IIW 14 Proposed Topics

What topics are you planning to present about or lead a discussion about at this IIW?

 * Multi-assertion authentication
 * Attribute Exchange Trust Frameworks. Attribute Provider Networks.
 * OpenID Connect, OAuth, FICAM, NSTIC
 * SCIM
 * XDI, OpenID Connect 1.0
 * Roadmap for rapidly advancing VRM adoption.
 * OpenID Connect, OIX, OAuth, Identity Provider Businessmodels
 * VRM
 * Customer Care for federated identities
 * customer commonsuser-driven personal data
 * Trust Framework Meta Model
 * NSTIC, Identity Ecosystem Business Models, Identity Attributes
 * OpenID ConnectOAuthJSON Cryptography
 * Step-up authentication, mobile 2-factor AuthN
 * Customer Care for federated identities
 * customer commonsuser-driven personal data
 * Trust Framework Meta Model
 * NSTIC, Identity Ecosystem Business Models, Identity Attributes
 * OpenID ConnectOAuthJSON Cryptography
 * Step-up authentication, mobile 2-factor AuthN
 * Backplane 2.0
 * standards/techniques for proxy authentication
 * NSTIC - pre secretariat effort
 * ACBio
 * Personal data stores: cloud based? Local based? mix? level of security? ... <-> Benefits to individuals
 * Personal data tagging: an utopia? what would be the requirements? the benefits?
 * In a VRM world, how to manage the transparency of the relationship? Trusted identities?
 * SCIM, OAuth, OpenID Connect
 * UMAAPI access control
 * Metadata for scalability in OpenID Connect
 * Interested in business opportunities associated with user-centric identity, personal data stores, VRM.
 * explaining identity to non-technical stakeholders
 * SCIM
 * Standard Information Sharing Labels
 * Building a VRM Startup
 * Building a "Fourth Party" for a Vertical Market
 * The effect of identity and privacy polices on people in marginalized communities
 * accessibility, disability, and identity online
 * Initiatives for distributed networks (e.g. FreedomBox) and their role in PDE and VRM

What are you hoping to learn about or hear a presentation about at IIW?
compliance with agreements amongst IDM players (IDP, Attribute Provider, RP, User) and also liability in case of non-performance?
 * AttributeExchange, OpenIdConnect, OAuth2, UMA, NSTIC, OIX
 * Roadmap for rapidly advancing VRM adoption.
 * SCIM, BYOI
 * SCIM
 * Current standards and new directions and ideas.
 * VRM and Personal Data Ecosystem efforts, OpenID Connect, Account Chooser, Backplane Exchange
 * Business value of an IDP
 * NSTIC
 * OpenID Connect, OAuth 2
 * Customer Care for federated identities
 * customer commonsuser-driven personal data
 * Trust Framework Meta Model
 * NSTIC, Identity Ecosystem Business Models, Identity Attributes
 * OpenID ConnectOAuthJSON Cryptography
 * Step-up authentication, mobile 2-factor AuthN
 * Giving users control of their data, building tools that access that data without giving it to another service provider.
 * NSTIC, OpenID Directions, Personal Data Directions, Real Privacy for Everyone
 * ImplementationsInterop
 * 2-factor AuthN, interested in NSTIC
 * OAuth2, SCIM, OpenID Connect
 * Federation
 * actual technology privacy problems and trends for solving these issues, both theoretical as well as practical
 * transitioning large organizations to standards based identity
 * OAuth, OpenID Connect, NSTIC, Privacy, enterprise awareness, cutting edge advancements
 * identity provisioning, identity sync
 * Networking, VRM, User-Centric Identity, Networking, Networking
 * OAuth2 future steps/4th party auth/Auth in mobile platforms/Auth for e-commerce sites
 * Lots been said and promoted about Identity Trust Frameworks. Are there any alternatives to Trust Frameworks that can help enforce
 * Interoperability standards (between browsers, databases, companies and organizations)-Identity standards-VRM interoperabilty with CRM?
 * OAuth OpenID etc. NSTIC. Identity business models.
 * OAuth, OpenID Connect, JWT futuresNSTIC and FICAM news
 * AccountChooser
 * Use cases of how OpenID/Connect is being used
 * Use cases of online identity verification and what organizations are looking for in these solutions. Including challenges; leading technologies/services being implemented and; what’s working and what’s not.  Additionally, any updates on any of the identity verification Pilots that are being discussed and/or taking place.
 * Better understand the state-of-the-art and future direction in IDM, PDS, user-centric identity, personal data ecosystems, VRM...
 * secure authentication strategies for distributed identity management
 * OAuth, SCIM
 * SCIM
 * Challenges, opportunities and informed investors for startups implementing VRM principles and user centric identity
 * How technology development is affecting identity and privacy standards….

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
8 User experience
 * How to get VRM on wheels
 * locus of control
 * Verification of user-provided identity attributes. How can we know that what users tell us about themselves is true?
 * Customer Care for federated identities
 * customer commonsuser-driven personal data
 * Trust Framework Meta Model
 * NSTIC, Identity Ecosystem Business Models, Identity Attributes
 * OpenID ConnectOAuthJSON Cryptography
 * Step-up authentication, mobile 2-factor AuthN
 * How can we build client web applications that access a distributed social data network, which do not require each user to copy their data to the
 * company that built the client application?
 * shortcomings of identity as the uniting metaphor for trust frameworks
 * Claims ProvidersBusiness Models
 * Is there a market for user controlled mobile phone based 2-factor AuthN?
 * responsibility, whose responsibility is privacy, who is liable for what, etc.
 * how to choose when to use cloud based identity credentials versus client based credentials
 * Define the intersection of user-centric, enterprise, relying parties, who, when, how? Define OAuth in layman's terms.
 * standards and security related to interop between identity providers and identity consumers
 * privacy and security
 * To make timely progress on solutions based on open standards, it seems essential that user-centric identity requirements are debated in the community,
 * solidified and then formalized in an appropriate standards body to drive technical specifications development.
 * Identity recognition and management: where are we today? Where are we going tomorrow?
 * How VRM companies can become supportive of each other
 * I’d be interested in examples of levels of assurance.
 * User-centric ID is the focus here and the right thing to do, but funding and the big winners on the business side are FB, Google, LI and so on.
 * How can user-centric ID be commercially successful? What can we do as an industry to move the needle?
 * Identity management for minors
 * Why are we still talking "user-centric"?
 * What kind of control can people have over their own data?