Iiw2008a

OUR NEXT INTERNET IDENTITY WORKSHOP

is Nov 10-12 IN Mountain View.

Conference Information
Announcement

Notes 2008a

Blog Posts 2008a

STARTING TIMES:
 * MONDAY - 1pm
 * TUESDAY - Breakfast at 8 - BEGINNING at 8:30
 * WEDNESDAY 8:40 first session at 9

Registration

Lodging

Monday Program

Design Team

Attendees 2008a

Proposed Topics 2008a

May 15 Data Sharing Summit - IIW attendees are invited to stay for the event.

What Is This Workshop About?
The heart of the workshop is a practical idealism in working towards the shared vision of a decentralized, user-oriented identity layer for the Internet.

Because the web was built around "pages", no tools or standards were created to control how the information about you was collected or used. At the Internet Identity Workshop we bring the people creating these tools and standards so people can safely manage their online identity and control their personal data.

It is not about any one technology - rather it is a place to discuss multiple interoperating (and possible competing)  projects, standards, and networks for identity, data sharing, and reputation.

As part of Identity Commons, the Internet Identity Workshop creates opportunities for both innovators and competitors. We provide an open forum for both the big guys and the small fry to come together in a safe and balanced space.

There are a wide range of projects in the community:
 * 1) Open conceptual, community, and governance models.
 * 2) Open standards and protocols.
 * 3) Open source projects.
 * 4) Commercial projects.
 * 5) Projects to address social and legal implications of these technologies.
 * 6) Efforts to rethink the business models and opportunities available with these new technologies.

User-centric identity is the ability:
 * To use one's identifier(s) on more then one site
 * To control who sees what information about you
 * To selectively share presence and profile information
 * To maintain multiple identities and personas in the contexts you wish
 * To aggregate attention, navigation, and purchase history from the sites and communities you frequent
 * To move and share your personal data, relationships, documents, and other publications as you wish

All of the following are active topic areas at each IIW:
 * Improving Existing Legal Constructs
 * Privacy Policies
 * Terms of Service
 * Creating New Legal Constructs
 * Limited Liability Personas
 * Identity Rights Agreements
 * Creating New Business Models
 * Identity Oracle
 * I-Brokers
 * New Citizenship Perspectives
 * Activism
 * Community Event Coordination
 * Community Identity and Data Sharing

Who Participates in IIW?
Innovators who participate in IIW include the leaders of:

Open Standards

 * OpenID
 * SAML
 * Liberty Alliance ID-WSF
 * WS-Trust
 * OAuth
 * OASIS XRI
 * OASIS XDI
 * XRDS-Simple

Standards Interop

 * OSIS
 * Concordia

Major Information Card Projects

 * CardSpace
 * Higgins Project
 * Bandit
 * The Pamela Project Relying Party Code

Browser Based Card Selectors

 * Higgins Project (offers both browser-based and native card selectors)
 * openinfocard

Multi-Protocol Open Source Projects

 * Higgins Project (supports Information Cards, OpenID, SAML, XRI, XDI)
 * Shibboleth
 * CAS (supports OpenID, SAML, prototype Information Card support)
 * Bandit
 * OpenSSO (supports SAML, Liberty ID-FF/ID-WSF, WS-Federation, Information Cards, OpenID)

Industry Consortia

 * Identity Commons
 * Liberty Alliance
 * OASIS ID Trust
 * ITU-T Focus Group on IdM and subsequent activity.

Groups Addressing Legal/Social/Business Issues

 * PPEG Privacy Summits Liberty PPEG Privacy Summits
 * Project VRM
 * Liberty Alliance Identity Assurance Framework
 * Liberty Alliance Identity Governance Framework

How Does It Work?
Like the last IIW, we plan to organize this event using open space principles. We will make the schedule when we are face to face the morning of the 2nd day of the conference. We do this in part because the field is moving so rapidly that we your organizing team are in no position to know what needs to be talked about. We do know great people who will be there and it is the attendees who have a passion to learn and contribute to the event that will make it.

Also like the previous three workshops, we will hold IIW2008a at the Computer History Museum. The space there is perfect for this kind of event. We expect a large and energized community to attend and are counting on plenty of participation. Don't be put off by that, however, if you're just getting into this. Come and learn--the first day is designed to get everyone up to speed. You won't be disappointed.

Sector Invitations