Iiw13 Proposed Topics
From IIW
What topics are you planning to present about or lead a discussion about at this IIW?
- "Those Sneaky Bastards," an independent .org created to promote legal literacy (using humor and interactive tools), encourage transparency in online dealings, and foster the development of new legal tools that assert and preserve individual freedoms online.
- systems map of the identity space
- trust framework meta model
- Trust Frameworks
- Mobility
- NSTIC Standards Landscape (see http://www.slideshare.net/JamieXML/standards-brainstorming-nsticiiw13 )
- NSTIC (various sub-topics)
- NSTIC
- NSTIC ecosystem architecture
- Using a mobile device and QR codes to replace passwords
- OpenID,
- (2)OpenID Connect,
- OpenID connect in LiteratureDigital Receipt?
- OpenID IdM for Mobile network operators
- pushee
- oauth2
- XDI
- WWW-Authentication with non-401 responses.
- Difference of security indicator between browsers.
- personal data stores
- Enterprise cloud identity integration
- Data Portability
- Data Portability (war, hype, and resolution)
- SCIM
- Identity and Innovation
- Pseudonimity
- OAuth
- 4th party roles and tasks
- Respect Trust FrameworkConnect.MeXDIp
- Personal Data Ecosystem
- OneID and user centric identity
- Needs for trustworthiness overall, of which NSTIC is just one component
- Cross Sector Digital Identity Program (NSTIC POC)
- A global identity system based on EMV bankcards
- Architectures for integrating secure authenticated identities with large numbers of barely authenticated pseudonymous identities
- user-centric identity and the academic research lifecycle; user-centric identity and K-12 schools
- Trust framework Attribute Provider and Attribute Provider Network services
- Identity Management in the Investment Industry
- End to End Trust, Personal Data Model, NSTIC, Cross Sector Digital Identity Project
- New Identity Verification Technologies and Attribute Providers
- OpenID Connect InteropOAuth 2.0 Interop
- BrowserID
- The progress Virginia has made with its authentication project
- Authentication is better backward: Server based relationships
What are you hoping to learn about or hear a presentation about at IIW?
- UMA; privacy & trust frameworks
- openid connect,
- BrowserID/WebID convergence
- SCIM (3) Simple Cloud Identity Management
- new trust frameworks
continue the conversation
- OpenID connect,
- future of OpenID and web IdM
- NSTIC - technologies and standards for NSTIC
- NSTIC; Identity management in CyberSpace
- OpenID Connect
- Personal Data Ecosystem Consoritum
- the ecosystem of attribute providers
- Browser integration of authentication/authorization.
- User-centric identity (e.g. BrowserID)
- BOF experiences
- Really interested in the role design and designers can play in the challenges of online identity.
- Establishing a validated identity, selectively revealing same (methods, practices).
- Practical empowered personal data sharingtrust models/frameworks OpenID Connect and UMAtrusted claims
- SAML, OAuth, OpenID
- Personal data management and syndication, distributed authentication, available open standards
- States role in NSTIC
- Needs of different stakeholders
- SCIM
- Identity and Innovation
- Implementing standards for identity systems
- Get feedback on the Connect etc.
- web relationships w/user-centric identity, disaggregating authority
- NSTIC, oAuth, transactional assurance
- OpenID Connect, OAuth 2.0, XACML, NSTIC
- I am there because of OAuth, the new JSON work and to hear about the ongoing efforts in OpenID Connect.
- Real names policies.
- RealNames/Nymwars, NSTIC
- OpenID Connect UMAVRM
- Helping Gates Foundation get a handle on the Personal Data community for their "Shared Learning Collaborative" project
- NSTIC personal data
- OpenID and user centric identity
- Pros and Cons relating to NSTIC
- Learn from various BOF in attendance
- Data Portability, Internet Identity, Privacy, Data Ownership
- Trust Frameworks
- Innovative ideas for achieving good identity management
- Mobile, OAuth, FICAM, NSTIC
- Security, Identity, Authorization, Authentication
- More about OAuth, NSTIC, UMA, etc.
- Federation
- OAuth
- NSTICVRMIdentity Provider accreditationAuthentication in the face of CA compromises
- OpenID Connect, NSTIC
- Legal and policy development for IDP, RP, ATP participation in Trust Frameworks.
- Interested in learning more about the NSTIC initiative and the potential within the Investment Industry to leverage identities
- OAuth and its extensions, user-centric identity, UMA
- Identity in the Browser
- Use cases for identity assurance data
- OpenID Connect & OAuth use cases
- NSTIC, business models, trust frameworks and privacy
- OAuth 2.0OpenID Connect
- I am interested in learning about what other states and organizations are doing in regards to authentication and how those efforts relate to NSTIC.
- The latest identity thentication technolgy proposals
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW.
- How to finally solve the web identity issue, and help promote the user-controlled decentralized social/semantic web.
- Next generation of selectors
- How can we think about an identity system that resembles in-person identity but takes advantage of the unique characteristics of the internet?
- How does the user-centric community view Trust Frameworks (TF)? How can we better connect TF to User-centric community?
- Partnerships for my intellectual property.
- State of the art in establishing a validated real-world identity behind online identities.
- Practical empowered personal data sharingtrust models/frameworks OpenID Connect and UMAtrusted claims
- How will consumers package their personal data for controlled release to third-parties? How will data discovery work in this context? Syndication?
- What are new needs that require system support in relationships of individuals and groups?
- SCIM
- OpenID Connect, UI for Login, Attribute Exchange and Authorization, OAuth.
- Making an open identity system work as a "standard"
- Claim-centric approach. Privacy.
- How can we give users and sites what they need without presuming monolithic authority?
- Assurance standards
- What is a creditable attribute source? Users, authorities, etc.
- OpenID identifiers and account chooser
- What Open Source implementations should we be looking at?
- How are we going to grow a personal data ecosystem?
- We need to find a viable private sector IDP business model that can honor NSTIC privacy principles
- Data portability, Internet Identity, Data Ownership
- How to achieve strong identity assurance
- How organizations can intelligently pursue their interests, while fully honoring the right of users
- Identity proofing and verification, federation, levels of assurance, standards, regulation, NSITIC, new services
- The reality of VRM - not technical, but commercialWhere is the business model in identity provision?Is identity a utility?What emerging technical standards will prevail?
- enterprise IdM and user privacy
- RP and User market adoption strategies; methods for lowering User friction in verifying User attributes; Marketing techniques to drive user-centric identity.
- Ownership, Portability, Privacy
- business models, federation, privacy
- I'd like to discuss about* discovery and dynamic registration in OpenID Connect* OAuth 2.0 severs' plan to update their implementation from draft 10 to latest draft.
- - how to handle authentication in standalone/mobile apps- how to provider intuitive privacy-protecting solutions
- Authentication levels; proofing players and process; mechanisms that will make it work, policy/legal implications, roadblocks, national collaborative effort using NSTIC as a national framework.
- Impoving identity authentication and convenience for the Internetuser