Uncategorized pages

From IIW

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. "DIF Universal Resolver and Universal Registrarhttps://uniresolver.io/, https://uniregistrar.io/"
  2. "Entity and Object Identifiers: Bringing assurance and immutability to a decentralized network"
  3. "IIW SSI Spotlight: 5 Priority Topics of the SSI-Community 1 wallet backup, 2 on-device credential sync, 3 public DID verification, 4 control over public DIDs, 5 third-party identities"
  4. "KERI (A) Key Event Receipt Infrastructure. A ledger agnostic framework for decentralized identity. KERI unifies many DID methods types.
  5. "Mouse Head Model (MHM): A global solution for safe and secure data sharing"
  6. "NSTIC Day" Proposed Agenda
  7. "Today Geekdom, Tomorrow the World"
  8. $1M Does Your Project Stack Up? Come find out
  9. (In)Coherent Web (in)security Policy Framework
  10. (in)Security Questions
  11. (new?) Business Models Based on Reputation
  12. 0G/ Women's Breakfast
  13. 101 Introduction to DID’s, Verifiable Claims and Blockchains
  14. 101 Introduction to OAuth2
  15. 101 Introduction to OpenID Connect
  16. 101 NIST – Digital Identity Guidelines ‘101’
  17. 101 Session: Verifiable Credential Handler (CHAPI) and DIDComm
  18. 101 Session - Open ID Connect
  19. 101 Session - SSI and Decentralized Identity
  20. 101 Session - UMA User Managed Access
  21. 101 Session / Introduction to UMA = User Managed Access
  22. 101 Session / NIST Digital Identity Guidelines
  23. 101 Session / Open ID Connect
  24. 101 Session / Self-Sovereign Identity (SSI) DID’s, Verifiable Claims etc…
  25. 101 Session OAuth2
  26. 10A/ Don't use DIDs, DIDs, nor DIDs: Change My Mind (a.k.a. Oh no he DIDn't)
  27. 10A/ The Principles of SSI
  28. 10B/ Making The Intention Economy Happen, Part 2
  29. 10C/ Bypassing eSignature Regulations for SSI Adoption
  30. 10C/ COVID Credentials Initiative: Challenges & Learning
  31. 10D/ Directories in Distributed Identity
  32. 10D/ PBAC 102: Architecting Authorization to Protect Your Data
  33. 10E/ Initial Trust in SSI Triangle - Analysing Trust Relationship, Existing and New Mechanisms
  34. 10E/ Integrating FIDO with Verifiable Credentials (8.30 am start)
  35. 10F/ Ideas to Action: BYOB (Bring Your Own Blockers)
  36. 10G/ KERI for Wizards
  37. 10G/ Verifiable Credentials for Authentic Data in the Supply Chain
  38. 10H/ Self-Sovereign Communities of Self-Sovereign Agents
  39. 10I/ Internet Governance - UDDI - Universal Declaration of Digital Identity
  40. 10J/ OpenID Connect 4 Identity Assurance
  41. 10L/ Dynamic Data Economy: Digital Identity, Authentic Data Flows, Data Mesh and other dragons
  42. 10O/ GS1 Digital Links, DIDs, and VCs…issuing from HTTPS
  43. 11A/ IIW verifiable credentials - Decentralized VC integration with Eventbrite and Qiqo chat. This session will review the implementation process, lessons learned, and community discussion on related use cases.
  44. 11A/ Service Delivery & Ecosystem Management with Verifiable Credentials (VC)
  45. 11B/ Group Credentials/Multi-Issuer Credentials
  46. 11C/ Rugged Identity: resilience for Identity of Things to bad latency, signal, power, physical integrity.
  47. 11C/ Unified Front for SSI/DI Messaging
  48. 11D/ After OAuth2: ZCAP or GNAP?
  49. 11D/ DIDComm V2: Implementation and integration 'technical' - did:key and did:keri resolvers, seamless and partial integrations-
  50. 11D: Webfinger aka Personal Web Discovery

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)