Iiw12 Proposed Topics

What topics are you planning to present about or lead a discussion about at this IIW?

 * - Open Reputation Framework- relationship of reputation to identity
 * Activity Streams, Microformats,
 * Backplane
 * Browser-based identity systems, client-side service discovery
 * Building a federated signon protocol based on OAuth2
 * Centering identity data in the browser - maybe
 * "Continuing development of the FreshBooks Add-on Store and gadget environment; efforts at The Small Business Web to standardize ""app stores""
 * Digital Birth Certificates (as described by Siegel) / PDS for things
 * Ethically Monetize Data.Calculating Privacy Risk.Data context and blurring models.
 * Identity and digital assets on the web. User centric distributed data stores.
 * Inconsistency Robustness
 * Information sharing agreements
 * Legal Standards, Market and community rules structures, risk and liabilitiy mitigation online, addressing privacy and security issues
 * multiple identities
 * Not planning to lead, since this is my first. However, I can bring a perspective on how an MSO is approaching Identity.
 * Not sure yet
 * NSTIC
 * NSTIC - Industry partnership
 * NSTIC revisited, in the US and EU
 * OAuth in the enterpriseStrong auth
 * OAuth, JWT, SWD, OpenID
 * openID ABC
 * OpenID Evolution To A 4-Party Model (IdP,RP,User, AP (Attribute Provider).OpenID Proxies, Good or Bad Idea?NSTIC
 * OpenID, OAuth
 * OpenID, OAuth, Enterprise, OpenStack
 * PDS, personal trust frameworks
 * Portable Contexts & The Portable Context Community Prototype
 * Privacy and identity
 * PuSHEE - PubSubHubbub Enterprise Engine
 * Security analysis of double-redirection protocols + PKAuth: social login for unregistered applications
 * Social web and Mozilla. Drumbeat website. Ongoing work on Identity and Badges.
 * SquareTag - Enabling unconnected things to participate in the Internet of Things
 * The opportunities afforded by wide-spread adoption of transparency, unique-identity and real-identity verification, and trust networks.
 * The state of Activity Streams.
 * UMA; user-centric identity; risks involved; quality
 * User experience design of Smart manager
 * User Managed Access (3)
 * Using the DNS as a personal contact info repository.Explanation of .tel domains.
 * VPI; Mydex community prototype
 * VRM / Personal RFP
 * VRM / Fourth Parties
 * VRM / r-button / emancipay
 * VRM / health care / self-tracking / personal informatics
 * VRM / GRM (government relationship management)
 * VRM + CRM
 * web security

What are you hoping to learn about or hear a presentation about at IIW?

 * 3rd party data access -- sites that scrape data I maintain on my primary site/profile.  How is that protected, governed...
 * All
 * as much as I can
 * Authentication, authorization and social login protocols
 * business caseattribute verificationsocial sign on in relation to data agregators
 * Business models that would enable a large financial institution to succeed as an Identity Provider for its customers.
 * connect.me, universal login, government id
 * Digital Death, Information Privacy, VRM
 * economics of identity, models of privacy and security, stable equilibria in the identity space
 * Evolution of trustworthy identity and credentialing
 * Evolving business modelsRegulatory landscapeData gathering toolsSemantic tools for organizing free-form data
 * Federated login. OpenIdConnect.
 * gnarly problems
 * Grounding in 'big picture' issues, especially challenges of a multi-faceted identity, and some practical info. about implementation in institutions
 * I want to become more familiar with the existing community of developers.
 * I would like to learn about how identity providers can offer or enable a wide range of applications without operating each service infrastructure.
 * Identity and Access Management used on the Internet for B2C. Mutual Authentication/Assurance of the Identity and it's lifecycle (from provisioning to end of life)
 * implementing Trust Frameworks; Refining OpenID ABC
 * many thoughts related to human centric view of management and use of identity
 * Methods for coalescing identity, working with personal data stores
 * Neat Things
 * NSTIC
 * OAuth 2 progress, PDS/PDX
 * OAuth 2, OpenIDConnect, OpenSocial, SAML (3)
 * OAuth 2.0, OpenID Connect
 * OAuth 2Consumer/Enterprise identity bridges
 * OAuth, JWT, OpenID Connect, SAML, use cases that cross the enterprise/individual divide
 * OAuth2
 * OAuth2, OpenID ABC progress, security
 * Oauth2, UMA, PDS, verified claims (3)
 * Ongoing work in open standards re: identity.
 * OpenID ABC, OAuth2, Identity in the Browser, Login UX
 * OpenID Connect, UMA, OAuth (2)
 * OpenID Strategic DirectionPersonal Data Exchanges
 * OpenID, OAuth
 * OpenID, OAuth, OpenID Connect, authentication, privacy, security
 * PDS (databanks),
 * VRM, VRM+CRM,
 * future of media, future of advertising,
 * future of TV, Quora as Disputation Arena,
 * real-time location-based services in the personal data ecosystem;
 * what does it mean if this person and his ideas (http://www.tubechop.com/watch/126638) are leading the US Dept. of Commerce and informing President Obama's long term vision for our country and the world?
 * PDS topics, VRM, Portable Identity
 * Personal Data Ecosystem (2)
 * personal data stores
 * Personal data stores, data portability
 * privacy and user-centric identity; protocol flows
 * Standardization, especially relating to OAuth and OpenId
 * Take it all in and hope I understand it.
 * The death of internet identity.
 * The status of online identity; sharing experiences and getting inspiration for future directions
 * The status of OpenID Connect.
 * Trust frameworks for consumer web sites
 * User expedrience case studies
 * What is the impact of NSTIC?
 * Whatever is next
 * Whether OpenID is still relevant to anyone.

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW.

 * applications and implications of formal identity verification vs. aggregation of reputation
 * development milestones/challenges, adoption milestones/adoption, user acceptance,
 * Feedback on client-side discovery systems; whether anyone would adopt as relying or originating party; client-side claim discovery and relay systems
 * How are others controlling and even redacting access from vendors outside of the IdP?
 * how best to move forward
 * How do Identity providers address the need to provide multi-tenant Identity environments. Are there there issues around Identity that should impact a company's data management strategy?
 * how do you make incentives on the vendor side.
 * How to create a federated signon ecosystem in the Internet based on open authentication standards
 * how to ensure quality and privacy with user centric protocols
 * How to get past the present state of internet identity.
 * How to insure real privacy and security in Federated Identity Systems.
 * IDaasManaging identity and user data across enterprises and clouds
 * Is OpenID Dead? If so, where next?
 * Is there an alternative to Facebook?
 * Liability issues for Identity Providers
 * Linkage of user-centric identities between audience and advertiser ecosystems
 * Need for strong identification of relying party without registration (2)
 * Next evolutionary steps
 * Oauth2, UMA, PDS, verified claims
 * Possible improvements to the ux design of Smart manager
 * Standards and adoption
 * standards, VRM, personal data stores/services, 4th party services
 * Universal Cloud ID by way of reinventing the password while providing maximum security with absolute simplicity.
 * Ways of making it easy for the data producer to control data dissemination.Measurement of, and patterns in, user privacy sensitivity ratings
 * What are all users needs. What do we want the systems to do
 * What are the major privacy issues, and how are they addressed.
 * what creates value what are we protecting against
 * What does a competitive identity ecosystem look like? What are the features of stable equilibria? How do we avoid a winner-take-all market model.
 * What non-technical challenges most hinder wide-spread adoption of better security and authentication?
 * What role, if any, should government and the law play in facilitating the emergence of the PDS / VRM paradigm?
 * where do we see the business case for LoA 2 and higher, who will drive the market? Why are service providers reluctant to adopt infrastructure. To much technology push?
 * Whether federated social networking systems will ever create sufficient value to cross the initial chasm of significant usage.
 * Why choose which balance between the user's and the identity/service provider's interest; what privacy concerns are reasonable