JSON wcb tokens‏‎ (2 revisions)
  29. How to Manage Digital Multiple Identities Securely and Assuring Privacy on Internet‏‎ (2 revisions)
  30. 3A/ DKMS = Decentralized Key Management System‏‎ (2 revisions)
  31. Open Discussion: Identity Verification for People w/o Paper Trail‏‎ (2 revisions)
  32. Cat Herding – Building Consensus‏‎ (2 revisions)
  33. UX w/no logout...single sign out‏‎ (2 revisions)
  34. SCIM – As An ATTRUBUTE Provider?‏‎ (2 revisions)
  35. Common Ontology for Personal Data Interoperability – (Part 2) The What and How‏‎ (2 revisions)
  36. Freedom Box Update‏‎ (2 revisions)
  37. Implementing OpenID and OAuth‏‎ (2 revisions)
  38. Google’s OIDC’ish Auth Platforms on Android, Chrome, iOS‏‎ (2 revisions)
  39. Verified Identity Claims 1‏‎ (2 revisions)
  40. WHAT IS YOUR PROBLEM? (Bring Me Research)‏‎ (2 revisions)
  41. Introduction to OAuth2 (101)‏‎ (2 revisions)
  42. Beautiful Payment Systems w/OAUTH‏‎ (2 revisions)
  43. Proxy Auth for Native App Hosts‏‎ (2 revisions)
  44. The Emerging Field of Consent Management – Next Gen UI Infrastructure Under the Hood‏‎ (2 revisions)
  45. One Social Web . org‏‎ (2 revisions)
  46. Putting Informed in Consent‏‎ (2 revisions)
  47. Lawyers and Accountants‏‎ (2 revisions)
  48. OpenID Foundation Update‏‎ (2 revisions)
  49. 5D/ HashO: IO Protocol – Web of Trust + Blockchain + Proof of Work + IPFS‏‎ (2 revisions)
  50. A Conversation About RECOVERING…. A Forgotten Credential Security‏‎ (2 revisions)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)