mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-10-01 01:05:54 -04:00
1181 lines
111 KiB
Markdown
1181 lines
111 KiB
Markdown
|
---
|
|||
|
title: IIW Session Topics
|
|||
|
description: Session topics from the Internet Identity Workshop over the past 15 years
|
|||
|
excerpt: "If you want to stay current in digital identity, keeping an eye on the session topics of the bi-anual internet identity workshop is a good place to start."
|
|||
|
categories: ['Workshops']
|
|||
|
permalink: workshops/iiw/
|
|||
|
last_modified_at: 2020-11-03
|
|||
|
---
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
## [IIW 15](https://iiw.idcommons.net/IIW_15_Notes)
|
|||
|
[Book of Proceedings](http://iiw.idcommons.net/File:IIW15_Book_of_Proceedings.pdf)
|
|||
|
### Tuesday
|
|||
|
#### Session 1
|
|||
|
- [Identity Clearing House – Loosely Coupled open standards based architecture for Identiy in the extendedenterprise](https://iiw.idcommons.net/Identity_Clearing_House_%E2%80%93_Loosely_Coupled_open_standards_based_architecture_for_Identiy_in_the_extendedenterprise)
|
|||
|
- A2P3
|
|||
|
- [Rhetoric – How do we talk plain language about Identity and Personal Data?](https://iiw.idcommons.net/Rhetoric_%E2%80%93_How_do_we_talk_plain_language_about_Identity_and_Personal_Data%3F)
|
|||
|
- [Privacy by Design – New Oasis Tech comm.. for Sotware Engineers](https://iiw.idcommons.net/Privacy_by_Design_%E2%80%93_New_Oasis_Tech_comm.._for_Sotware_Engineers)
|
|||
|
- [Focus on Consumer – Turning fear into excitement, delight about Personal Data](https://iiw.idcommons.net/Focus_on_Consumer_%E2%80%93_Turning_fear_into_excitement,_delight_about_Personal_Data)
|
|||
|
#### Session 2
|
|||
|
- [Respect Network Founding Partners](https://iiw.idcommons.net/Respect_Network_Founding_Partners)
|
|||
|
- IDESG – Mgt Council CAll
|
|||
|
- [VRM Challenge: Let’s Fix Subscription Bin from Customer Side](https://iiw.idcommons.net/VRM_Challenge:_Let%E2%80%99s_Fix_Subscription_Bin_from_Customer_Side)
|
|||
|
- IDP - Initiated Layin and Deep Linking for Open ID Connect
|
|||
|
- Mobile Specific Open ID Connect use Cases
|
|||
|
- [Anonymous – political, institutional, cultural and memitc organization without identity](https://iiw.idcommons.net/Anonymous_%E2%80%93_political,_institutional,_cultural_and_memitc_organization_without_identity)
|
|||
|
#### Session 3
|
|||
|
- Connect Me and miiCard “Trusted Reputations”
|
|||
|
- Account Chooser Launching – Taking the AC Show on the road this autumn – help write the show
|
|||
|
- [Account Chooser Launching – Taking the AC Show on the road this autumn – help write the show](https://iiw.idcommons.net/index.php?title=Account_Chooser_Launching_%E2%80%93_Taking_the_AC_Show_on_the_road_this_autumn_%E2%80%93_help_write_the_show&action=edit&redlink=1)
|
|||
|
- [Authentication on Mobile Devices – Crypto and](https://iiw.idcommons.net/Authentication_on_Mobile_Devices_%E2%80%93_Crypto_and)
|
|||
|
- Collaboration, Forking, and organic proliferation in the age of the personal cloud
|
|||
|
- [Customer Commons plus VRM Brainstorm](https://iiw.idcommons.net/Customer_Commons_plus_VRM_Brainstorm)
|
|||
|
- Death To NSTIC -2- Long Live NSTIC
|
|||
|
- Use Cases for Personal Clouds, Community Clouds, Family Clouds
|
|||
|
- Reputation Consulting .05 cents
|
|||
|
#### Session 4
|
|||
|
- [OAuth Security (Beyond Bearer Tokens)](https://iiw.idcommons.net/OAuth_Security_(Beyond_Bearer_Tokens))
|
|||
|
- NSTIC Pilot Overview – Attribute Exchange Network (AXN) / Demo
|
|||
|
- [Unleashing the Multimind – What’s next – or could be – in our most personal daily experience and utilization of all this stuff](https://iiw.idcommons.net/Unleashing_the_Multimind_%E2%80%93_What%E2%80%99s_next_%E2%80%93_or_could_be_%E2%80%93_in_our_most_personal_daily_experience_and_utilization_of_all_this_stuff)
|
|||
|
- [Building the Identity Ecosystem Framework](https://iiw.idcommons.net/Building_the_Identity_Ecosystem_Framework)
|
|||
|
- Kynetx – Personal Cloud Prototype
|
|||
|
- Consuming OpenID Connect 101
|
|||
|
#### Session 5
|
|||
|
- [OX Open Source – OpenID Connect and UMA / Demo](https://iiw.idcommons.net/OX_Open_Source_%E2%80%93_OpenID_Connect_and_UMA_/_Demo)
|
|||
|
- [Personal Analytics and Insight for Consumers – using Personal Data to Enlighten the Individual](https://iiw.idcommons.net/Personal_Analytics_and_Insight_for_Consumers_%E2%80%93_using_Personal_Data_to_Enlighten_the_Individual)
|
|||
|
- How will Identity plus VRM Change Real Estate and Mortgage Banking
|
|||
|
- [Secure Identity Without Username or Password](https://iiw.idcommons.net/Secure_Identity_Without_Username_or_Password)
|
|||
|
- Location = Control Control = Ownership – How addressing establishes ownership and what to do about it
|
|||
|
- XDI Personal Cloud Desktop
|
|||
|
### Wednesday
|
|||
|
#### Session 1
|
|||
|
- Sales Force Identity – The Facebook for Business (Part 2)
|
|||
|
- [OpenID Connect Session – Management and Login](https://iiw.idcommons.net/OpenID_Connect_Session_%E2%80%93_Management_and_Login)
|
|||
|
- [External Browser and Mobile Apps](https://iiw.idcommons.net/External_Browser_and_Mobile_Apps)
|
|||
|
- Identity and API Economy plus Privacy by Design
|
|||
|
- [The New Privacy](https://iiw.idcommons.net/The_New_Privacy)
|
|||
|
- Manufacturing, Registration Cards and Digital Birth Certificates
|
|||
|
#### Session 2
|
|||
|
- Sales Force Identity – The Facebook for Business (Part 2)
|
|||
|
- Hybrid Mobile/Nets App Auth With Oauth2 Trickery
|
|||
|
- Liberating Personae from Identity
|
|||
|
- OAOTH 2.0 RS – AS Token Query Flows
|
|||
|
- Customer Commons - The Magic Wand Project
|
|||
|
- [Consumers and Public Records](https://iiw.idcommons.net/Consumers_and_Public_Records)
|
|||
|
- [Personal Data Startups Connect and Catalyze – next steps and PDEC StartUp Map (stages, models, patterns)](https://iiw.idcommons.net/Personal_Data_Startups_Connect_and_Catalyze_%E2%80%93_next_steps_and_PDEC_StartUp_Map_(stages,_models,_patterns))
|
|||
|
#### Session 3
|
|||
|
- [Education Customers and Companies](https://iiw.idcommons.net/Education_Customers_and_Companies)
|
|||
|
- Google Identity Toolkey – What other problems should we research?
|
|||
|
- [Mobile SSO Password Proliferation…. Any solutions??](https://iiw.idcommons.net/Mobile_SSO_Password_Proliferation%E2%80%A6._Any_solutions%3F%3F)
|
|||
|
- [SCIM](https://iiw.idcommons.net/SCIM)
|
|||
|
- The act1v8 Project (VRM and Trust for Charity and Community Services
|
|||
|
- [DATA COOPS and BIZ Models](https://iiw.idcommons.net/DATA_COOPS_and_BIZ_Models)
|
|||
|
- [Customer 2 Business – Will Federation Really work?](https://iiw.idcommons.net/Customer_2_Business_%E2%80%93_Will_Federation_Really_work%3F)
|
|||
|
- [Social Intentions – Private App on Facebook to express your true intentions](https://iiw.idcommons.net/Social_Intentions_%E2%80%93_Private_App_on_Facebook_to_express_your_true_intentions)
|
|||
|
- Personal Cloud Prototype (Reprise)
|
|||
|
- Opportunities for Developers around Personal Cloud Cloudstore
|
|||
|
#### Session 4
|
|||
|
- Trusted Identities “You are who you say you are”
|
|||
|
- OIX (Axw6) Attribute Exchange Trust Framework – Progress Report
|
|||
|
- Attribute Exchange Technical Overview
|
|||
|
- [Health Record Banks – Personal Cloud for Health](https://iiw.idcommons.net/Health_Record_Banks_%E2%80%93_Personal_Cloud_for_Health)
|
|||
|
- Investors Corner / Where Investors and Entrepreneurs Come Together
|
|||
|
- MAKE HISTORY – Be the 1st to get a User-centric Next-gen Secure Private Identity
|
|||
|
- Security and Permission in Personal Cloud Connections
|
|||
|
- [SCIM – As An ATTRUBUTE Provider?](https://iiw.idcommons.net/SCIM_%E2%80%93_As_An_ATTRUBUTE_Provider%3F)
|
|||
|
- [World Economic Forum: Update on ‘Rethinking Personal Data’](https://iiw.idcommons.net/World_Economic_Forum:_Update_on_%E2%80%98Rethinking_Personal_Data%E2%80%99)
|
|||
|
- [Freedom Box Workshop](https://iiw.idcommons.net/Freedom_Box_Workshop)
|
|||
|
#### Session 5
|
|||
|
- [OpenID Graph 1.0](https://iiw.idcommons.net/OpenID_Graph_1.0)
|
|||
|
- [OIDF Workgroup – Account Chooser](https://iiw.idcommons.net/OIDF_Workgroup_%E2%80%93_Account_Chooser)
|
|||
|
- [Beyond Prophylaxis – Next Steps post ad and tracking blocking](https://iiw.idcommons.net/Beyond_Prophylaxis_%E2%80%93_Next_Steps_post_ad_and_tracking_blocking)
|
|||
|
W5F: KRL – XDI Integration
|
|||
|
- [correct house battery staple: Strong Passwords…. Passphrases.. are they still relevant/necessary?](https://iiw.idcommons.net/Correct_house_battery_staple:_Strong_Passwords%E2%80%A6._Passphrases.._are_they_still_relevant/necessary%3F)
|
|||
|
- [Personal Data and Gamification---Consumer use case Brainstorming focus on *Fun *Beneficial *Opt-In](https://iiw.idcommons.net/Personal_Data_and_Gamification---Consumer_use_case_Brainstorming_focus_on_*Fun_*Beneficial_*Opt-In)
|
|||
|
- [OATH 2 Dynamic Client Registration](https://iiw.idcommons.net/OATH_2_Dynamic_Client_Registration)
|
|||
|
|
|||
|
### Thursday
|
|||
|
#### Session 1
|
|||
|
- [Mapping the Identity Ecosystem Framework ‘A Whiter Shade of Gray” – (Input for NSTIC Plenary Next Week)](https://iiw.idcommons.net/Mapping_the_Identity_Ecosystem_Framework_%E2%80%98A_Whiter_Shade_of_Gray%E2%80%9D_%E2%80%93_(Input_for_NSTIC_Plenary_Next_Week))
|
|||
|
- [OAuth2 Chaining and Re-Delegation
|
|||
|
- [Personal.Com Blog Post
|
|||
|
- [11 Models of “Trust”
|
|||
|
- [Education and beyond… How to mamage new Privacy Risks on Rapid Moving trends](https://iiw.idcommons.net/Education_and_beyond%E2%80%A6_How_to_mamage_new_Privacy_Risks_on_Rapid_Moving_trends)
|
|||
|
#### Session 2
|
|||
|
- [IDESG Mapping Prep… Source Documents and SEEDS for Mapps (NSTIC)
|
|||
|
- [Wallets - Ours OR Google, Apple, ? (VRM)](https://iiw.idcommons.net/Wallets_-_Ours_OR_Google,_Apple,_%3F_(VRM))
|
|||
|
- [A Trust Framework for Open ID Connect AND beyond…. (with Unicorns)
|
|||
|
- [What is ‘Real Name” ?
|
|||
|
- [High Level Programming
|
|||
|
- [Webfinger](https://iiw.idcommons.net/Webfinger)
|
|||
|
#### Session 3
|
|||
|
- [OIDF Board Meeting
|
|||
|
- [UE for ID/PDE or UX plud Tech for IDENTITY across Devices ‘1 Enterprise Experience from Browsers to Washing Machines?
|
|||
|
- [Account Recovery: How can we do better? Without back doors?](https://iiw.idcommons.net/Account_Recovery:_How_can_we_do_better%3F_Without_back_doors%3F)
|
|||
|
- [Ultimate Realization of User Managed Contract / Terms and Policies Proffered by individuals](https://iiw.idcommons.net/Ultimate_Realization_of_User_Managed_Contract_/_Terms_and_Policies_Proffered_by_individuals)
|
|||
|
- [FED. SOC. WEB SUM.](https://iiw.idcommons.net/FED._SOC._WEB_SUM.)
|
|||
|
#### Session 4
|
|||
|
- [OAuth RoadMap (new specs, more interop, additional use cases)
|
|||
|
- [OIDF MTG #2
|
|||
|
- [Interesting Challenges of Bi-Directional Federated and Delegations
|
|||
|
- [Freedom Box Workshop](https://iiw.idcommons.net/Freedom_Box_Workshop)
|
|||
|
- [Open Source Personal Clouds / What, Why, How
|
|||
|
#### Session 5
|
|||
|
- [Intent Casting Prototype
|
|||
|
- [‘Group Therapy’ Being a Pioneer and Communicating You Vision to Stakeholders](https://iiw.idcommons.net/%E2%80%98Group_Therapy%E2%80%99_Being_a_Pioneer_and_Communicating_You_Vision_to_Stakeholders)
|
|||
|
- REDDIT are there lessons for the Identity Community in recent events?
|
|||
|
|
|||
|
## IIW 14 Notes - IIW
|
|||
|
[https://iiw.idcommons.net/IIW_14_Notes](https://iiw.idcommons.net/IIW_14_Notes)
|
|||
|
### Tuesday
|
|||
|
#### Session 1
|
|||
|
- [Film](https://iiw.idcommons.net/Film) (T1A)
|
|||
|
- [OAuth Overview for Beginners](https://iiw.idcommons.net/OAuth_Overview_for_Beginners) (T1C)
|
|||
|
- [Personal (Mozilla) Browser ID (protocol)](https://iiw.idcommons.net/Personal_(Mozilla)_Browser_ID_(protocol)) (T1D)
|
|||
|
- [NSTIC Update, Pilots, Government Recommendations](https://iiw.idcommons.net/NSTIC_Update,_Pilots,_Government_Recommendations) (T1E)
|
|||
|
- [VRM Intro (Vendor Relation Management) Developments](https://iiw.idcommons.net/VRM_Intro_(Vendor_Relation_Management)_Developments) (T1F)
|
|||
|
- [New to IIW / Identity etc… overview from Kaliya Q and A](https://iiw.idcommons.net/New_to_IIW_/_Identity_etc%E2%80%A6_overview_from_Kaliya_Q_and_A) (T1G)
|
|||
|
- [Identity Management for the Internet Advertising Ecosystem](https://iiw.idcommons.net/Identity_Management_for_the_Internet_Advertising_Ecosystem) (T1I)
|
|||
|
#### Session 2
|
|||
|
- [OIX Attribute Exchange Working Group (AXWG) Progress Update](https://iiw.idcommons.net/OIX_Attribute_Exchange_Working_Group_(AXWG)_Progress_Update) (T2A)
|
|||
|
- [OpenID Connect – The Intro](https://iiw.idcommons.net/OpenID_Connect_%E2%80%93_The_Intro) (T2B)
|
|||
|
- [Find Out And Control You Digital Footprint](https://iiw.idcommons.net/Find_Out_And_Control_You_Digital_Footprint) (T2D)
|
|||
|
- [XDI: what the hell is it? What is it good for? how does it fit with openID connect? Why isn’t it dead yet?](https://iiw.idcommons.net/XDI:_what_the_hell_is_it%3F_What_is_it_good_for%3F_how_does_it_fit_with_openID_connect%3F_Why_isn%E2%80%99t_it_dead_yet%3F) (T2E)
|
|||
|
- [DATA ----- the gap ------ Getting it (AHA!)](https://iiw.idcommons.net/DATA_-----_the_gap_------_Getting_it_(AHA!)) (T2G)
|
|||
|
- [Building a 4th Party VRM Start-Up](https://iiw.idcommons.net/Building_a_4th_Party_VRM_Start-Up) (T2H)
|
|||
|
- [OAuth and SASL / Open Issues “to http or not http….”](https://iiw.idcommons.net/OAuth_and_SASL_/_Open_Issues_%E2%80%9Cto_http_or_not_http%E2%80%A6.%E2%80%9D) (T2K)
|
|||
|
#### Session 3
|
|||
|
- [Account Chooser.com / OIDF Working Group update, next steps, your ideas](https://iiw.idcommons.net/Account_Chooser.com_/_OIDF_Working_Group_update,_next_steps,_your_ideas) (T3A)
|
|||
|
- [Demo with Freedom Box (you can participate!)](https://iiw.idcommons.net/Demo_with_Freedom_Box_(you_can_participate!)) (T3C)
|
|||
|
- [OAuth Security](https://iiw.idcommons.net/OAuth_Security) (T3D)
|
|||
|
- [How to Educate Consumers on privacy/identity/security issues?](https://iiw.idcommons.net/How_to_Educate_Consumers_on_privacy/identity/security_issues%3F) (T3E)
|
|||
|
- [VRM 2012 Outreach Planning / What vendors will go first?](https://iiw.idcommons.net/VRM_2012_Outreach_Planning_/_What_vendors_will_go_first%3F) (T3F)
|
|||
|
- [Standard Information Sharing /Label](https://iiw.idcommons.net/Standard_Information_Sharing_/Label) (T3G)
|
|||
|
- [Health Care Regs: What Are They REALLY?](https://iiw.idcommons.net/Health_Care_Regs:_What_Are_They_REALLY%3F) (T3H)
|
|||
|
- [Federated Authorization / XACML, OAUTH, TVE….](https://iiw.idcommons.net/Federated_Authorization_/_XACML,_OAUTH,_TVE%E2%80%A6.) (T3I)
|
|||
|
- [NSTIC’s Identity Ecosystem / Privacy Coord. Standing Committee](https://iiw.idcommons.net/NSTIC%E2%80%99s_Identity_Ecosystem_/_Privacy_Coord._Standing_Committee) (T3J)
|
|||
|
- [What is a Personal Cloud?](https://iiw.idcommons.net/What_is_a_Personal_Cloud%3F) (T3K)
|
|||
|
#### Session 4
|
|||
|
- [Attribute Provider Network Demo via Open ID/OAuth](https://iiw.idcommons.net/Attribute_Provider_Network_Demo_via_Open_ID/OAuth) (T4A)
|
|||
|
- [Mobile Identity and Dual – (multi) Persona](https://iiw.idcommons.net/Mobile_Identity_and_Dual_%E2%80%93_(multi)_Persona) (T4C)
|
|||
|
- [A Deterministic Model for Trust Framework Interoperability](https://iiw.idcommons.net/A_Deterministic_Model_for_Trust_Framework_Interoperability) (T4D)
|
|||
|
- [OAuth/SMAL/OpenID for non-web applications – SMTP/IMAP/SSM](https://iiw.idcommons.net/OAuth/SMAL/OpenID_for_non-web_applications_%E2%80%93_SMTP/IMAP/SSM) (T4E)
|
|||
|
- [VRM Language (lockers vs smelly socks) Lexicon = what do we call the WHO and WHAT we work on?](https://iiw.idcommons.net/VRM_Language_(lockers_vs_smelly_socks)_Lexicon_%3D_what_do_we_call_the_WHO_and_WHAT_we_work_on%3F) (T4F)
|
|||
|
- [What Happens When my Federated Identity Fails?](https://iiw.idcommons.net/What_Happens_When_my_Federated_Identity_Fails%3F) (T4G)
|
|||
|
- [Zero – Trust Identity](https://iiw.idcommons.net/Zero_%E2%80%93_Trust_Identity) (T4H)
|
|||
|
- [Open ID Connect + Metadata ????](https://iiw.idcommons.net/Open_ID_Connect_%2B_Metadata_%3F%3F%3F%3F) (T4I)
|
|||
|
- [How Can My Company Afford VRM?](https://iiw.idcommons.net/How_Can_My_Company_Afford_VRM%3F) (T4J)
|
|||
|
#### Session 5
|
|||
|
- [Writing Apps that are Easier to Defend than Attack](https://iiw.idcommons.net/Writing_Apps_that_are_Easier_to_Defend_than_Attack) (T5A)
|
|||
|
- [Resource Server to Authorization Server Commuications JACML?](https://iiw.idcommons.net/Resource_Server_to_Authorization_Server_Commuications_JACML%3F) (T5C)
|
|||
|
- [Biometrics into the NET with Smartphones](https://iiw.idcommons.net/Biometrics_into_the_NET_with_Smartphones) (T5D)
|
|||
|
- [Personal Data Ecosystem Consortium (PDEC)](https://iiw.idcommons.net/Personal_Data_Ecosystem_Consortium_(PDEC)) (T5G)
|
|||
|
- [Government of British Columbia Digital ID + Authentication](https://iiw.idcommons.net/Government_of_British_Columbia_Digital_ID_%2B_Authentication) (T5H)
|
|||
|
- [Novel uses for Context and what is it anyway](https://iiw.idcommons.net/Novel_uses_for_Context_and_what_is_it_anyway) (T5I)
|
|||
|
- [Sovereign ID vs Admin ID](https://iiw.idcommons.net/Sovereign_ID_vs_Admin_ID) (T5J)
|
|||
|
- [User – Managed Access F.A.Q: How UMA Enables – Selective Sharing](https://iiw.idcommons.net/User_%E2%80%93_Managed_Access_F.A.Q:_How_UMA_Enables_%E2%80%93_Selective_Sharing) (T5K)
|
|||
|
### Wednesday
|
|||
|
#### Session 1
|
|||
|
- [VRM + CRM(need help) Event – Sept 2012 Santa Clara](https://iiw.idcommons.net/VRM_%2B_CRM(need_help)_Event_%E2%80%93_Sept_2012_Santa_Clara) (W1B)
|
|||
|
- [NSTIC Steering Group by-laws](https://iiw.idcommons.net/NSTIC_Steering_Group_by-laws) (W1D)
|
|||
|
- [Account Linking Service](https://iiw.idcommons.net/Account_Linking_Service) (W1F)
|
|||
|
- [Rethinking Patents in an Open Web World – reverse the burden of discovery?](https://iiw.idcommons.net/Rethinking_Patents_in_an_Open_Web_World_%E2%80%93_reverse_the_burden_of_discovery%3F) (W1G)
|
|||
|
- [Enterprise OAuth Infrastructure](https://iiw.idcommons.net/Enterprise_OAuth_Infrastructure) (W1H)
|
|||
|
#### Session 2
|
|||
|
- [Personal Data Rights Language / Self Asserted Terms – Policies – Preferences](https://iiw.idcommons.net/Personal_Data_Rights_Language_/_Self_Asserted_Terms_%E2%80%93_Policies_%E2%80%93_Preferences) (W2A)
|
|||
|
- [Backplane 2.0 Widget Collaboration Protocol](https://iiw.idcommons.net/Backplane_2.0_Widget_Collaboration_Protocol) (W2B)
|
|||
|
- [SCIM 101](https://iiw.idcommons.net/SCIM_101) (W2C)
|
|||
|
- [API’s](https://iiw.idcommons.net/API%E2%80%99s) (W2D)
|
|||
|
- [NSTIC How do we bring relying parties to the table?](https://iiw.idcommons.net/NSTIC_How_do_we_bring_relying_parties_to_the_table%3F) (W2F)
|
|||
|
- [Personal Data Tagging a Utopia?](https://iiw.idcommons.net/Personal_Data_Tagging_a_Utopia%3F) (W2G)
|
|||
|
- [Survey of UDID Replacements for Mobile Identity](https://iiw.idcommons.net/Survey_of_UDID_Replacements_for_Mobile_Identity) (W2H)
|
|||
|
- [New Gov Open Data to Corral Politicians](https://iiw.idcommons.net/New_Gov_Open_Data_to_Corral_Politicians) (W2I)
|
|||
|
#### Session 3
|
|||
|
- [Data Wallet](https://iiw.idcommons.net/Data_Wallet) (W3A)
|
|||
|
- [VRM Personas & Faceted Identity](https://iiw.idcommons.net/VRM_Personas_%26_Faceted_Identity) (W3B)
|
|||
|
- [SCIM 201](https://iiw.idcommons.net/SCIM_201) (W2C)
|
|||
|
- [ID Federation Trust Framework Use Cases and Mock Trials](https://iiw.idcommons.net/ID_Federation_Trust_Framework_Use_Cases_and_Mock_Trials) (W3D)
|
|||
|
- [Dynamic, Multi-Attribute Authentication – OASIS Trust Elevation TC /Open Meeting](https://iiw.idcommons.net/Dynamic,_Multi-Attribute_Authentication_%E2%80%93_OASIS_Trust_Elevation_TC_/Open_Meeting) (W3F)
|
|||
|
- [Practices, Policies and Procedures around Identity Validation](https://iiw.idcommons.net/Practices,_Policies_and_Procedures_around_Identity_Validation) (W3G)
|
|||
|
- [CIPHER – whiteboarding on open-source language for consistent cross-platform CRYPTO](https://iiw.idcommons.net/CIPHER_%E2%80%93_whiteboarding_on_open-source_language_for_consistent_cross-platform_CRYPTO) (W3H)
|
|||
|
- [New Gov Foundation / Open Board Meeting](https://iiw.idcommons.net/New_Gov_Foundation_/_Open_Board_Meeting) (W3I)
|
|||
|
- [Personal Cloud work](https://iiw.idcommons.net/Personal_Cloud_work) (W3J)
|
|||
|
#### Session 4
|
|||
|
- [NSTIC and Governance](https://iiw.idcommons.net/NSTIC_and_Governance) (W4A)
|
|||
|
- [How can my company afford VRM? VRM Co-opetition, Developing Creative Relationships](https://iiw.idcommons.net/How_can_my_company_afford_VRM%3F_VRM_Co-opetition,_Developing_Creative_Relationships) (W4B)
|
|||
|
- [Setting up an Open Source Community - To drive adoption of a cool ID technology](https://iiw.idcommons.net/Setting_up_an_Open_Source_Community_-_To_drive_adoption_of_a_cool_ID_technology) (W4F)
|
|||
|
- [Communication Channels in our Personal Clouds](https://iiw.idcommons.net/Communication_Channels_in_our_Personal_Clouds) (W4H)
|
|||
|
- [Client Certificate Authentication & Browser Pitfalls](https://iiw.idcommons.net/Client_Certificate_Authentication_%26_Browser_Pitfalls) (W4I)
|
|||
|
- [DEMO – Social Verification and Google Street Identity](https://iiw.idcommons.net/DEMO_%E2%80%93_Social_Verification_and_Google_Street_Identity) (W4J)
|
|||
|
#### Session 5
|
|||
|
- [Browser Cryptography – Enabling Stronger Authentication for ID](https://iiw.idcommons.net/Browser_Cryptography_%E2%80%93_Enabling_Stronger_Authentication_for_ID) (W5A)
|
|||
|
- [Commercializing VRM – in the marketplace](https://iiw.idcommons.net/Commercializing_VRM_%E2%80%93_in_the_marketplace) (W5B)
|
|||
|
- [Backplane 2.0 – Implementation](https://iiw.idcommons.net/Backplane_2.0_%E2%80%93_Implementation) (W5F)
|
|||
|
- [XDI 1)Graph 101 2)Messaging 3)Link Contracts](https://iiw.idcommons.net/XDI_1)Graph_101_2)Messaging_3)Link_Contracts) (W5G)
|
|||
|
- [Assets Discovery for Simple Web Payment (openTransact)](https://iiw.idcommons.net/Assets_Discovery_for_Simple_Web_Payment_(openTransact)) (W5I)
|
|||
|
- [Personal Data Rights and Underlying Principles](https://iiw.idcommons.net/Personal_Data_Rights_and_Underlying_Principles) (W5J)
|
|||
|
- [Health Care Regs: What are they REALLY?](https://iiw.idcommons.net/Health_Care_Regs:_What_are_they_REALLY%3F) (W5K)
|
|||
|
### Thursday
|
|||
|
#### Session 1
|
|||
|
- [Windows 8 Identity Investments](https://iiw.idcommons.net/Windows_8_Identity_Investments) (TH1A)
|
|||
|
- [VRM: Where does it start?](https://iiw.idcommons.net/VRM:_Where_does_it_start%3F) (TH1F)
|
|||
|
- [Privacy - Enhanced Attribute Management / Help me understand "Privacy"'](https://iiw.idcommons.net/Privacy_-_Enhanced_Attribute_Management_/_Help_me_understand_%22Privacy%22%27) (TH1J)
|
|||
|
#### Session 2
|
|||
|
- [Confused about ID token and Access Tokens??? Lean the Key Differences](https://iiw.idcommons.net/Confused_about_ID_token_and_Access_Tokens%3F%3F%3F_Lean_the_Key_Differences) (TH2A)
|
|||
|
- [Beyond Caif - Cow / Escape from Client Server](https://iiw.idcommons.net/Beyond_Caif_-_Cow_/_Escape_from_Client_Server) (TH2F)
|
|||
|
- [Are Custom URI Handles EEEEVil? Or Workable? Alternatives?](https://iiw.idcommons.net/Are_Custom_URI_Handles_EEEEVil%3F_Or_Workable%3F_Alternatives%3F) (TH2G)
|
|||
|
- [Lifecycle's of Digital ID's Personal Online Including DEATH ... what is life online like after you die?](https://iiw.idcommons.net/Lifecycle%27s_of_Digital_ID%27s_Personal_Online_Including_DEATH_..._what_is_life_online_like_after_you_die%3F) (TH2J)
|
|||
|
#### Session 3
|
|||
|
- [How to add an account chooser to your site - 4 line's of code but what if you want more!](https://iiw.idcommons.net/How_to_add_an_account_chooser_to_your_site_-_4_line%27s_of_code_but_what_if_you_want_more!) (TH3A)
|
|||
|
- [Trust Framework System Rules - Business, Legal, Technical](https://iiw.idcommons.net/Trust_Framework_System_Rules_-_Business,_Legal,_Technical) (TH3F)
|
|||
|
- [Open ID Connect/OAuth - Token Lifetime Management](https://iiw.idcommons.net/Open_ID_Connect/OAuth_-_Token_Lifetime_Management) (TH3G)
|
|||
|
- [XDI the Killer App?](https://iiw.idcommons.net/XDI_the_Killer_App%3F) (TH3H)
|
|||
|
#### Session 4
|
|||
|
- [SCIM 202 - Part 2](https://iiw.idcommons.net/SCIM_202_-_Part_2) (TH4A)
|
|||
|
- [Personal Data Rights Language NEXT STEPS PDEC StartUp Circle](https://iiw.idcommons.net/Personal_Data_Rights_Language_NEXT_STEPS_PDEC_StartUp_Circle) (TH4F)
|
|||
|
- [Delivering Entropy Via DNS / WOrkability Challenges](https://iiw.idcommons.net/Delivering_Entropy_Via_DNS_/_WOrkability_Challenges) (TH4G)
|
|||
|
- [UMA Open Meeting - Part 1](https://iiw.idcommons.net/UMA_Open_Meeting_-_Part_1) (TH4J)
|
|||
|
#### Session 5
|
|||
|
- [XDI Databases / small footprint - mobile development](https://iiw.idcommons.net/XDI_Databases_/_small_footprint_-_mobile_development) (TH5F)
|
|||
|
- [How can we continue the discussion?](https://iiw.idcommons.net/How_can_we_continue_the_discussion%3F) (TH5H)
|
|||
|
- [UMA Open Meeting - Part 2](https://iiw.idcommons.net/UMA_Open_Meeting_-_Part_2) (TH5J)
|
|||
|
|
|||
|
## [IIW Satellite DC](https://iiw.idcommons.net/IIW_Satellite_DC_Notes)
|
|||
|
- [What's Going On With NSTIC? Pilots! Steering Groups! - (1A)](https://iiw.idcommons.net/What%27s_Going_On_With_NSTIC%3F_Pilots!_Steering_Groups!_-_(1A))
|
|||
|
- [OIX Update (1A2)](https://iiw.idcommons.net/OIX_Update_(1A2))
|
|||
|
- [Open ID Connect – the History and Practice (1F2)](https://iiw.idcommons.net/Open_ID_Connect_%E2%80%93_the_History_and_Practice_(1F2))
|
|||
|
- [How Private Is It? Privacy Metrics and Preservation Techniques (1G1)](https://iiw.idcommons.net/How_Private_Is_It%3F_Privacy_Metrics_and_Preservation_Techniques_(1G1))
|
|||
|
- Personal.com Demo (1G2)
|
|||
|
- [What Would a Great NSTIC Pilot Look Like? (2A)](https://iiw.idcommons.net/What_Would_a_Great_NSTIC_Pilot_Look_Like%3F_(2A))
|
|||
|
- [Personal Data Services (2F2)](https://iiw.idcommons.net/Personal_Data_Services_(2F2))
|
|||
|
- [Gov Use of OAUTH2, OPEN ID Connect, UMA? (2G1)](https://iiw.idcommons.net/Gov_Use_of_OAUTH2,_OPEN_ID_Connect,_UMA%3F_(2G1))
|
|||
|
- [Attribute Management (2G2)](https://iiw.idcommons.net/Attribute_Management_(2G2))
|
|||
|
- [FICAM Profile, OAUTH2 and 800-63?? (3A)](https://iiw.idcommons.net/FICAM_Profile,_OAUTH2_and_800-63%3F%3F_(3A))
|
|||
|
- ABA IDM Work Group “Redefining Terms” (3F1)
|
|||
|
- Why A Super Voter ID? Architecture *Certified Constituent (3F2)
|
|||
|
- Constant Use Of Attribute Sharing UI (3G1)
|
|||
|
- SCIM Who's Doing What? Standard for Managing Users & Groups (3G2)
|
|||
|
- [Level 3 and 4 Credentials in the Exosystem (3H)](https://iiw.idcommons.net/Level_3_and_4_Credentials_in_the_Exosystem_(3H))
|
|||
|
- [Why You Should Care About OAUTH2 (4A)](https://iiw.idcommons.net/Why_You_Should_Care_About_OAUTH2_(4A))
|
|||
|
- Impact of Consumer Permission on Data Use Compliance Laws (4F1)
|
|||
|
- Making OAUTH Scopes Interoperable With UMA (4F2)
|
|||
|
- Limited Liability Persona.... Can This Leagal Innovation Address Issues of “Psuedonimity” for Trust & Transactions? (4G2)
|
|||
|
- Why You Should Care About OAUTH 2 (4H)
|
|||
|
- [Limited Liability Persona.... Can This Leagal Innovation Address Issues of “Psuedonimity” for Trust & Transactions? (4G2)](https://iiw.idcommons.net/index.php?title=Limited_Liability_Persona...._Can_This_Leagal_Innovation_Address_Issues_of_%E2%80%9CPsuedonimity%E2%80%9D_for_Trust_%26_Transactions%3F_(4G2)&action=edit&redlink=1)
|
|||
|
- [Eat My Attributes (5A)](https://iiw.idcommons.net/Eat_My_Attributes_(5A))
|
|||
|
- Use Case for OAUTH 2 & Structured Takens (5F1)
|
|||
|
- Why A Super Voter ID? Architecture *Certified Constituent (5F2)
|
|||
|
- Global Attribute Trust Level – Standardization (for RP's) (5G1)
|
|||
|
- [Common/Open (NPO) Solution For – The Person in the “Personal Identity Movement” (5G2)](https://iiw.idcommons.net/Common/Open_(NPO)_Solution_For_%E2%80%93_The_Person_in_the_%E2%80%9CPersonal_Identity_Movement%E2%80%9D_(5G2))
|
|||
|
|
|||
|
## [IIW 12](https://iiw.idcommons.net/IIW_12_Notes)
|
|||
|
### Tuesday
|
|||
|
#### Session 1
|
|||
|
- [Introduction to the JSON Spec Suite](https://iiw.idcommons.net/Introduction_to_the_JSON_Spec_Suite)
|
|||
|
- [Yahoo! DAA DNT Hybrid from W3C webtracking & user ID](https://iiw.idcommons.net/Yahoo!_DAA_DNT_Hybrid_from_W3C_webtracking_%26_user_ID)
|
|||
|
- [Google’s Open ID Relying Partyr](https://iiw.idcommons.net/Google%E2%80%99s_Open_ID_Relying_Partyr)
|
|||
|
- [Respect Trust Framework & Founding Trust Anchors](https://iiw.idcommons.net/Respect_Trust_Framework_%26_Founding_Trust_Anchors)
|
|||
|
- [Identity Community 101](https://iiw.idcommons.net/Identity_Community_101)
|
|||
|
- [Simple Cloud Identity Management](https://iiw.idcommons.net/Simple_Cloud_Identity_Management)
|
|||
|
- [Gov’t Regulation & Security Services & Bill of Rights](https://iiw.idcommons.net/Gov%E2%80%99t_Regulation_%26_Security_Services_%26_Bill_of_Rights)
|
|||
|
### Session 2
|
|||
|
- [NSTIC, $, IDPs, TELCOS, DANKS](https://iiw.idcommons.net/NSTIC,_$,_IDPs,_TELCOS,_DANKS)
|
|||
|
- [How to meet privacy goals of NSTIC](https://iiw.idcommons.net/How_to_meet_privacy_goals_of_NSTIC)
|
|||
|
- [Yahoo! As a relying party](https://iiw.idcommons.net/Yahoo!_As_a_relying_party)
|
|||
|
- [Open ID ABC Identifiers & Discovery](https://iiw.idcommons.net/Open_ID_ABC_Identifiers_%26_Discovery)
|
|||
|
- [Federated Identity for non-web apps](https://iiw.idcommons.net/Federated_Identity_for_non-web_apps)
|
|||
|
- [VRM + Browers](https://iiw.idcommons.net/VRM_%2B_Browers)
|
|||
|
- [The line between public and private internet ID](https://iiw.idcommons.net/The_line_between_public_and_private_internet_ID)
|
|||
|
- [Users in control of their data UMA](https://iiw.idcommons.net/Users_in_control_of_their_data_UMA)
|
|||
|
- [How many IDPs do we need?](https://iiw.idcommons.net/How_many_IDPs_do_we_need%3F)
|
|||
|
### Session 3
|
|||
|
- [Verified ID in the browser](https://iiw.idcommons.net/Verified_ID_in_the_browser)
|
|||
|
- [Secure Cloud Interop using JWI + OAUTH](https://iiw.idcommons.net/Secure_Cloud_Interop_using_JWI_%2B_OAUTH)
|
|||
|
- [An architectural approach to harmonizing data between personal data stores](https://iiw.idcommons.net/An_architectural_approach_to_harmonizing_data_between_personal_data_stores)
|
|||
|
- [Reputation Systems (whuffie?)](https://iiw.idcommons.net/Reputation_Systems_(whuffie%3F))
|
|||
|
- [Open ID ABC session management](https://iiw.idcommons.net/Open_ID_ABC_session_management)
|
|||
|
- [PUSHEE](https://iiw.idcommons.net/PUSHEE)
|
|||
|
- [Can Banks act as digitial ID providers? Is there money to be made?](https://iiw.idcommons.net/Can_Banks_act_as_digitial_ID_providers%3F_Is_there_money_to_be_made%3F)
|
|||
|
- [Portable Contacts 2.0](https://iiw.idcommons.net/Portable_Contacts_2.0)
|
|||
|
- [Security measures identity protocol flows](https://iiw.idcommons.net/Security_measures_identity_protocol_flows)
|
|||
|
#### Session 4
|
|||
|
- [W3C Identity in the browser topic gathering session/Info Card](https://iiw.idcommons.net/W3C_Identity_in_the_browser_topic_gathering_session/Info_Card)
|
|||
|
- [New UMA solutions for scoped access and centralized AUTHZ](https://iiw.idcommons.net/New_UMA_solutions_for_scoped_access_and_centralized_AUTHZ)
|
|||
|
- [DNS as a personal data store and discovery mechanism](https://iiw.idcommons.net/DNS_as_a_personal_data_store_and_discovery_mechanism)
|
|||
|
- [SSEDIC: Scoping the Single European Digital Identity Community](https://iiw.idcommons.net/SSEDIC:_Scoping_the_Single_European_Digital_Identity_Community)
|
|||
|
- [User info end point of Open ID ABC](https://iiw.idcommons.net/User_info_end_point_of_Open_ID_ABC)
|
|||
|
- [JSON activity streams spec](https://iiw.idcommons.net/JSON_activity_streams_spec)
|
|||
|
- [Success factors for fourth parties/user agents](https://iiw.idcommons.net/Success_factors_for_fourth_parties/user_agents)
|
|||
|
- [When SAAS apps exchange customer data should they use OAUTH, Open ID, or other (SAML) protocols to access the data](https://iiw.idcommons.net/When_SAAS_apps_exchange_customer_data_should_they_use_OAUTH,_Open_ID,_or_other_(SAML)_protocols_to_access_the_data)
|
|||
|
- [Higgins 2: Open Source personal data service](https://iiw.idcommons.net/Higgins_2:_Open_Source_personal_data_service)
|
|||
|
- [Bizzaro ID revenue from user purchased ID services](https://iiw.idcommons.net/Bizzaro_ID_revenue_from_user_purchased_ID_services)
|
|||
|
- [Open ID 2.0, OAUTH 2.0, Open ID ABC Where are we going?](https://iiw.idcommons.net/Open_ID_2.0,_OAUTH_2.0,_Open_ID_ABC_Where_are_we_going%3F)
|
|||
|
- [Do not track! It won’t work!](https://iiw.idcommons.net/Do_not_track!_It_won%E2%80%99t_work!)
|
|||
|
#### Session 5
|
|||
|
- [Personal Data: what’s the state of things today?](https://iiw.idcommons.net/Personal_Data:_what%E2%80%99s_the_state_of_things_today%3F)
|
|||
|
- [Getting rid of usernames & passwords – for real?](https://iiw.idcommons.net/Getting_rid_of_usernames_%26_passwords_%E2%80%93_for_real%3F)
|
|||
|
- [OAUTH2 Device Profile](https://iiw.idcommons.net/OAUTH2_Device_Profile)
|
|||
|
- [Open XDI OX](https://iiw.idcommons.net/Open_XDI_OX)
|
|||
|
- [Data portability for trust framework](https://iiw.idcommons.net/Data_portability_for_trust_framework)
|
|||
|
- [Open Identity protocols and banking](https://iiw.idcommons.net/Open_Identity_protocols_and_banking)
|
|||
|
- [Portable contexts](https://iiw.idcommons.net/Portable_contexts)
|
|||
|
- [OStatus (Federate the social web)](https://iiw.idcommons.net/OStatus_(Federate_the_social_web))
|
|||
|
### Wednesday
|
|||
|
#### Session 1
|
|||
|
- [Beyond the NASCAR UI Google’s Account Chooser](https://iiw.idcommons.net/Beyond_the_NASCAR_UI_Google%E2%80%99s_Account_Chooser)
|
|||
|
- [Chained Identity in Online Entertainment](https://iiw.idcommons.net/Chained_Identity_in_Online_Entertainment)
|
|||
|
- [Info Sharing Agreement](https://iiw.idcommons.net/Info_Sharing_Agreement)
|
|||
|
- [Virtual Problems](https://iiw.idcommons.net/Virtual_Problems)
|
|||
|
- [SCIM Use Cases](https://iiw.idcommons.net/SCIM_Use_Cases)
|
|||
|
- [Different IDP Business Model](https://iiw.idcommons.net/Different_IDP_Business_Model)
|
|||
|
#### Session 2
|
|||
|
- [Packaging RP Best Practices: Google Identity Toolkit](https://iiw.idcommons.net/Packaging_RP_Best_Practices:_Google_Identity_Toolkit)
|
|||
|
- [Identity in the Browser: Open ID for Firefox](https://iiw.idcommons.net/Identity_in_the_Browser:_Open_ID_for_Firefox)
|
|||
|
- [Smart User Managed Access Demo](https://iiw.idcommons.net/Smart_User_Managed_Access_Demo)
|
|||
|
- [Public Policy Issues in Identity](https://iiw.idcommons.net/Public_Policy_Issues_in_Identity)
|
|||
|
- [How do we publish from our personal data stores? Save the restful web.](https://iiw.idcommons.net/How_do_we_publish_from_our_personal_data_stores%3F_Save_the_restful_web.)
|
|||
|
- [What’s possible at intersection of trust, identity info, commerce and journalism](https://iiw.idcommons.net/What%E2%80%99s_possible_at_intersection_of_trust,_identity_info,_commerce_and_journalism)
|
|||
|
#### Session 3
|
|||
|
- [NSTIC.](https://iiw.idcommons.net/NSTIC.)
|
|||
|
- [Proxy Auth for Native App Hosts](https://iiw.idcommons.net/Proxy_Auth_for_Native_App_Hosts)
|
|||
|
- [Respect Trust Framework 2](https://iiw.idcommons.net/Respect_Trust_Framework_2)
|
|||
|
- [User Managed Access: User Interface](https://iiw.idcommons.net/User_Managed_Access:_User_Interface)
|
|||
|
- [SCIM Core Schema](https://iiw.idcommons.net/SCIM_Core_Schema)
|
|||
|
- [Pseudo Anonymity and Reputation Systems](https://iiw.idcommons.net/Pseudo_Anonymity_and_Reputation_Systems)
|
|||
|
- [Beautiful Payment Systems w/OAUTH](https://iiw.idcommons.net/Beautiful_Payment_Systems_w/OAUTH)
|
|||
|
#### Session 4
|
|||
|
- [OAUTH2 User Agent via Window Post Message](https://iiw.idcommons.net/OAUTH2_User_Agent_via_Window_Post_Message)
|
|||
|
- [What’s available for the shared user profile? Is Poco end all answer?](https://iiw.idcommons.net/What%E2%80%99s_available_for_the_shared_user_profile%3F_Is_Poco_end_all_answer%3F)
|
|||
|
- [Adapting Levels of Assurance for NSTIC](https://iiw.idcommons.net/Adapting_Levels_of_Assurance_for_NSTIC)
|
|||
|
- [Building a Trust Framework for Multi-side Markets](https://iiw.idcommons.net/Building_a_Trust_Framework_for_Multi-side_Markets)
|
|||
|
- [VRM + CRM](https://iiw.idcommons.net/VRM_%2B_CRM)
|
|||
|
- [SCIM Bindings](https://iiw.idcommons.net/SCIM_Bindings)
|
|||
|
- [Two Legs Good? “Client-Server” OAUTH Usage](https://iiw.idcommons.net/Two_Legs_Good%3F_%E2%80%9CClient-Server%E2%80%9D_OAUTH_Usage)
|
|||
|
- [Extended Demo: UI for personal data store + data sharing on mobile device cubicon](https://iiw.idcommons.net/Extended_Demo:_UI_for_personal_data_store_%2B_data_sharing_on_mobile_device_cubicon)
|
|||
|
#### Session 5
|
|||
|
- [Backplane Spec](https://iiw.idcommons.net/Backplane_Spec)
|
|||
|
- [OAUTH, Open ID Mobile UX: How should it work?](https://iiw.idcommons.net/OAUTH,_Open_ID_Mobile_UX:_How_should_it_work%3F)
|
|||
|
- [How to Manage Digital Multiple Identities Securely and Assuring Privacy on Internet](https://iiw.idcommons.net/How_to_Manage_Digital_Multiple_Identities_Securely_and_Assuring_Privacy_on_Internet)
|
|||
|
- [The Payment Card Trust Framework](https://iiw.idcommons.net/The_Payment_Card_Trust_Framework)
|
|||
|
- [VRM @ Work](https://iiw.idcommons.net/VRM_@_Work)
|
|||
|
- [ID/Legal: Dialogue Collaboration](https://iiw.idcommons.net/ID/Legal:_Dialogue_Collaboration)
|
|||
|
- [Conversation Around Data as Currency](https://iiw.idcommons.net/Conversation_Around_Data_as_Currency)
|
|||
|
- [How Yahoo! Became RP: A Large Scale Implementation Study](https://iiw.idcommons.net/How_Yahoo!_Became_RP:_A_Large_Scale_Implementation_Study)
|
|||
|
- [Open Architecture for Step Up Authentication](https://iiw.idcommons.net/Open_Architecture_for_Step_Up_Authentication)
|
|||
|
### Thursday
|
|||
|
#### Session 1
|
|||
|
- [For Public Consumption. Choose Wisely: Identity as selective pressure on biology](https://iiw.idcommons.net/For_Public_Consumption._Choose_Wisely:_Identity_as_selective_pressure_on_biology)
|
|||
|
- [Respect Trust Framework Q+A (part 3) Become a trust anchor](https://iiw.idcommons.net/Respect_Trust_Framework_Q%2BA_(part_3)_Become_a_trust_anchor)
|
|||
|
- [Data Portability for Trust Frameworks](https://iiw.idcommons.net/Data_Portability_for_Trust_Frameworks)
|
|||
|
- [OpenID Specification Work](https://iiw.idcommons.net/OpenID_Specification_Work)
|
|||
|
- [Internet Bill of Rights for “Vegas” Model](https://iiw.idcommons.net/Internet_Bill_of_Rights_for_%E2%80%9CVegas%E2%80%9D_Model)
|
|||
|
#### Session 2
|
|||
|
- [IETF OAUTH: Status & Next Steps](https://iiw.idcommons.net/IETF_OAUTH:_Status_%26_Next_Steps)
|
|||
|
- [MYDEX CIC](https://iiw.idcommons.net/MYDEX_CIC)
|
|||
|
- [NSTIC Attributes](https://iiw.idcommons.net/NSTIC_Attributes)
|
|||
|
- [Purpose Binding](https://iiw.idcommons.net/Purpose_Binding)
|
|||
|
- [Personal Data Ecosytems](https://iiw.idcommons.net/Personal_Data_Ecosytems)
|
|||
|
#### Session 3
|
|||
|
- [What part is Identity? What part is Personal Data?](https://iiw.idcommons.net/What_part_is_Identity%3F_What_part_is_Personal_Data%3F)
|
|||
|
- [Open ID Specification Work](https://iiw.idcommons.net/Open_ID_Specification_Work)
|
|||
|
- [Bill O’Rights O Rama](https://iiw.idcommons.net/Bill_O%E2%80%99Rights_O_Rama)
|
|||
|
- [Strategies for Ubiquity](https://iiw.idcommons.net/Strategies_for_Ubiquity)
|
|||
|
- [NSTIC Risks Legal Liability](https://iiw.idcommons.net/NSTIC_Risks_Legal_Liability)
|
|||
|
- [News personalized by inference or expression…managing the user’s persona](https://iiw.idcommons.net/News_personalized_by_inference_or_expression%E2%80%A6managing_the_user%E2%80%99s_persona)
|
|||
|
- [The Locker Project](https://iiw.idcommons.net/The_Locker_Project)
|
|||
|
#### Session 4
|
|||
|
- [What part is Identity? What part is Personal Data?](https://iiw.idcommons.net/What_part_is_Identity%3F_What_part_is_Personal_Data%3F)
|
|||
|
- [Open ID Specification Work](https://iiw.idcommons.net/Open_ID_Specification_Work)
|
|||
|
- [Legal Structures](https://iiw.idcommons.net/Legal_Structures)
|
|||
|
- [Personal Data - Stores, Lockers, Vaults](https://iiw.idcommons.net/Personal_Data_-_Stores,_Lockers,_Vaults)
|
|||
|
- [Square Tag](https://iiw.idcommons.net/Square_Tag)
|
|||
|
- [Red Teaming Trust Frameworks](https://iiw.idcommons.net/Red_Teaming_Trust_Frameworks)
|
|||
|
- [Give me tips on creating persona](https://iiw.idcommons.net/Give_me_tips_on_creating_persona)
|
|||
|
- [Field Guide to Real World Trust Frameworks](https://iiw.idcommons.net/Field_Guide_to_Real_World_Trust_Frameworks)
|
|||
|
- [Start-ups table](https://iiw.idcommons.net/Start-ups_table)
|
|||
|
#### Session 5
|
|||
|
- [Open ID Specification Work (Cont.)](https://iiw.idcommons.net/Open_ID_Specification_Work_(Cont.))
|
|||
|
- [Is there value in an open reputation framework?](https://iiw.idcommons.net/Is_there_value_in_an_open_reputation_framework%3F)
|
|||
|
- [Digital Death](https://iiw.idcommons.net/Digital_Death)
|
|||
|
- [Real world VRM example + code for VRM App](https://iiw.idcommons.net/Real_world_VRM_example_%2B_code_for_VRM_App)
|
|||
|
- [Make OAUTH2 Easy for Rest Developers](https://iiw.idcommons.net/Make_OAUTH2_Easy_for_Rest_Developers)
|
|||
|
- [Certified Identity](https://iiw.idcommons.net/Certified_Identity)
|
|||
|
|
|||
|
## [IDCollab Day](https://iiw.idcommons.net/IDCollab_Day_Notes)
|
|||
|
|
|||
|
[**ID Collaboration Day Book of Proceedings**](https://iiw.idcommons.net/File:ID_Collaboration_Day_Book_of_Proceedings.pdf)
|
|||
|
|
|||
|
- [Identity Commons Claims Agent Working Group](https://iiw.idcommons.net/Identity_Commons_Claims_Agent_Working_Group)
|
|||
|
- [Citizen ID’s and Winlogon credentials? Why AND/OR Why not](https://iiw.idcommons.net/Citizen_ID%E2%80%99s_and_Winlogon_credentials%3F_Why_AND/OR_Why_not)
|
|||
|
- [How Will the Enterprise do Identity In The Cloud?](https://iiw.idcommons.net/How_Will_the_Enterprise_do_Identity_In_The_Cloud%3F)
|
|||
|
- [UK Government ID For Digital Public Service](https://iiw.idcommons.net/UK_Government_ID_For_Digital_Public_Service)
|
|||
|
- [Why (Identity, Privacy, Turst) Frameworks are Failing](https://iiw.idcommons.net/Why_(Identity,_Privacy,_Turst)_Frameworks_are_Failing)
|
|||
|
- [Identity In The Browser](https://iiw.idcommons.net/Identity_In_The_Browser)
|
|||
|
- [ID Adoption Discussions: Compliance + Service Certification Requirements for Cross-Domain IDM Deployments – Govt, Financial etc…](https://iiw.idcommons.net/ID_Adoption_Discussions:_Compliance_%2B_Service_Certification_Requirements_for_Cross-Domain_IDM_Deployments_%E2%80%93_Govt,_Financial_etc%E2%80%A6)
|
|||
|
- [Personal Data Ecosystem Personal Data Stores and Services Emerging. What is Happening, How To Be Involved, What To Do Next](https://iiw.idcommons.net/Personal_Data_Ecosystem_Personal_Data_Stores_and_Services_Emerging._What_is_Happening,_How_To_Be_Involved,_What_To_Do_Next)
|
|||
|
- [Architecture for A Personal Data Ecosystem](https://iiw.idcommons.net/Architecture_for_A_Personal_Data_Ecosystem)
|
|||
|
- [Organizations and Their Individual Affiliates (retirees, contractors, etc…) Bringing Their “Own Identity” to the Organizations Services](https://iiw.idcommons.net/Organizations_and_Their_Individual_Affiliates_(retirees,_contractors,_etc%E2%80%A6)_Bringing_Their_%E2%80%9COwn_Identity%E2%80%9D_to_the_Organizations_Services)
|
|||
|
- [Measuring ID Assurance Through Complex Supply Chains – “The Weakest Link Breaks the Chain” + Is There a Market for Assurance?](https://iiw.idcommons.net/Measuring_ID_Assurance_Through_Complex_Supply_Chains_%E2%80%93_%E2%80%9CThe_Weakest_Link_Breaks_the_Chain%E2%80%9D_%2B_Is_There_a_Market_for_Assurance%3F)
|
|||
|
- [U-Prove CTP RZ](https://iiw.idcommons.net/U-Prove_CTP_RZ)
|
|||
|
- [ANSI / NASPO – ID-V Standards Workgroup Update](https://iiw.idcommons.net/ANSI_/_NASPO_%E2%80%93_ID-V_Standards_Workgroup_Update)
|
|||
|
- [Machine Readable Policies to Informed Consent](https://iiw.idcommons.net/Machine_Readable_Policies_to_Informed_Consent)
|
|||
|
- [NIH Seeks Higher LOA](https://iiw.idcommons.net/NIH_Seeks_Higher_LOA)
|
|||
|
- [Personal Data Management (part2) Practical Applications and Market Considerations](https://iiw.idcommons.net/Personal_Data_Management_(part2)_Practical_Applications_and_Market_Considerations)
|
|||
|
- [NSTIC.US](https://iiw.idcommons.net/NSTIC.US)
|
|||
|
- [Use Cases for User Centric and Communicating Them On The Web–Identity Labs?](https://iiw.idcommons.net/Use_Cases_for_User_Centric_and_Communicating_Them_On_The_Web%E2%80%93Identity_Labs%3F)
|
|||
|
- [Kantara Universal Login Experience](https://iiw.idcommons.net/Kantara_Universal_Login_Experience)
|
|||
|
- [Open ID ABC – High LOA Secure Discovery](https://iiw.idcommons.net/Open_ID_ABC_%E2%80%93_High_LOA_Secure_Discovery)
|
|||
|
- [User Managed Access and SMART](https://iiw.idcommons.net/User_Managed_Access_and_SMART)
|
|||
|
- [5 Minute Higgins 2.0 Personal Data Service Demo](https://iiw.idcommons.net/5_Minute_Higgins_2.0_Personal_Data_Service_Demo)
|
|||
|
|
|||
|
## [IIW 11](http://iiw.idcommons.net/iiw11)
|
|||
|
* [Book of Proceedings](http://iiw.idcommons.net/File:IIW-11-BOP.pdf)
|
|||
|
### Tuesday
|
|||
|
#### Session 1
|
|||
|
- [Intro to PDS](https://iiw.idcommons.net/Intro_to_PDS) (Personal Data Store)
|
|||
|
- [Trust Frameworks Analogue to Digital Converters](https://iiw.idcommons.net/Trust_Frameworks_Analogue_to_Digital_Converters)
|
|||
|
- [Decline of User-Centric Identity](https://iiw.idcommons.net/Decline_of_User-Centric_Identity) an analysis
|
|||
|
- [OAuth Listening Tour](https://iiw.idcommons.net/OAuth_Listening_Tour)
|
|||
|
- [Activity Streams 101](https://iiw.idcommons.net/Activity_Streams_101)
|
|||
|
- [Verified Identity Claims 1](https://iiw.idcommons.net/Verified_Identity_Claims_1)
|
|||
|
- [UMA 101](https://iiw.idcommons.net/UMA_101) User Managed Access
|
|||
|
#### Session 2
|
|||
|
- OpenID OAuth - [Social Networking for online retailers](https://iiw.idcommons.net/Social_Networking_for_online_retailers)
|
|||
|
- [ID Commons -IIW Intro](https://iiw.idcommons.net/ID_Commons_-IIW_Intro)
|
|||
|
- [Deep Dive OpenID - AB](https://iiw.idcommons.net/Deep_Dive_OpenID_-_AB)
|
|||
|
- [VRM Development](https://iiw.idcommons.net/VRM_Development)
|
|||
|
- [No Base String](https://iiw.idcommons.net/No_Base_String)
|
|||
|
#### Session 3
|
|||
|
- [Attenuated Redelegation](https://iiw.idcommons.net/Attenuated_Redelegation)
|
|||
|
- [Verified Identity Claims](https://iiw.idcommons.net/Verified_Identity_Claims) "U Prove Intro"
|
|||
|
- [Facebook as a Personal Data Store](https://iiw.idcommons.net/Facebook_as_a_Personal_Data_Store)
|
|||
|
- [OpenID Connect Discovery](https://iiw.idcommons.net/OpenID_Connect_Discovery)
|
|||
|
### Wednesday
|
|||
|
#### Session 4
|
|||
|
- [Pseudonyms for Privacy](https://iiw.idcommons.net/Pseudonyms_for_Privacy)
|
|||
|
- [Rap Leaf](https://iiw.idcommons.net/Rap_Leaf) Is it a joke?
|
|||
|
- [Verified Identity Claims 3](https://iiw.idcommons.net/Verified_Identity_Claims_3)
|
|||
|
- [Handling Unregistered Clients](https://iiw.idcommons.net/Handling_Unregistered_Clients) in OAuth and OpenID connect
|
|||
|
### Session 5
|
|||
|
- [Change Notify Proposal](https://iiw.idcommons.net/Change_Notify_Proposal)
|
|||
|
- [OAuth Multiple Token](https://iiw.idcommons.net/OAuth_Multiple_Token)
|
|||
|
- [Personal Data Ecosystem](https://iiw.idcommons.net/Personal_Data_Ecosystem)
|
|||
|
- [Making Security Decisions Disappear](https://iiw.idcommons.net/Making_Security_Decisions_Disappear)
|
|||
|
### Thursday
|
|||
|
#### Session 1
|
|||
|
- [Value Network Mapping](https://iiw.idcommons.net/index.php?title=Value_Network_Mapping&action=edit&redlink=1) Analysis for personal data ecosystem
|
|||
|
- [Future Phone Device Authorization](https://iiw.idcommons.net/Future_Phone_Device_Authorization)
|
|||
|
- [Enterprise OAuth BOF Level Set](https://iiw.idcommons.net/Enterprise_OAuth_BOF_Level_Set)
|
|||
|
- [OpenID Connect Sessn Mgmt](https://iiw.idcommons.net/OpenID_Connect_Sessn_Mgmt)
|
|||
|
#### Session 2
|
|||
|
- [PDE- Why would anyone adopt?](https://iiw.idcommons.net/PDE-_Why_would_anyone_adopt%3F)
|
|||
|
- [Fix Session Mgmt Jacking](https://iiw.idcommons.net/Fix_Session_Mgmt_Jacking)
|
|||
|
- [UMA 201 Q and A](https://iiw.idcommons.net/UMA_201_Q_and_A)
|
|||
|
- [Poor Man Verified ID](https://iiw.idcommons.net/Poor_Man_Verified_ID)
|
|||
|
- [Int'l Presence of OpenID](https://iiw.idcommons.net/Int%27l_Presence_of_OpenID)
|
|||
|
- [OAuth for Installed Apps](https://iiw.idcommons.net/OAuth_for_Installed_Apps)
|
|||
|
#### Session 3
|
|||
|
- [VERIFIED IDENTITY CLAIMS – Selectors (W3A)](https://iiw.idcommons.net/VERIFIED_IDENTITY_CLAIMS_%E2%80%93_Selectors_(W3A))
|
|||
|
- [OAuth2 for Devices](https://iiw.idcommons.net/OAuth2_for_Devices)
|
|||
|
- [Building a CAKE Detector](https://iiw.idcommons.net/Building_a_CAKE_Detector)
|
|||
|
- [Shifting Global Economy w-Identity](https://iiw.idcommons.net/Shifting_Global_Economy_w-Identity)
|
|||
|
- [OpenID ABC Artifact Binding](https://iiw.idcommons.net/OpenID_ABC_Artifact_Binding)
|
|||
|
#### Session 4
|
|||
|
- [Personal Data Ecosystem Biz Models](https://iiw.idcommons.net/Personal_Data_Ecosystem_Biz_Models)
|
|||
|
- [Using a Personal Data Store](https://iiw.idcommons.net/Using_a_Personal_Data_Store)
|
|||
|
- [JSON Token Spec - Encryption](https://iiw.idcommons.net/JSON_Token_Spec_-_Encryption)
|
|||
|
- [Verified Identity Claims - UX](https://iiw.idcommons.net/Verified_Identity_Claims_-_UX)
|
|||
|
#### Session 5
|
|||
|
- [Deadly Sins Distributed Authentication](https://iiw.idcommons.net/Deadly_Sins_Distributed_Authentication)
|
|||
|
- [Personal Data Ecosystem Model 2](https://iiw.idcommons.net/Personal_Data_Ecosystem_Model_2)
|
|||
|
- [Cloud Directory Standards](https://iiw.idcommons.net/Cloud_Directory_Standards)
|
|||
|
- [Infrastructure Focus - Relationships Among Things](https://iiw.idcommons.net/Infrastructure_Focus_-_Relationships_Among_Things)
|
|||
|
- [JSON Token Spec - Claim Names](https://iiw.idcommons.net/JSON_Token_Spec_-_Claim_Names)
|
|||
|
- [OAuth LEELOO](https://iiw.idcommons.net/OAuth_LEELOO)
|
|||
|
- [What do USERS want?](https://iiw.idcommons.net/What_do_USERS_want%3F)
|
|||
|
- [OpenID Attrib - Beyond AX-SREG](https://iiw.idcommons.net/OpenID_Attrib_-_Beyond_AX-SREG)
|
|||
|
#### Session 1
|
|||
|
- [Go To Market - PDE](https://iiw.idcommons.net/Go_To_Market_-_PDE) Adoption drives for Personal Data Ecosystem
|
|||
|
- [Google Sample OpenID](https://iiw.idcommons.net/Google_Sample_OpenID) RD and RP Best Practices
|
|||
|
- [JSON Spec Work continued](https://iiw.idcommons.net/JSON_Spec_Work_continued)
|
|||
|
- [User Managed Permission Interface](https://iiw.idcommons.net/User_Managed_Permission_Interface)
|
|||
|
#### Session 2
|
|||
|
- [Terms of Use Privacy Policy](https://iiw.idcommons.net/Terms_of_Use_Privacy_Policy)
|
|||
|
- [Look Up by Phone Number](https://iiw.idcommons.net/Look_Up_by_Phone_Number)
|
|||
|
- [Kitties are Fluffy](https://iiw.idcommons.net/Kitties_are_Fluffy)
|
|||
|
#### Session 3
|
|||
|
- [PDE - Go to Market and Community Strategy](https://iiw.idcommons.net/PDE_-_Go_to_Market_and_Community_Strategy)
|
|||
|
- [Adopting OAuth 2 OpenID Connect](https://iiw.idcommons.net/Adopting_OAuth_2_OpenID_Connect)
|
|||
|
- [Email is not Dead Yet](https://iiw.idcommons.net/Email_is_not_Dead_Yet)
|
|||
|
- [Policy Framework](https://iiw.idcommons.net/Policy_Framework)
|
|||
|
#### Session 4
|
|||
|
- [Best Ways to Connect People to Content](https://iiw.idcommons.net/Best_Ways_to_Connect_People_to_Content)
|
|||
|
- [Personal Data Ecosystem Org Role](https://iiw.idcommons.net/Personal_Data_Ecosystem_Org_Role)
|
|||
|
- [The Transactional Graph](https://iiw.idcommons.net/The_Transactional_Graph)
|
|||
|
#### Session 5
|
|||
|
- [Google Usability](https://iiw.idcommons.net/Google_Usability)
|
|||
|
- [Personal Data Ecosystem Org Role](https://iiw.idcommons.net/Personal_Data_Ecosystem_Org_Role)
|
|||
|
|
|||
|
## IIW Europe
|
|||
|
#### Session 1
|
|||
|
- [What is the MYDEX Prototype?](https://iiw.idcommons.net/What_is_the_MYDEX_Prototype%3F)
|
|||
|
- [Federated Network Access](https://iiw.idcommons.net/Federated_Network_Access)
|
|||
|
- [Partial Identities Privacy and Credentials](https://iiw.idcommons.net/Partial_Identities_Privacy_and_Credentials)
|
|||
|
- [Privacy and Federated Social Networking w/o Correlation](https://iiw.idcommons.net/Privacy_and_Federated_Social_Networking_w/o_Correlation)
|
|||
|
- [OpenID Tiered Providers](https://iiw.idcommons.net/OpenID_Tiered_Providers)
|
|||
|
- [Federated Identity as a Business Model](https://iiw.idcommons.net/Federated_Identity_as_a_Business_Model)
|
|||
|
#### Session 2
|
|||
|
- [Scoping the Single European Digital Identity Community](https://iiw.idcommons.net/Scoping_the_Single_European_Digital_Identity_Community)
|
|||
|
- [WebID and DNSSEC - combined session](https://iiw.idcommons.net/WebID_and_DNSSEC_-_combined_session)
|
|||
|
- [U-Prove - How Do We Use Privacy Enhancing Crypto?](https://iiw.idcommons.net/U-Prove_-_How_Do_We_Use_Privacy_Enhancing_Crypto%3F)
|
|||
|
#### Session 3
|
|||
|
- [What Do We Actually Mean When We Talk About Identity?](https://iiw.idcommons.net/What_Do_We_Actually_Mean_When_We_Talk_About_Identity%3F)
|
|||
|
- [The Quality of Customer Intelligence (Authenticity/Relevance Correlation)](https://iiw.idcommons.net/The_Quality_of_Customer_Intelligence_(Authenticity/Relevance_Correlation))
|
|||
|
- [Personal Data Store Harmonizing = Project Nori DEMO](https://iiw.idcommons.net/Personal_Data_Store_Harmonizing_%3D_Project_Nori_DEMO)
|
|||
|
- [Claims](https://iiw.idcommons.net/Claims)
|
|||
|
- [Authent-New Tools - Opportunities - Business](https://iiw.idcommons.net/Authent-New_Tools_-_Opportunities_-_Business)
|
|||
|
- [Remonetizing the Web:](https://iiw.idcommons.net/Remonetizing_the_Web:) from 'Give privacy, get service' to: A win-win social web ecosystem for customers, Telcos, Banks, Websites
|
|||
|
- [Identity Assurance (merges with) Automated Policy Negotiation](https://iiw.idcommons.net/Identity_Assurance_(merges_with)_Automated_Policy_Negotiation)
|
|||
|
#### Session 4
|
|||
|
- [CardSpace in the Clouds](https://iiw.idcommons.net/CardSpace_in_the_Clouds)
|
|||
|
- [Introduction to Digital Death - What Happens to Internet Identity After Death?](https://iiw.idcommons.net/Introduction_to_Digital_Death_-_What_Happens_to_Internet_Identity_After_Death%3F)
|
|||
|
- [One Social Web . org](https://iiw.idcommons.net/One_Social_Web_._org)
|
|||
|
- [Why do Politicians Understand So Little? Our Fault or Theirs?](https://iiw.idcommons.net/Why_do_Politicians_Understand_So_Little%3F_Our_Fault_or_Theirs%3F)
|
|||
|
- [How Do You (we) Manage Heterogeneous Groups?](https://iiw.idcommons.net/How_Do_You_(we)_Manage_Heterogeneous_Groups%3F)
|
|||
|
- [Issues About Profiling and Cross-Border Data Stores](https://iiw.idcommons.net/Issues_About_Profiling_and_Cross-Border_Data_Stores)
|
|||
|
- [OpenID the Nascar Problem Revisited](https://iiw.idcommons.net/OpenID_the_Nascar_Problem_Revisited)
|
|||
|
#### Session 5
|
|||
|
- [UK Gov. - They Want To Talk Identity. How Do We Help?](https://iiw.idcommons.net/UK_Gov._-_They_Want_To_Talk_Identity._How_Do_We_Help%3F)
|
|||
|
- [Embedding Privacy Controls in OnLine Identity Mechanism: How and Why?](https://iiw.idcommons.net/Embedding_Privacy_Controls_in_OnLine_Identity_Mechanism:_How_and_Why%3F)
|
|||
|
- [Privacy Dashboard Demo](https://iiw.idcommons.net/Privacy_Dashboard_Demo)
|
|||
|
- [Financial Services - distance selling, money laundering, "Know Your Customer"](https://iiw.idcommons.net/Financial_Services_-_distance_selling,_money_laundering,_%22Know_Your_Customer%22)
|
|||
|
- [Personal Data Ecosystem.org](https://iiw.idcommons.net/Personal_Data_Ecosystem.org)
|
|||
|
|
|||
|
## [IIW EAST](https://iiw.idcommons.net/Iiw-east-1)
|
|||
|
### THURSDAY
|
|||
|
#### Session 1
|
|||
|
- [Role of Government as Identity Oracle (Attribute Provider)](https://iiw.idcommons.net/Role_of_Government_as_Identity_Oracle_(Attribute_Provider))
|
|||
|
- [B2B and B2C: How to Balance the Difference and Challenges of Each Environment](https://iiw.idcommons.net/B2B_and_B2C:_How_to_Balance_the_Difference_and_Challenges_of_Each_Environment)
|
|||
|
- [Proofing the Masses](https://iiw.idcommons.net/Proofing_the_Masses)
|
|||
|
- [NSTIC 101 (wtf?)](https://iiw.idcommons.net/NSTIC_101_(wtf%3F))
|
|||
|
- [More Government Employees at IIW Next Time](https://iiw.idcommons.net/More_Government_Employees_at_IIW_Next_Time)
|
|||
|
- [PDX Ecosystem](https://iiw.idcommons.net/PDX_Ecosystem)
|
|||
|
- [High Assurance Consumer Identity](https://iiw.idcommons.net/High_Assurance_Consumer_Identity)
|
|||
|
#### Session 2
|
|||
|
- [Certifying Use Location for Politics Governance](https://iiw.idcommons.net/Certifying_Use_Location_for_Politics_Governance)
|
|||
|
- [Useability: Addressing the click - click - click problem](https://iiw.idcommons.net/Useability:_Addressing_the_click_-_click_-_click_problem)
|
|||
|
- [Leveraging Identity to Enable and Foster Scientific Collaboration](https://iiw.idcommons.net/Leveraging_Identity_to_Enable_and_Foster_Scientific_Collaboration)
|
|||
|
- [Identity and Cross Domain Systems (multilayer security)](https://iiw.idcommons.net/Identity_and_Cross_Domain_Systems_(multilayer_security))
|
|||
|
- [Should We Create "Ownership Rights" in Law for Personal Data?](https://iiw.idcommons.net/Should_We_Create_%22Ownership_Rights%22_in_Law_for_Personal_Data%3F)
|
|||
|
- [Personal Data Vision of Future: Video](https://iiw.idcommons.net/Personal_Data_Vision_of_Future:_Video)
|
|||
|
- [Attributes Claims - Identify Attributes LOA](https://iiw.idcommons.net/Attributes_Claims_-_Identify_Attributes_LOA)
|
|||
|
#### Session 3
|
|||
|
- [Are Mediation Tools Useful in Authentication?](https://iiw.idcommons.net/Are_Mediation_Tools_Useful_in_Authentication%3F)
|
|||
|
- [Open Identity for Closed Government: NSTIC the Cybersecurity Answer?](https://iiw.idcommons.net/Open_Identity_for_Closed_Government:_NSTIC_the_Cybersecurity_Answer%3F)
|
|||
|
- [Wholesale Privacy](https://iiw.idcommons.net/Wholesale_Privacy)
|
|||
|
- [Building Standards for "Trustable" ID Providers](https://iiw.idcommons.net/Building_Standards_for_%22Trustable%22_ID_Providers)
|
|||
|
- [Liability and Financial models for Identity Providers, Attribute Providers and Identity Proofers](https://iiw.idcommons.net/Liability_and_Financial_models_for_Identity_Providers,_Attribute_Providers_and_Identity_Proofers)
|
|||
|
- [Personal Data Stores and Context Automation](https://iiw.idcommons.net/Personal_Data_Stores_and_Context_Automation)
|
|||
|
- [Patient Centric Medical Record Federation - Securing HData](https://iiw.idcommons.net/Patient_Centric_Medical_Record_Federation_-_Securing_HData)
|
|||
|
- [How to Make HTTP Authentication Useful Again?](https://iiw.idcommons.net/How_to_Make_HTTP_Authentication_Useful_Again%3F)
|
|||
|
#### Session 4
|
|||
|
- [PRIVACY - Did We Solve Privacy for Web Identity Systems (technically already?)](https://iiw.idcommons.net/PRIVACY_-_Did_We_Solve_Privacy_for_Web_Identity_Systems_(technically_already%3F))
|
|||
|
- [Personal Data Store/Archive](https://iiw.idcommons.net/Personal_Data_Store/Archive)
|
|||
|
- [Service Chaining and Trust](https://iiw.idcommons.net/Service_Chaining_and_Trust)
|
|||
|
- [Extending OpenID Assertions with SAML+](https://iiw.idcommons.net/Extending_OpenID_Assertions_with_SAML%2B)
|
|||
|
- [NSTIC - "Identity Ecosystem"](https://iiw.idcommons.net/NSTIC_-_%22Identity_Ecosystem%22)
|
|||
|
- [Cross Federation Trust w/Meta Data](https://iiw.idcommons.net/Cross_Federation_Trust_w/Meta_Data)
|
|||
|
### FRIDAY
|
|||
|
#### Session 1
|
|||
|
- [OAUTH - What Topics Should We Focus On Next?](https://iiw.idcommons.net/OAUTH_-_What_Topics_Should_We_Focus_On_Next%3F)
|
|||
|
- [Liability for ldps, APs, RPs... Continued](https://iiw.idcommons.net/Liability_for_ldps,_APs,_RPs..._Continued)
|
|||
|
- [Getting More .gov @IIW](https://iiw.idcommons.net/Getting_More_.gov_@IIW)
|
|||
|
- [Identity Commons "3.0" Big Tent Creation](https://iiw.idcommons.net/Identity_Commons_%223.0%22_Big_Tent_Creation)
|
|||
|
#### Session 2
|
|||
|
- [Government Relationship Management](https://iiw.idcommons.net/Government_Relationship_Management)
|
|||
|
- [Enterprise Open ID](https://iiw.idcommons.net/Enterprise_Open_ID)
|
|||
|
- [Identity in the Browser (F2C)](https://iiw.idcommons.net/Identity_in_the_Browser_(F2C))
|
|||
|
#### Session 3
|
|||
|
- ["Today Geekdom, Tomorrow the World"](https://iiw.idcommons.net/%22Today_Geekdom,_Tomorrow_the_World%22)
|
|||
|
- [Personal Data Locker? What is it and Why?](https://iiw.idcommons.net/Personal_Data_Locker%3F_What_is_it_and_Why%3F)
|
|||
|
- [Ownership Rights in Data Pt2](https://iiw.idcommons.net/Ownership_Rights_in_Data_Pt2)
|
|||
|
- [Information Security Standards and "Levels of Protection"](https://iiw.idcommons.net/Information_Security_Standards_and_%22Levels_of_Protection%22)
|
|||
|
- [Certification Coordination - OIX, Kantara, ID Commons](https://iiw.idcommons.net/Certification_Coordination_-_OIX,_Kantara,_ID_Commons)
|
|||
|
#### Session 4
|
|||
|
- [OAUTH Signing #2](https://iiw.idcommons.net/OAUTH_Signing#2)
|
|||
|
- [Making NST IC Open/Making NST IC Happen](https://iiw.idcommons.net/Making_NST_IC_Open/Making_NST_IC_Happen)
|
|||
|
- [Hybrid Online/Offline Debate BYO Issue](https://iiw.idcommons.net/Hybrid_Online/Offline_Debate_BYO_Issue)
|
|||
|
- [Roadmap for Personal Data Store Ecology: Let's Make One](https://iiw.idcommons.net/Roadmap_for_Personal_Data_Store_Ecology:_Let%27s_Make_One)
|
|||
|
- [Demo](https://iiw.idcommons.net/Demo)
|
|||
|
|
|||
|
## [IIW 10 - Spring 2010](https://iiw.idcommons.net/Iiw10)
|
|||
|
### Monday
|
|||
|
#### Session 1
|
|||
|
- [Designing Faceted ID System](https://iiw.idcommons.net/Designing_Faceted_ID_System)
|
|||
|
- [Nascar for Sharing](https://iiw.idcommons.net/Nascar_for_Sharing) and Personal Service Distovery
|
|||
|
- [Using DNS + ENUM](https://iiw.idcommons.net/Using_DNS_%2B_ENUM)
|
|||
|
- [Getting Started in Internet Identity](https://iiw.idcommons.net/index.php?title=Getting_Started_in_Internet_Identity&action=edit&redlink=1)
|
|||
|
- [Can the Open Pile Become Beautiful Again](https://iiw.idcommons.net/Can_the_Open_Pile_Become_Beautiful_Again)
|
|||
|
- [Small Business Software on the Open Web](https://iiw.idcommons.net/Small_Business_Software_on_the_Open_Web)
|
|||
|
- [OAuth 2.0 WTF](https://iiw.idcommons.net/OAuth_2.0_WTF)
|
|||
|
- [Online Voter ID How do we do that?](https://iiw.idcommons.net/Online_Voter_ID_How_do_we_do_that%3F)
|
|||
|
#### Session 2
|
|||
|
- [Mozilla Proposes](https://iiw.idcommons.net/Mozilla_Proposes)
|
|||
|
- [Digital Heritage](https://iiw.idcommons.net/Digital_Heritage)
|
|||
|
- [Recovering a Lost Identity](https://iiw.idcommons.net/Recovering_a_Lost_Identity)
|
|||
|
- [Voluntary Oblivious Compliance](https://iiw.idcommons.net/Voluntary_Oblivious_Compliance)
|
|||
|
- [P2P Network Version Vega](https://iiw.idcommons.net/P2P_Network_Version_Vega)
|
|||
|
- [A New Liberty? to prevent single vendor dominance](https://iiw.idcommons.net/A_New_Liberty%3F_to_prevent_single_vendor_dominance)
|
|||
|
- [OpenID Connect WTF](https://iiw.idcommons.net/OpenID_Connect_WTF)
|
|||
|
#### Session 3
|
|||
|
- [Magic Signatures and Salmon](https://iiw.idcommons.net/Magic_Signatures_and_Salmon)
|
|||
|
- [Cet Competing e-ID providers creating a Market](https://iiw.idcommons.net/Cet_Competing_e-ID_providers_creating_a_Market)
|
|||
|
- [OneSocialWeb](https://iiw.idcommons.net/OneSocialWeb) XMPP & Social Web
|
|||
|
- [What do regular web devs need to know about ID](https://iiw.idcommons.net/What_do_regular_web_devs_need_to_know_about_ID)
|
|||
|
- [User Managed Access - UMA](https://iiw.idcommons.net/User_Managed_Access_-_UMA) (protocol)
|
|||
|
- [Permission vs Consent](https://iiw.idcommons.net/Permission_vs_Consent)
|
|||
|
- [eCitizen OpenID National Architecture](https://iiw.idcommons.net/ECitizen_OpenID_National_Architecture)
|
|||
|
- [OpenID Connect: Under the Hood](https://iiw.idcommons.net/OpenID_Connect:_Under_the_Hood)
|
|||
|
#### Session 4
|
|||
|
- [Trying to use PubSubHubbub](https://iiw.idcommons.net/index.php?title=Trying_to_use_PubSubHubbub&action=edit&redlink=1)
|
|||
|
- [Privacy Enhancing Approach](https://iiw.idcommons.net/Privacy_Enhancing_Approach)
|
|||
|
- [Contextual Identity](https://iiw.idcommons.net/Contextual_Identity)
|
|||
|
- [Identity Lifecycle](https://iiw.idcommons.net/Identity_Lifecycle)
|
|||
|
- [Verified Attribute Schema](https://iiw.idcommons.net/Verified_Attribute_Schema)
|
|||
|
- [Personal Data Stores](https://iiw.idcommons.net/Personal_Data_Stores)
|
|||
|
#### Session 5
|
|||
|
- [Voice Biometrics](https://iiw.idcommons.net/Voice_Biometrics)
|
|||
|
- [VRM Parts & Whole](https://iiw.idcommons.net/VRM_Parts_%26_Whole)
|
|||
|
- [Linking Data Across Social Networks APIs](https://iiw.idcommons.net/Linking_Data_Across_Social_Networks_APIs)
|
|||
|
- [Six Degrees of Sharing](https://iiw.idcommons.net/Six_Degrees_of_Sharing)
|
|||
|
- [OAuth 2](https://iiw.idcommons.net/OAuth_2)
|
|||
|
- [ORCID Open Research Contributor ID](https://iiw.idcommons.net/ORCID_Open_Research_Contributor_ID)
|
|||
|
### TUESDAY
|
|||
|
#### Session 1
|
|||
|
- [Strong Auth and OpenID getting Comfie](https://iiw.idcommons.net/Strong_Auth_and_OpenID_getting_Comfie)
|
|||
|
- [Information Cards and Gov Cards](https://iiw.idcommons.net/Information_Cards_and_Gov_Cards)
|
|||
|
- [De-Confusion Big Picture](https://iiw.idcommons.net/De-Confusion_Big_Picture)
|
|||
|
- [Open Geneology](https://iiw.idcommons.net/Open_Geneology)
|
|||
|
- [XRD Provisioning](https://iiw.idcommons.net/XRD_Provisioning)
|
|||
|
- [Building MITER ID](https://iiw.idcommons.net/Building_MITER_ID)
|
|||
|
- [OAuth 2.0 and SASL](https://iiw.idcommons.net/OAuth_2.0_and_SASL)
|
|||
|
#### Session 2
|
|||
|
- [Info Grid Graphic Database](https://iiw.idcommons.net/Info_Grid_Graphic_Database)
|
|||
|
- [Legal Issues Underpinning of UMA](https://iiw.idcommons.net/Legal_Issues_Underpinning_of_UMA) ("UMA and the law")
|
|||
|
- [Contacts in the Browser](https://iiw.idcommons.net/Contacts_in_the_Browser)
|
|||
|
- [Migrating from HTTP to HTTPS OpenID](https://iiw.idcommons.net/Migrating_from_HTTP_to_HTTPS_OpenID)
|
|||
|
- [Identity Business Models](https://iiw.idcommons.net/Identity_Business_Models)
|
|||
|
- [Patents, People Development Pools](https://iiw.idcommons.net/Patents,_People_Development_Pools)
|
|||
|
- [Enterprise Signing in OAuth](https://iiw.idcommons.net/Enterprise_Signing_in_OAuth)
|
|||
|
#### Session 3
|
|||
|
- [Simple Reputation Feed](https://iiw.idcommons.net/Simple_Reputation_Feed)
|
|||
|
- [Lawyers and Accountants](https://iiw.idcommons.net/Lawyers_and_Accountants)
|
|||
|
- [The Right Question](https://iiw.idcommons.net/The_Right_Question) Making Privacy Policies User-Centric vs. Data Centric
|
|||
|
- [OIX](https://iiw.idcommons.net/OIX)
|
|||
|
- [UX w/no logout...single sign out](https://iiw.idcommons.net/UX_w/no_logout...single_sign_out)
|
|||
|
- [URL-Sharing Using the OExchange Protocol Stack](https://iiw.idcommons.net/URL-Sharing_Using_the_OExchange_Protocol_Stack)
|
|||
|
- [Secure Web Auth](https://iiw.idcommons.net/Secure_Web_Auth)
|
|||
|
- [The Case for and Design of KRL](https://iiw.idcommons.net/index.php?title=The_Case_for_and_Design_of_KRL&action=edit&redlink=1)
|
|||
|
#### Session 4
|
|||
|
- [Research Report on Info Sharing](https://iiw.idcommons.net/Research_Report_on_Info_Sharing)
|
|||
|
- [OAuth 2 for Native Apps](https://iiw.idcommons.net/OAuth_2_for_Native_Apps)
|
|||
|
- [User Managed Access](https://iiw.idcommons.net/User_Managed_Access) (Claims 2.0)
|
|||
|
- [Client Side OptIN Cross Site Data Sharing](https://iiw.idcommons.net/Client_Side_OptIN_Cross_Site_Data_Sharing)
|
|||
|
- [Telco vs. The NET](https://iiw.idcommons.net/Telco_vs._The_NET)
|
|||
|
- [Web Biz Card](https://iiw.idcommons.net/index.php?title=Web_Biz_Card&action=edit&redlink=1)
|
|||
|
- [SAML Profiles for OAuth](https://iiw.idcommons.net/SAML_Profiles_for_OAuth)
|
|||
|
- [Separating: ID, Credential, and Attribute Management](https://iiw.idcommons.net/Separating:_ID,_Credential,_and_Attribute_Management)
|
|||
|
- [Story Cubing and Synergies](https://iiw.idcommons.net/Story_Cubing_and_Synergies)
|
|||
|
- [OpenID-Artifact Binding](https://iiw.idcommons.net/OpenID-Artifact_Binding)
|
|||
|
#### Session 5
|
|||
|
- [Biz Model on Distributed Social Web](https://iiw.idcommons.net/Biz_Model_on_Distributed_Social_Web)
|
|||
|
- [Directory Federation](https://iiw.idcommons.net/Directory_Federation)
|
|||
|
- [Honey Roasted Death Camp Salad](https://iiw.idcommons.net/Honey_Roasted_Death_Camp_Salad)
|
|||
|
- [OpenIDvNext Discovery](https://iiw.idcommons.net/OpenIDvNext_Discovery)
|
|||
|
- [Implications of User Owned Controlled Data as Official Government Policy](https://iiw.idcommons.net/Implications_of_User_Owned_Controlled_Data_as_Official_Government_Policy)
|
|||
|
- [Google as an OpenID RP](https://iiw.idcommons.net/Google_as_an_OpenID_RP)
|
|||
|
### WEDNESDAY
|
|||
|
#### Session 1
|
|||
|
- [Personal Data Store Ecosystem Design](https://iiw.idcommons.net/Personal_Data_Store_Ecosystem_Design)
|
|||
|
- [(In)Coherent Web (in)security Policy Framework](https://iiw.idcommons.net/(In)Coherent_Web_(in)security_Policy_Framework)
|
|||
|
- [Bootstrapping OAuth 2.0 Ecosystems](https://iiw.idcommons.net/Bootstrapping_OAuth_2.0_Ecosystems)
|
|||
|
#### Session 2
|
|||
|
- [OAuth Provisioning](https://iiw.idcommons.net/OAuth_Provisioning) continued
|
|||
|
- [Stateless Distributed Membership an Inquiry](https://iiw.idcommons.net/Stateless_Distributed_Membership_an_Inquiry)
|
|||
|
- [Emancipay VRM and CRM](https://iiw.idcommons.net/Emancipay_VRM_and_CRM)
|
|||
|
- [Breaking up with Atom Activity Streams](https://iiw.idcommons.net/Breaking_up_with_Atom_Activity_Streams)
|
|||
|
#### Session 3
|
|||
|
- [DNSSEC](https://iiw.idcommons.net/DNSSEC)
|
|||
|
- [Certifying Open ID, IdPs, RP](https://iiw.idcommons.net/Certifying_Open_ID,_IdPs,_RP)
|
|||
|
- [SMART UMA](https://iiw.idcommons.net/SMART_UMA)
|
|||
|
- [Catalyst Interop Planning](https://iiw.idcommons.net/Catalyst_Interop_Planning)
|
|||
|
- [PCITF: Payment Card Industry Trust Framework](https://iiw.idcommons.net/PCITF:_Payment_Card_Industry_Trust_Framework)
|
|||
|
#### Session 4
|
|||
|
- [7 Deadly Sins of Distributed Authentication](https://iiw.idcommons.net/7_Deadly_Sins_of_Distributed_Authentication)
|
|||
|
- [Afgan Anarchy](https://iiw.idcommons.net/Afgan_Anarchy)
|
|||
|
- [Telco/Web/Data Meta Story](https://iiw.idcommons.net/Telco/Web/Data_Meta_Story)
|
|||
|
#### Session 5
|
|||
|
- [XDI and RDF Graph Model](https://iiw.idcommons.net/XDI_and_RDF_Graph_Model)
|
|||
|
- [Telco-Web-Data User Model Scenarios](https://iiw.idcommons.net/Telco-Web-Data_User_Model_Scenarios)
|
|||
|
- [IIW What's Next?](https://iiw.idcommons.net/IIW_What%27s_Next%3F)
|
|||
|
|
|||
|
## [IIW 9 - Fall 2009](https://iiw.idcommons.net/Notes_iiw9)
|
|||
|
#### Session 1
|
|||
|
- [OpenID Artifact Binding](https://iiw.idcommons.net/OpenID_Artifact_Binding) =Nat
|
|||
|
- [Gluu Metaprise](https://iiw.idcommons.net/Gluu_Metaprise) - MIke Schwartz
|
|||
|
- [Cloud Selector](https://iiw.idcommons.net/Cloud_Selector) - Susan Marrow
|
|||
|
- [Vulnerabilities in ID tech](https://iiw.idcommons.net/Vulnerabilities_in_ID_tech) - Rich Smith
|
|||
|
- [VRM Loyalty Cards in Real World](https://iiw.idcommons.net/VRM_Loyalty_Cards_in_Real_World) - Chris Carfi
|
|||
|
- [Data Portability TOS EULA](https://iiw.idcommons.net/Data_Portability_TOS_EULA) - Steve Greenberg
|
|||
|
- [Social Consent](https://iiw.idcommons.net/Social_Consent) - Angus Logan, Kevin Marks
|
|||
|
- [Social InterNetworking](https://iiw.idcommons.net/Social_InterNetworking) - Rohit Khare
|
|||
|
#### Session 2
|
|||
|
- [Attribute eXchange](https://iiw.idcommons.net/Attribute_eXchange) =Nat
|
|||
|
- [Biz Case for Data Portability](https://iiw.idcommons.net/Biz_Case_for_Data_Portability) - Elias Bizannes
|
|||
|
- [Identity Selector for OpenID](https://iiw.idcommons.net/Identity_Selector_for_OpenID) - Mike Jones, Ariel Gordon, Oren Melzer
|
|||
|
- [Enterprise Use of Consumer Identities](https://iiw.idcommons.net/Enterprise_Use_of_Consumer_Identities) - Pamela Dingle
|
|||
|
- [Activity Streams](https://iiw.idcommons.net/Activity_Streams) - Monica Keller, Chris Messina
|
|||
|
- [Privacy Risk Assessment](https://iiw.idcommons.net/Privacy_Risk_Assessment) at the data item level - Jeff Stallman
|
|||
|
- [Question to ask for request](https://iiw.idcommons.net/Question_to_ask_for_request) - Alan Karp
|
|||
|
- [Legal Layer of the Stack](https://iiw.idcommons.net/Legal_Layer_of_the_Stack) - Scott David
|
|||
|
- [Twitter What's with it?](https://iiw.idcommons.net/Twitter_What%27s_with_it%3F) - Kaliya
|
|||
|
#### Session 3
|
|||
|
- [Salmon](https://iiw.idcommons.net/Salmon) - John Panzer
|
|||
|
- [Selling to Consumers](https://iiw.idcommons.net/Selling_to_Consumers) - Phil wolff
|
|||
|
- [User- Managed Access](https://iiw.idcommons.net/User-_Managed_Access) - Eve Maler
|
|||
|
- [Email Sucks What's Next](https://iiw.idcommons.net/Email_Sucks_What%27s_Next) - JAM
|
|||
|
#### Session 4
|
|||
|
- [Attribute Aggregation](https://iiw.idcommons.net/Attribute_Aggregation) - David Chadwick
|
|||
|
- [OpenID Security](https://iiw.idcommons.net/OpenID_Security) - Breno, Jeff, Ashish
|
|||
|
- [Building Action Cards](https://iiw.idcommons.net/Building_Action_Cards) - Phil Windley
|
|||
|
- [Microformats](https://iiw.idcommons.net/Microformats) Meaning in HTML existing formats - Kevin Marks
|
|||
|
- [elgg](https://iiw.idcommons.net/Elgg) Open Source Social Networking - Justin Richer
|
|||
|
- [Defining Meaningful Claims](https://iiw.idcommons.net/Defining_Meaningful_Claims) - Patricia
|
|||
|
#### Sessoin 5
|
|||
|
- [OpenID for Science Community](https://iiw.idcommons.net/OpenID_for_Science_Community) - Dhiva, Mike Helm
|
|||
|
- [Identity in the Browser: Security and Protocol Issues](https://iiw.idcommons.net/Identity_in_the_Browser:_Security_and_Protocol_Issues)
|
|||
|
- [Role of 3rd Parties](https://iiw.idcommons.net/Role_of_3rd_Parties) in enabling trust frameworks, challenges, business models, opportunities - Lena Kannappan
|
|||
|
- [What an RP Needs](https://iiw.idcommons.net/What_an_RP_Needs) - Joseph Smarr
|
|||
|
- [The Business Imperative of User-Driven Data](https://iiw.idcommons.net/The_Business_Imperative_of_User-Driven_Data) - Darias Dunlap
|
|||
|
#### Session 6
|
|||
|
- [Trust Nexus](https://iiw.idcommons.net/Trust_Nexus) - Mike Duffy
|
|||
|
- [Open Identity Trust Framework](https://iiw.idcommons.net/Open_Identity_Trust_Framework) - Drummond Reed, Don Thibeau
|
|||
|
- [The Hammer-Stack](https://iiw.idcommons.net/The_Hammer-Stack) "advanced"
|
|||
|
- [Identity and Cloud Computing](https://iiw.idcommons.net/Identity_and_Cloud_Computing) - Anil Saldhana
|
|||
|
- [Active Client iiw9](https://iiw.idcommons.net/Active_Client_iiw9) - RL "Bob" Morgan
|
|||
|
- [The Small Business Web](https://iiw.idcommons.net/The_Small_Business_Web) Issues of building a "whole product solution" - Sunir Shah, Freshbooks
|
|||
|
- [4th Party Provider Brainstorm](https://iiw.idcommons.net/4th_Party_Provider_Brainstorm)
|
|||
|
#### Day 2 Lunch
|
|||
|
- [ID Commons Stewards Call](https://iiw.idcommons.net/index.php?title=ID_Commons_Stewards_Call&action=edit&redlink=1) - Mary Ruddy
|
|||
|
#### Session 7
|
|||
|
- [OpenID Contract Exchange and Japan Update](https://iiw.idcommons.net/OpenID_Contract_Exchange_and_Japan_Update) =Nat
|
|||
|
- [Identity and iPhone](https://iiw.idcommons.net/Identity_and_iPhone) - Jeff Shan
|
|||
|
- [OpenID Session Management Best Practices](https://iiw.idcommons.net/OpenID_Session_Management_Best_Practices) - Johannes Earst
|
|||
|
- [Going to Market](https://iiw.idcommons.net/Going_to_Market) Mobilizing a community of RP's and OpenID InfoCard enabled session - Mike Ozburn, Scott David
|
|||
|
- [Is Assurance Real?](https://iiw.idcommons.net/Is_Assurance_Real%3F) - RL "bob Morgan
|
|||
|
- [OpenID Provider Office Hours](https://iiw.idcommons.net/OpenID_Provider_Office_Hours) - Yahoo, Google, AOL, MyOpenID
|
|||
|
#### Session 8
|
|||
|
- [Salmon Pixie Dust](https://iiw.idcommons.net/Salmon_Pixie_Dust) - Johnathan Panzer
|
|||
|
- [I'm from Phone Company How can I help](https://iiw.idcommons.net/index.php?title=I%27m_from_Phone_Company_How_can_I_help&action=edit&redlink=1) - Kevin Marks, BT
|
|||
|
- [Strong AuthN](https://iiw.idcommons.net/Strong_AuthN) - Micheal Sprague, Wave Systems
|
|||
|
- [Schema Mapping Using Personal Data Madel](https://iiw.idcommons.net/Schema_Mapping_Using_Personal_Data_Madel) - Paul Trevithick
|
|||
|
#### Session 9
|
|||
|
- [OpenID v. Next](https://iiw.idcommons.net/OpenID_v._Next)
|
|||
|
- [Information Sharing](https://iiw.idcommons.net/Information_Sharing) - Joe Andreu
|
|||
|
- [Data Traceability in the cloud](https://iiw.idcommons.net/Data_Traceability_in_the_cloud) - Steve Holcombe
|
|||
|
- [Facebook Recycling](https://iiw.idcommons.net/index.php?title=Facebook_Recycling&action=edit&redlink=1) -
|
|||
|
- [Spectrum of Identity](https://iiw.idcommons.net/Spectrum_of_Identity) and other things - Kaliya Hamlin Rick Smith
|
|||
|
#### Session 10
|
|||
|
- [WRAP](https://iiw.idcommons.net/WRAP) - Simple OAuth - Web Resource AuthN Protocol - Dick Hardt, Allen Tom, Brian Patton
|
|||
|
- [From Paramecium to People](https://iiw.idcommons.net/From_Paramecium_to_People) - Bioinformatics,Identity and Law - Scott David
|
|||
|
- [Portable Contexts](https://iiw.idcommons.net/Portable_Contexts) - Joe Andreu
|
|||
|
- [How Should Identity Support in the browser look like?](https://iiw.idcommons.net/How_Should_Identity_Support_in_the_browser_look_like%3F) - Johannes Ernst
|
|||
|
- [My Ideal Identity Flow](https://iiw.idcommons.net/My_Ideal_Identity_Flow) - Eran Sandler
|
|||
|
#### Session 11
|
|||
|
- [Public Key Discovery](https://iiw.idcommons.net/index.php?title=Public_Key_Discovery&action=edit&redlink=1)
|
|||
|
- [Identity in the Browser](https://iiw.idcommons.net/Identity_in_the_Browser)
|
|||
|
- [SAML and OAuth](https://iiw.idcommons.net/SAML_and_OAuth) - Paul Madsen
|
|||
|
- [Open Identity Trust Frameworks](https://iiw.idcommons.net/Open_Identity_Trust_Frameworks)
|
|||
|
- [Lessons Learned Past Efforts](https://iiw.idcommons.net/Lessons_Learned_Past_Efforts)...Email Auth... Ev SSL - Jim Fenton, Craig Spiezle
|
|||
|
#### Lunch Day 3
|
|||
|
- [Why Facebook doesn't implement OAuth today](https://iiw.idcommons.net/Why_Facebook_doesn%27t_implement_OAuth_today) - Luke, David
|
|||
|
- [Getting data into XRD](https://iiw.idcommons.net/Getting_data_into_XRD) - Will Noris
|
|||
|
#### Session 12
|
|||
|
- [Rich Sharing on the Web](https://iiw.idcommons.net/Rich_Sharing_on_the_Web) - Alan Kar
|
|||
|
- [XRI Resolution using XRD 1.0](https://iiw.idcommons.net/XRI_Resolution_using_XRD_1.0) =Drummond
|
|||
|
- [Where should Identity Live](https://iiw.idcommons.net/Where_should_Identity_Live) - Andrew Arnott
|
|||
|
- [Factors Influencing VRM/CMI Enabled marketing systems](https://iiw.idcommons.net/index.php?title=Factors_Influencing_VRM/CMI_Enabled_marketing_systems&action=edit&redlink=1) - Michael Becker
|
|||
|
|
|||
|
## [IIW 8 - Spring 2009](https://iiw.idcommons.net/Notes_iiw8)
|
|||
|
#### Session 1
|
|||
|
- [Identity Doesn't Matter - Authorization Does](https://iiw.idcommons.net/Identity_Doesn%27t_Matter_-_Authorization_Does), Alan Karp
|
|||
|
- [Distributed Identity Based on Relationships](https://iiw.idcommons.net/Distributed_Identity_Based_on_Relationships), Pat Sankar from Rel-ID
|
|||
|
- [Do People want to Own and Manage Their Identity](https://iiw.idcommons.net/Do_People_want_to_Own_and_Manage_Their_Identity)? If so, How?, Ernie..... State of OpenID - Authoratatives Discussoin RE: State of 1) Trust/Security 2) User Experience 3) Nascarization 4) Attribute Exchange 5) Adoption by David Eyes
|
|||
|
- [Defining an Architecture and Lexicon for VRM and Volunteered Personal Information](https://iiw.idcommons.net/Defining_an_Architecture_and_Lexicon_for_VRM_and_Volunteered_Personal_Information) building on VRM Workshop Dialogue - Iain Henderson ([video](http://idcoach.blip.tv/file/3597970/))
|
|||
|
#### Session 2
|
|||
|
- [Authentication or Authorization? Can we move to verification Now?](https://iiw.idcommons.net/Authentication_or_Authorization%3F_Can_we_move_to_verification_Now%3F), Doug Whitmore
|
|||
|
- [Financial Institutions as Identity Providers](https://iiw.idcommons.net/Financial_Institutions_as_Identity_Providers), Guiyom
|
|||
|
- [Identity and Privacy - Who to Trust with Your Data](https://iiw.idcommons.net/Identity_and_Privacy_-_Who_to_Trust_with_Your_Data), Mainak
|
|||
|
- [Identity Quartet and User Driven Identity](https://iiw.idcommons.net/Identity_Quartet_and_User_Driven_Identity), Joe Andrieu ([video](http://idcoach.blip.tv/file/3584981/))
|
|||
|
- [Identity Services Business Models](https://iiw.idcommons.net/Identity_Services_Business_Models), Bob Blakley
|
|||
|
- [OpenID For Desktop Applications: How? When?](https://iiw.idcommons.net/OpenID_For_Desktop_Applications:_How%3F_When%3F), Infinity Linden
|
|||
|
- [Sharing Permission RESTfully with Web-Keys](https://iiw.idcommons.net/Sharing_Permission_RESTfully_with_Web-Keys), Tyler Close.... ... Authorization without boring crypto (It is possible and it is secure), Hans Granquist
|
|||
|
#### Session 3
|
|||
|
- [Filtering the Noise in the Activity Streams](https://iiw.idcommons.net/Filtering_the_Noise_in_the_Activity_Streams) How to <3 your stream..., Monica
|
|||
|
- [Role as Identity and Organizational Trust](https://iiw.idcommons.net/Role_as_Identity_and_Organizational_Trust), Justin Richer
|
|||
|
- [Higgins Cloud Selector](https://iiw.idcommons.net/Higgins_Cloud_Selector) (a way to use i-cards without installing anything on your Machine), Markus ([video](http://idcoach.blip.tv/file/3597752/))
|
|||
|
- [Keeping User Happy on the Desktop vs. On the Web](https://iiw.idcommons.net/Keeping_User_Happy_on_the_Desktop_vs._On_the_Web) (OS-level vs Online ID Management), Aridren N. (Apple) / Ariel G. (MSFT) ... ...What would it look like if Apple designed OpenID?, Chris Messina
|
|||
|
#### Session 4
|
|||
|
- [Action Cards](https://iiw.idcommons.net/Action_Cards) (Part 1) What are they, How do they Work, what are the Issues, Drummond Reed (also see opening talk ([video](http://idcoach.blip.tv/file/3582505/)) by Drummond)
|
|||
|
- [Becoming an OpenID Relying Party](https://iiw.idcommons.net/Becoming_an_OpenID_Relying_Party), Luke Shepard (Facebook) and George Fletcher (AOL)
|
|||
|
- [Enhanced Transaction Model Using InfoCards](https://iiw.idcommons.net/Enhanced_Transaction_Model_Using_InfoCards), Jeff Stollman
|
|||
|
- [Distributed Expertise Location](https://iiw.idcommons.net/Distributed_Expertise_Location), Terrell Russell
|
|||
|
- [Characteristics of VRM](https://iiw.idcommons.net/Characteristics_of_VRM) Joe ([video](http://idcoach.blip.tv/file/3597754/)) (also see opening talk ([video](http://idcoach.blip.tv/file/3582445/)) by Doc Searls)
|
|||
|
- [Claims, Tickets and OAuth](https://iiw.idcommons.net/Claims,_Tickets_and_OAuth) Yaron Y. Goland
|
|||
|
#### Session 5
|
|||
|
- [Action Cards](https://iiw.idcommons.net/Action_Cards) (Part 2) Building Action Cards with Kynetx (Demo), Phil Windley
|
|||
|
- [Identity Brokers](https://iiw.idcommons.net/Identity_Brokers) What are they? How do they Work?, Ben Sapiro
|
|||
|
- [Claims, Tickets and OAuth](https://iiw.idcommons.net/Claims,_Tickets_and_OAuth) Yaron Y. Goland [Value of Identity](https://iiw.idcommons.net/Value_of_Identity) (end user) and SEO,
|
|||
|
- [ID-Legal "straw man" blog](https://iiw.idcommons.net/ID-Legal_%22straw_man%22_blog), Lucy
|
|||
|
- [Self Asserted Attributes](https://iiw.idcommons.net/Self_Asserted_Attributes) When to Trust Them, AssertID
|
|||
|
- [Claims, Tickets and OAuth](https://iiw.idcommons.net/Claims,_Tickets_and_OAuth) Yaron Y. Goland[VRM 1st and 4th Parties](https://iiw.idcommons.net/VRM_1st_and_4th_Parties), Doc ([video](http://idcoach.blip.tv/file/3597963/))
|
|||
|
- [User-Managed Identity Use-Case Gathering](https://iiw.idcommons.net/User-Managed_Identity_Use-Case_Gathering) (To Identity Symergy), Trent Adams
|
|||
|
- [Developing a Secure Discovery Based Messaging System](https://iiw.idcommons.net/Developing_a_Secure_Discovery_Based_Messaging_System), Nika
|
|||
|
#### Session 6
|
|||
|
- [Are there "standards" for Registering to Call an API](https://iiw.idcommons.net/Are_there_%22standards%22_for_Registering_to_Call_an_API), Angus Logan
|
|||
|
- [Protect Serve](https://iiw.idcommons.net/6C:_ProtectServe_and_Relationship_Manager_presentation) Relationship Management for User-Driven Access Control, Eve Maler ([video](http://idcoach.blip.tv/file/3598084/))
|
|||
|
- [VRM and Media](https://iiw.idcommons.net/VRM_and_Media), Doc
|
|||
|
- [OAuth for High Value Transactions](https://iiw.idcommons.net/OAuth_for_High_Value_Transactions), Jeff Shan
|
|||
|
- [Managing Alternative Identities](https://iiw.idcommons.net/Managing_Alternative_Identities), Infinity Linden
|
|||
|
- Introduction to [Discovery](https://iiw.idcommons.net/Discovery) or How Do we Interact with the Unknown, Eran Hammer
|
|||
|
- [Big Dialogue and Online Community Identity Rules](https://iiw.idcommons.net/Big_Dialogue_and_Online_Community_Identity_Rules) MIT Media Lab/ Harvard Berkman Center
|
|||
|
- Innovation Games, Nancy Frishberg ([video](http://idcoach.blip.tv/file/3599429/))
|
|||
|
- [Assurance in the Real World](https://iiw.idcommons.net/Assurance_in_the_Real_World) Levels, Communities, Certificates, Governments, Protocols, Bob Morgan ........ Discovering Federation and Trust Levels for OpenID Info-Card SAML, John Bradley.......Next-Gen O PenID Discovery: LRDD, XRD, signed delegation etc., Dirk Balfanz
|
|||
|
|
|||
|
#### Session 7
|
|||
|
- [OpenID UX](https://iiw.idcommons.net/OpenID_UX) OpenID UI Extension Best Practices, Allen Tom
|
|||
|
- [Confetti](https://iiw.idcommons.net/Confetti) Stop Storing Passords and Start using Delegation -> Get more users, Kevin Marks
|
|||
|
- [Use Cases for User-Managed Access](https://iiw.idcommons.net/7C:_Use_Cases_for_User-Managed_Access), Eve Maler, Alan K, Trent A, Paul T. Dazza G.
|
|||
|
- [Failed Identity Businesses](https://iiw.idcommons.net/Failed_Identity_Businesses), Chris
|
|||
|
- [Contextual Friends Lists and Sexuality Online](https://iiw.idcommons.net/Contextual_Friends_Lists_and_Sexuality_Online), Sarah Dopp
|
|||
|
- [Kantara Initiative](https://iiw.idcommons.net/Kantara_Initiative), Brett McDowell
|
|||
|
- [Activity Strea.ms](https://iiw.idcommons.net/Activity_Strea.ms) Formalizing Draft Spec
|
|||
|
#### Session 8
|
|||
|
- [Detecting User Login State and Preferences](https://iiw.idcommons.net/Detecting_User_Login_State_and_Preferences) Brian E, Luke Shepard (Facebook)
|
|||
|
- [Microformats](https://iiw.idcommons.net/Microformats) *distributed data, *in HTML, *in Google SERPs, Kevin Marks ([video](http://idcoach.blip.tv/file/3599288/))
|
|||
|
- [User Driven Search](https://iiw.idcommons.net/User_Driven_Search), Joe Andrieu
|
|||
|
- [Personal Relationship Management](https://iiw.idcommons.net/Personal_Relationship_Management) What about starting an Open-Source project?
|
|||
|
- [Web 2.0 vs. Rich Internet Apps (RIA)](https://iiw.idcommons.net/Web_2.0_vs._Rich_Internet_Apps_(RIA)), Brett McDowell
|
|||
|
- [OAuth for Installed Applications](https://iiw.idcommons.net/OAuth_for_Installed_Applications), Nathan Beach, Eric Sachs
|
|||
|
- [Identity and the Future of Money](https://iiw.idcommons.net/Identity_and_the_Future_of_Money), Giyom
|
|||
|
- Having Fun with Wakame, Asa Hardcastle ([video](http://idcoach.blip.tv/file/3599484/))
|
|||
|
#### Other
|
|||
|
- [Demos](https://iiw.idcommons.net/Demos)
|
|||
|
- [How to talk to Business People](https://iiw.idcommons.net/How_to_talk_to_Business_People), Mike Ozburn
|
|||
|
#### Session 9
|
|||
|
- [9A: Use Case Selection and Metrics](https://iiw.idcommons.net/Use_Case_Selection_and_Metrics), Eve Maler, Alan Karp
|
|||
|
- [Activity Streams, Twitter API, Facebook, Open Social, Yahoo! Updates](https://iiw.idcommons.net/Activity_Streams,_Twitter_API,_Facebook,_Open_Social,_Yahoo!_Updates), Kevin Marks ([QT video](http://iiw8.digitalidcoach.com/11-KevinM-ActivStmsMicrofmats.mov))
|
|||
|
- [Simpler OAuth For Lower Risk Use Cases](https://iiw.idcommons.net/Simpler_OAuth_For_Lower_Risk_Use_Cases), Brian Eaton, Eric Sachs
|
|||
|
#### Session 10
|
|||
|
- Use Case Selection and Metrics Part 2: See 9A: [Use Case Selection and Metrics](https://iiw.idcommons.net/Use_Case_Selection_and_Metrics)
|
|||
|
- [What does and RP need to survive compromise of user@idp?](https://iiw.idcommons.net/What_does_and_RP_need_to_survive_compromise_of_user@idp%3F) Breno (Google), Luke Shepard (Facebook)
|
|||
|
- [OSIS Testing](https://iiw.idcommons.net/OSIS_Testing) John Bradley
|
|||
|
- [Innovation Design and Serious Games](https://iiw.idcommons.net/Innovation_Design_and_Serious_Games) To Make Your Products Rock, Kaliya and Nancy F ([QT video](http://iiw8.digitalidcoach.com/12-Nancy-Games.mov))
|
|||
|
- [Identity in 10 Years - How People Change](https://iiw.idcommons.net/Identity_in_10_Years_-_How_People_Change) Chris
|
|||
|
- [OAuth for Enterprise](https://iiw.idcommons.net/OAuth_for_Enterprise) Use Cases (2 legged), Eric Sachs
|
|||
|
#### Session 11
|
|||
|
- [Personal Hype Quotient:](https://iiw.idcommons.net/Personal_Hype_Quotient:) OAuth in Use - meet the OAuthors
|
|||
|
- [Visual e-ID](https://iiw.idcommons.net/Visual_e-ID) (Certificate Image Extension
|
|||
|
- [InfoGrid](https://iiw.idcommons.net/InfoGrid) sneak preview, Johannes Ernst
|
|||
|
- [WebFinger](https://iiw.idcommons.net/11D:_Webfinger_aka_Personal_Web_Discovery) (Personal Web Disco)
|
|||
|
- [Internal and External Identity in the Enterprise](https://iiw.idcommons.net/Internal_and_External_Identity_in_the_Enterprise), Justin Richer
|
|||
|
- [What if an IDP allows logins to multiple accounts at the same time?](https://iiw.idcommons.net/What_if_an_IDP_allows_logins_to_multiple_accounts_at_the_same_time%3F) RP Impact?, Eric Sachs
|
|||
|
#### Session 12
|
|||
|
- [NASCAR DEMO with Action Cards](https://iiw.idcommons.net/NASCAR_DEMO_with_Action_Cards), Phil Windley and Drummond
|
|||
|
- [OpenID, Open Social and Mobile](https://iiw.idcommons.net/OpenID,_Open_Social_and_Mobile), Jeff
|
|||
|
- [Open Liberty Released - Wakame](https://iiw.idcommons.net/Open_Liberty_Released_-_Wakame) VI.O ID-WSF FUN, Asa Hardcastle ([QT video](http://iiw8.digitalidcoach.com/13-Asa-WakameFun.mov))
|
|||
|
- [Validation Extension for OpenID](https://iiw.idcommons.net/Validation_Extension_for_OpenID), Henrick
|
|||
|
- [Use Cases for Identity Brokers](https://iiw.idcommons.net/Use_Cases_for_Identity_Brokers) Ben S. Ashish J.
|
|||
|
- [OpenID PGP and Thawte Key Signing](https://iiw.idcommons.net/OpenID_PGP_and_Thawte_Key_Signing), SignpollyMa, Will Norris
|
|||
|
|
|||
|
## [IIW 7 - 2008b](https://iiw.idcommons.net/Iiw2008b)
|
|||
|
### Monday
|
|||
|
#### Session 1
|
|||
|
- [Designing Faceted ID System](https://iiw.idcommons.net/Designing_Faceted_ID_System)
|
|||
|
- [Nascar for Sharing](https://iiw.idcommons.net/Nascar_for_Sharing) and Personal Service Distovery
|
|||
|
- [Using DNS + ENUM](https://iiw.idcommons.net/Using_DNS_%2B_ENUM)
|
|||
|
- [Getting Started in Internet Identity](https://iiw.idcommons.net/index.php?title=Getting_Started_in_Internet_Identity&action=edit&redlink=1)
|
|||
|
- [Can the Open Pile Become Beautiful Again](https://iiw.idcommons.net/Can_the_Open_Pile_Become_Beautiful_Again)
|
|||
|
- [Small Business Software on the Open Web](https://iiw.idcommons.net/Small_Business_Software_on_the_Open_Web)
|
|||
|
- [OAuth 2.0 WTF](https://iiw.idcommons.net/OAuth_2.0_WTF)
|
|||
|
- [Online Voter ID How do we do that?](https://iiw.idcommons.net/Online_Voter_ID_How_do_we_do_that%3F)
|
|||
|
#### Session 2
|
|||
|
- [Mozilla Proposes](https://iiw.idcommons.net/Mozilla_Proposes)
|
|||
|
- [Digital Heritage](https://iiw.idcommons.net/Digital_Heritage)
|
|||
|
- [Recovering a Lost Identity](https://iiw.idcommons.net/Recovering_a_Lost_Identity)
|
|||
|
- [Voluntary Oblivious Compliance](https://iiw.idcommons.net/Voluntary_Oblivious_Compliance)
|
|||
|
- [P2P Network Version Vega](https://iiw.idcommons.net/P2P_Network_Version_Vega)
|
|||
|
- [A New Liberty? to prevent single vendor dominance](https://iiw.idcommons.net/A_New_Liberty%3F_to_prevent_single_vendor_dominance)
|
|||
|
- [OpenID Connect WTF](https://iiw.idcommons.net/OpenID_Connect_WTF)
|
|||
|
#### Session 3
|
|||
|
- [Magic Signatures and Salmon](https://iiw.idcommons.net/Magic_Signatures_and_Salmon)
|
|||
|
- [Cet Competing e-ID providers creating a Market](https://iiw.idcommons.net/Cet_Competing_e-ID_providers_creating_a_Market)
|
|||
|
- [OneSocialWeb](https://iiw.idcommons.net/OneSocialWeb) XMPP & Social Web
|
|||
|
- [What do regular web devs need to know about ID](https://iiw.idcommons.net/What_do_regular_web_devs_need_to_know_about_ID)
|
|||
|
- [User Managed Access - UMA](https://iiw.idcommons.net/User_Managed_Access_-_UMA) (protocol)
|
|||
|
- [Permission vs Consent](https://iiw.idcommons.net/Permission_vs_Consent)
|
|||
|
- [eCitizen OpenID National Architecture](https://iiw.idcommons.net/ECitizen_OpenID_National_Architecture)
|
|||
|
- [OpenID Connect: Under the Hood](https://iiw.idcommons.net/OpenID_Connect:_Under_the_Hood)
|
|||
|
#### Session 4
|
|||
|
- [Trying to use PubSubHubbub](https://iiw.idcommons.net/index.php?title=Trying_to_use_PubSubHubbub&action=edit&redlink=1)
|
|||
|
- [Privacy Enhancing Approach](https://iiw.idcommons.net/Privacy_Enhancing_Approach)
|
|||
|
- [Contextual Identity](https://iiw.idcommons.net/Contextual_Identity)
|
|||
|
- [Identity Lifecycle](https://iiw.idcommons.net/Identity_Lifecycle)
|
|||
|
- [Verified Attribute Schema](https://iiw.idcommons.net/Verified_Attribute_Schema)
|
|||
|
- [Personal Data Stores](https://iiw.idcommons.net/Personal_Data_Stores)
|
|||
|
#### Session 5
|
|||
|
- [Voice Biometrics](https://iiw.idcommons.net/Voice_Biometrics)
|
|||
|
- [VRM Parts & Whole](https://iiw.idcommons.net/VRM_Parts_%26_Whole)
|
|||
|
- [Linking Data Across Social Networks APIs](https://iiw.idcommons.net/Linking_Data_Across_Social_Networks_APIs)
|
|||
|
- [Six Degrees of Sharing](https://iiw.idcommons.net/Six_Degrees_of_Sharing)
|
|||
|
- [OAuth 2](https://iiw.idcommons.net/OAuth_2)
|
|||
|
- [ORCID Open Research Contributor ID](https://iiw.idcommons.net/ORCID_Open_Research_Contributor_ID)
|
|||
|
### TUESDAY
|
|||
|
#### Session 1
|
|||
|
- [Strong Auth and OpenID getting Comfie](https://iiw.idcommons.net/Strong_Auth_and_OpenID_getting_Comfie)
|
|||
|
- [Information Cards and Gov Cards](https://iiw.idcommons.net/Information_Cards_and_Gov_Cards)
|
|||
|
- [De-Confusion Big Picture](https://iiw.idcommons.net/De-Confusion_Big_Picture)
|
|||
|
- [Open Geneology](https://iiw.idcommons.net/Open_Geneology)
|
|||
|
- [XRD Provisioning](https://iiw.idcommons.net/XRD_Provisioning)
|
|||
|
- [Building MITER ID](https://iiw.idcommons.net/Building_MITER_ID)
|
|||
|
- [OAuth 2.0 and SASL](https://iiw.idcommons.net/OAuth_2.0_and_SASL)
|
|||
|
#### Session 2
|
|||
|
- [Info Grid Graphic Database](https://iiw.idcommons.net/Info_Grid_Graphic_Database)
|
|||
|
- [Legal Issues Underpinning of UMA](https://iiw.idcommons.net/Legal_Issues_Underpinning_of_UMA) ("UMA and the law")
|
|||
|
- [Contacts in the Browser](https://iiw.idcommons.net/Contacts_in_the_Browser)
|
|||
|
- [Migrating from HTTP to HTTPS OpenID](https://iiw.idcommons.net/Migrating_from_HTTP_to_HTTPS_OpenID)
|
|||
|
- [Identity Business Models](https://iiw.idcommons.net/Identity_Business_Models)
|
|||
|
- [Patents, People Development Pools](https://iiw.idcommons.net/Patents,_People_Development_Pools)
|
|||
|
- [Enterprise Signing in OAuth](https://iiw.idcommons.net/Enterprise_Signing_in_OAuth)
|
|||
|
#### Session 3
|
|||
|
- [Simple Reputation Feed](https://iiw.idcommons.net/Simple_Reputation_Feed)
|
|||
|
- [Lawyers and Accountants](https://iiw.idcommons.net/Lawyers_and_Accountants)
|
|||
|
- [The Right Question](https://iiw.idcommons.net/The_Right_Question) Making Privacy Policies User-Centric vs. Data Centric
|
|||
|
- [OIX](https://iiw.idcommons.net/OIX)
|
|||
|
- [UX w/no logout...single sign out](https://iiw.idcommons.net/UX_w/no_logout...single_sign_out)
|
|||
|
- [URL-Sharing Using the OExchange Protocol Stack](https://iiw.idcommons.net/URL-Sharing_Using_the_OExchange_Protocol_Stack)
|
|||
|
- [Secure Web Auth](https://iiw.idcommons.net/Secure_Web_Auth)
|
|||
|
- [The Case for and Design of KRL](https://iiw.idcommons.net/index.php?title=The_Case_for_and_Design_of_KRL&action=edit&redlink=1)
|
|||
|
#### Session 4
|
|||
|
- [Research Report on Info Sharing](https://iiw.idcommons.net/Research_Report_on_Info_Sharing)
|
|||
|
- [OAuth 2 for Native Apps](https://iiw.idcommons.net/OAuth_2_for_Native_Apps)
|
|||
|
- [User Managed Access](https://iiw.idcommons.net/User_Managed_Access) (Claims 2.0)
|
|||
|
- [Client Side OptIN Cross Site Data Sharing](https://iiw.idcommons.net/Client_Side_OptIN_Cross_Site_Data_Sharing)
|
|||
|
- [Telco vs. The NET](https://iiw.idcommons.net/Telco_vs._The_NET)
|
|||
|
- [Web Biz Card](https://iiw.idcommons.net/index.php?title=Web_Biz_Card&action=edit&redlink=1)
|
|||
|
- [SAML Profiles for OAuth](https://iiw.idcommons.net/SAML_Profiles_for_OAuth)
|
|||
|
- [Separating: ID, Credential, and Attribute Management](https://iiw.idcommons.net/Separating:_ID,_Credential,_and_Attribute_Management)
|
|||
|
- [Story Cubing and Synergies](https://iiw.idcommons.net/Story_Cubing_and_Synergies)
|
|||
|
- [OpenID-Artifact Binding](https://iiw.idcommons.net/OpenID-Artifact_Binding)
|
|||
|
#### Session 5
|
|||
|
- [Biz Model on Distributed Social Web](https://iiw.idcommons.net/Biz_Model_on_Distributed_Social_Web)
|
|||
|
- [Directory Federation](https://iiw.idcommons.net/Directory_Federation)
|
|||
|
- [Honey Roasted Death Camp Salad](https://iiw.idcommons.net/Honey_Roasted_Death_Camp_Salad)
|
|||
|
- [OpenIDvNext Discovery](https://iiw.idcommons.net/OpenIDvNext_Discovery)
|
|||
|
- [Implications of User Owned Controlled Data as Official Government Policy](https://iiw.idcommons.net/Implications_of_User_Owned_Controlled_Data_as_Official_Government_Policy)
|
|||
|
- [Google as an OpenID RP](https://iiw.idcommons.net/Google_as_an_OpenID_RP)
|
|||
|
### WEDNESDAY
|
|||
|
#### Session 1
|
|||
|
- [Personal Data Store Ecosystem Design](https://iiw.idcommons.net/Personal_Data_Store_Ecosystem_Design)
|
|||
|
- [(In)Coherent Web (in)security Policy Framework](https://iiw.idcommons.net/(In)Coherent_Web_(in)security_Policy_Framework)
|
|||
|
- [Bootstrapping OAuth 2.0 Ecosystems](https://iiw.idcommons.net/Bootstrapping_OAuth_2.0_Ecosystems)
|
|||
|
#### Session 2
|
|||
|
- [OAuth Provisioning](https://iiw.idcommons.net/OAuth_Provisioning) continued
|
|||
|
- [Stateless Distributed Membership an Inquiry](https://iiw.idcommons.net/Stateless_Distributed_Membership_an_Inquiry)
|
|||
|
- [Emancipay VRM and CRM](https://iiw.idcommons.net/Emancipay_VRM_and_CRM)
|
|||
|
- [Breaking up with Atom Activity Streams](https://iiw.idcommons.net/Breaking_up_with_Atom_Activity_Streams)
|
|||
|
#### Session 3
|
|||
|
- [DNSSEC](https://iiw.idcommons.net/DNSSEC)
|
|||
|
- [Certifying Open ID, IdPs, RP](https://iiw.idcommons.net/Certifying_Open_ID,_IdPs,_RP)
|
|||
|
- [SMART UMA](https://iiw.idcommons.net/SMART_UMA)
|
|||
|
- [Catalyst Interop Planning](https://iiw.idcommons.net/Catalyst_Interop_Planning)
|
|||
|
- [PCITF: Payment Card Industry Trust Framework](https://iiw.idcommons.net/PCITF:_Payment_Card_Industry_Trust_Framework)
|
|||
|
#### Session 4
|
|||
|
- [7 Deadly Sins of Distributed Authentication](https://iiw.idcommons.net/7_Deadly_Sins_of_Distributed_Authentication)
|
|||
|
- [Afgan Anarchy](https://iiw.idcommons.net/Afgan_Anarchy)
|
|||
|
- [Telco/Web/Data Meta Story](https://iiw.idcommons.net/Telco/Web/Data_Meta_Story)
|
|||
|
#### Session 5
|
|||
|
- [XDI and RDF Graph Model](https://iiw.idcommons.net/XDI_and_RDF_Graph_Model)
|
|||
|
- [Telco-Web-Data User Model Scenarios](https://iiw.idcommons.net/Telco-Web-Data_User_Model_Scenarios)
|
|||
|
- [IIW What's Next?](https://iiw.idcommons.net/IIW_What%27s_Next%3F)
|
|||
|
|
|||
|
## [IIW 6 - 2008a](https://iiw.idcommons.net/Notes_2008a)
|
|||
|
- [Creating an InfoCard IdP in 30min](https://iiw.idcommons.net/Creating_an_InfoCard_IdP_in_30min) Daniel Sanders
|
|||
|
- [Tracking stuff I've Done](https://iiw.idcommons.net/Tracking_stuff_I%27ve_Done) Killer OpenID app?, Dick
|
|||
|
- [Open Social](https://iiw.idcommons.net/Open_Social) Making the Web More Socail, Kevin Marks
|
|||
|
- [Verified Claims](https://iiw.idcommons.net/Verified_Claims) From Here to Reality - Bob Morgan, UW
|
|||
|
- [User-Driven Search](https://iiw.idcommons.net/User-Driven_Search) Joe A.
|
|||
|
- [Large OPs and RPs](https://iiw.idcommons.net/Large_OPs_and_RPs) Shreyas, Y!
|
|||
|
- [Relationships](https://iiw.idcommons.net/Relationships) Bob Blakley
|
|||
|
- [InfoCard Capabilities](https://iiw.idcommons.net/InfoCard_Capabilities) Pam Dingle
|
|||
|
- [Why OpenID matters to the Enterprise](https://iiw.idcommons.net/Why_OpenID_matters_to_the_Enterprise) Pete Metralus and Ed Amemiya
|
|||
|
- [Higgins R-Cards](https://iiw.idcommons.net/Higgins_R-Cards) Markus S.
|
|||
|
- [Digital Deal](https://iiw.idcommons.net/Digital_Deal) Johannes
|
|||
|
- [Project Concordia](https://iiw.idcommons.net/Project_Concordia) Eve Maler
|
|||
|
- [Venn Sweetspot](https://iiw.idcommons.net/Venn_Sweetspot) Alexis Bor
|
|||
|
- [Role of Data Silos](https://iiw.idcommons.net/Role_of_Data_Silos) Mike Carc
|
|||
|
- [Identity Beyond the Web](https://iiw.idcommons.net/Identity_Beyond_the_Web) Harlan Iverson
|
|||
|
- [Partitioning the Space](https://iiw.idcommons.net/Partitioning_the_Space) Johannes Ernst
|
|||
|
- [Enterprise Identity RoadMap](https://iiw.idcommons.net/Enterprise_Identity_RoadMap) Marty Schleiff
|
|||
|
- [CardSpace and Fedlets and SAML](https://iiw.idcommons.net/CardSpace_and_Fedlets_and_SAML) Pat Pattersion
|
|||
|
- [ID Futures](https://iiw.idcommons.net/ID_Futures) Kaliya
|
|||
|
- [Friend Connect](https://iiw.idcommons.net/Friend_Connect) Kevin Marks
|
|||
|
- [Paradoxes of Identity Management](https://iiw.idcommons.net/Paradoxes_of_Identity_Management) Everything you know is wrong, Brad Templeton
|
|||
|
- [XRDS - Simple + OAuth Discovery](https://iiw.idcommons.net/XRDS_-_Simple_%2B_OAuth_Discovery) Eran
|
|||
|
- [You can get a degree for this?](https://iiw.idcommons.net/index.php?title=You_can_get_a_degree_for_this%3F&action=edit&redlink=1) Bryant Cutler and Devlin Daley present their research
|
|||
|
- [Legal IIW](https://iiw.idcommons.net/Legal_IIW) Kaliya and Bob Blakley
|
|||
|
- [ID Commons Infrastructure](https://iiw.idcommons.net/ID_Commons_Infrastructure) Kaliya and Mary Rudy
|
|||
|
- [FOAF SSL](https://iiw.idcommons.net/index.php?title=FOAF_SSL&action=edit&redlink=1) Proposal for Simple distributed single sign on protocol in a web of trust - semantic web, linked data. Henry Story.
|
|||
|
- [CallVeifID](https://iiw.idcommons.net/index.php?title=CallVeifID&action=edit&redlink=1) 2nd Facto rfor My OpenID Technology and Design Decision
|
|||
|
- [What to do on an OAuth Permission page](https://iiw.idcommons.net/What_to_do_on_an_OAuth_Permission_page) Shreyas, Y!
|
|||
|
|
|||
|
## [IIW 5 - December 2007](https://iiw.idcommons.net/index.php/Iiw2007b)
|
|||
|
* Concordia
|
|||
|
* XRDSP (XRDS Provisioning protocol) (10-15)
|
|||
|
* OAuth (5)
|
|||
|
* HBX (Higgins Browser Extension) Provisioning and Authentication Working Session. (12)
|
|||
|
- [OSIS Tutorial](http://iiw.idcommons.net/OSIS_Tutorial)
|
|||
|
- [VRM 101](http://iiw.idcommons.net/index.php?title=VRM_101&action=edit)
|
|||
|
- [OpenLife Bits](http://iiw.idcommons.net/OpenLife_Bits)
|
|||
|
- [Dynamic Federation](http://iiw.idcommons.net/Dynamic_Federation)
|
|||
|
- [Implementing OpenID and OAuth](http://iiw.idcommons.net/Implementing_OpenID_and_OAuth)
|
|||
|
- [Ubiquitous Computing](http://iiw.idcommons.net/index.php?title=Ubiquitous_Computing&action=edit)
|
|||
|
- [UI Best Practices for OpenID RPs](http://iiw.idcommons.net/index.php?title=UI_Best_Practices_for_OpenID_RPs&action=edit)
|
|||
|
- [VRM Standards Gap](http://iiw.idcommons.net/index.php?title=VRM_Standards_Gap&action=edit)
|
|||
|
- [Landscape 2008](http://iiw.idcommons.net/index.php?title=Landscape_2008&action=edit)
|
|||
|
- [OpenID Security & Privacy](http://iiw.idcommons.net/OpenID_Security_%26_Privacy)
|
|||
|
- [Who Wants To Be A Billionare](http://iiw.idcommons.net/index.php?title=Who_Wants_To_Be_A_Billionare&action=edit)
|
|||
|
- [Information Cards Intro](http://iiw.idcommons.net/index.php?title=Information_Cards_Intro&action=edit)
|
|||
|
- [Intro to OAuth](http://iiw.idcommons.net/index.php?title=Intro_to_OAuth&action=edit)
|
|||
|
- [Trusted Data Exchange & RP Reputation (=nat)](http://iiw.idcommons.net/Trusted_Data_Exchange)
|
|||
|
- [Real Identity](http://iiw.idcommons.net/index.php?title=Real_Identity&action=edit)
|
|||
|
- [Identity Architecture, RM-ODP](http://iiw.idcommons.net/index.php?title=Identity_Architecture%2C_RM-ODP&action=edit)
|
|||
|
- [OpenID Tutorial](http://iiw.idcommons.net/index.php?title=OpenID_Tutorial&action=edit)
|
|||
|
- [OSIS Interop](http://iiw.idcommons.net/index.php?title=OSIS_Interop&action=edit)
|
|||
|
- [IdP Trust and Reputation](http://iiw.idcommons.net/index.php?title=IdP_Trust_and_Reputation&action=edit)
|
|||
|
- [Connectivity from the Edge](http://iiw.idcommons.net/index.php?title=Connectivity_from_the_Edge&action=edit)
|
|||
|
- [Higgins Tutorial](http://iiw.idcommons.net/index.php?title=Higgins_Tutorial&action=edit)
|
|||
|
- [OAuth Extensions](http://iiw.idcommons.net/OAuth_Extensions)
|
|||
|
- [Reliable Identities for Relying Parties](http://iiw.idcommons.net/Reliable_Identities_for_Relying_Parties)
|
|||
|
- [Who's Who](http://iiw.idcommons.net/index.php?title=Who%27s_Who&action=edit)
|
|||
|
- [OpenID Foundation](http://iiw.idcommons.net/index.php?title=OpenID_Foundation&action=edit)
|
|||
|
- [OSIS Interop](http://iiw.idcommons.net/index.php?title=OSIS_Interop&action=edit)
|
|||
|
- [Identity Commons 101](http://iiw.idcommons.net/index.php?title=Identity_Commons_101&action=edit)
|
|||
|
- [Open Reputation Management Systems](http://iiw.idcommons.net/index.php?title=Open_Reputation_Management_Systems&action=edit)
|
|||
|
- [OAuth and OpenID](http://iiw.idcommons.net/OAuth_and_OpenID)
|
|||
|
- [Deployment Challenges](http://iiw.idcommons.net/index.php?title=Deployment_Challenges&action=edit)
|
|||
|
- [Limited Liability Personas](http://iiw.idcommons.net/Limited_Liability_Personas)
|
|||
|
- [OSIS Interop](http://iiw.idcommons.net/index.php?title=OSIS_Interop&action=edit)
|
|||
|
- [Understandable Usability](http://iiw.idcommons.net/index.php?title=Understandable_Usability&action=edit)
|
|||
|
- [Identity Commons Resources](http://iiw.idcommons.net/index.php?title=Identity_Commons_Resources&action=edit)
|
|||
|
- [Non-browser OpenID and OAuth](http://iiw.idcommons.net/Non-browser_OpenID_and_OAuth)
|
|||
|
- [What IIW Means to Enterprise](http://iiw.idcommons.net/What_IIW_Means_to_Enterprise)
|
|||
|
- [Second Life Residents Supporting OpenID](http://iiw.idcommons.net/index.php?title=Second_Life_Residents_Supporting_OpenID&action=edit)
|
|||
|
- [Open Reputation Management System (ORMS)](http://iiw.idcommons.net/index.php?title=Open_Reputation_Management_System_%28ORMS%29&action=edit)
|
|||
|
- [VRM Projects](http://iiw.idcommons.net/index.php?title=VRM_Projects&action=edit)
|
|||
|
- [What's Next for OpenID (3.0)](http://iiw.idcommons.net/NextForOpenID)
|
|||
|
- [Bandit Project](http://iiw.idcommons.net/index.php?title=Bandit_Project&action=edit)
|
|||
|
- [Sxipper Demo](http://iiw.idcommons.net/index.php?title=Sxipper_Demo&action=edit)
|
|||
|
- [VRM Use Cases](http://iiw.idcommons.net/index.php?title=VRM_Use_Cases&action=edit)
|
|||
|
- [Identity Assurance Framework](http://iiw.idcommons.net/index.php?title=Identity_Assurance_Framework&action=edit)
|
|||
|
- [Understanding Usability](http://iiw.idcommons.net/UsabilityNoRocketSci)
|
|||
|
- [La Leche League ID Implementation](http://iiw.idcommons.net/index.php?title=La_Leche_League_ID_Implementation&action=edit)
|
|||
|
- [OSIS Steering Comittee](http://iiw.idcommons.net/index.php?title=OSIS_Steering_Comittee&action=edit)
|
|||
|
- [The ITU World E-Trust Initiative](http://iiw.idcommons.net/The_ITU_World_E-Trust_Initiative)
|
|||
|
- [Considerations and Best Practice for Large OpenID Providers](http://iiw.idcommons.net/OpenIDForLargeProviders)
|
|||
|
- [Intro to Concordia](http://iiw.idcommons.net/index.php?title=Intro_to_Concordia&action=edit)
|
|||
|
- [IIW What's Next Part 2](http://iiw.idcommons.net/index.php?title=IIW_What%27s_Next_Part_2&action=edit)
|
|||
|
- [Python Future Implementation of OAuth](http://iiw.idcommons.net/index.php?title=Python_Future_Implementation_of_OAuth&action=edit)
|
|||
|
- [Concordia Use Case](http://iiw.idcommons.net/index.php?title=Concordia_Use_Case&action=edit)
|
|||
|
- [Friends List Portability](http://iiw.idcommons.net/FriendsListPortability)
|
|||
|
- [Newbies4Newbies](http://iiw.idcommons.net/Newbies4Newbies)
|
|||
|
- [XDI-RDF 123](http://iiw.idcommons.net/XDI-RDF_123)
|
|||
|
|
|||
|
<iframe src="//www.slideshare.net/slideshow/embed_code/key/fuos9leJ9MUU8A" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen> </iframe> <div style="margin-bottom:5px"> <strong> <a href="//www.slideshare.net/Kaliya/identity-commons-iiw2007b" title="Identity Commons IIW2007B" target="_blank">Identity Commons IIW2007B</a> </strong> from <strong><a href="https://www.slideshare.net/Kaliya" target="_blank">Kaliya "Identity Woman" Young</a></strong> </div>
|
|||
|
|
|||
|
## [IIW 4 - May 2007](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki/Workshop_2007)
|
|||
|
|
|||
|
- [What's Ahead for OpenID](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki?title=Next6MonthsForOpenID&action=edit)
|
|||
|
- [SimplePermissions: Delegation via OpenID](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki/SimplePermissions)
|
|||
|
- [Identity in ad-hoc, standalone and disconnected networks](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki/Identity_in_ad-hoc%2C_standalone_and_disconnected_networks)
|
|||
|
- [User-Centric Delegation](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki?title=User-Centric_Delegation&action=edit)
|
|||
|
- [Identity Management Legal and Regulatory](http://web.archive.org/web/20090210172350/http://myspace.verizon.net/amrutkowski/developments-IdM_overview.ppt) (Tony Rutkowski, VeriSign)
|
|||
|
- [Vertical Integration of IDS from devics to users to access networks to core networks to services and content](http://web.archive.org/web/20090210172350/http://iiw.windley.com/images/5/56/ICASOANGN.pdf) Rakesh Radhakrishnan, Sun]
|
|||
|
- [Concordia multi-protocol use case session](http://web.archive.org/web/20090210172350/http://www.projectconcordia.org/index.php/Main_Page#Meeting_notes)
|
|||
|
- [Sxipper demo](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki/SxipperDemo)
|
|||
|
- [IdM Beyond Application Layer](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki?title=IdmBeyond&action=edit)
|
|||
|
- [Managing schema in the identity metasystem](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki/Managing_schema_in_the_identity_metasystem)
|
|||
|
- [VRM](http://web.archive.org/web/20090210172350/http://iiw.windley.com/wiki/VRM)
|
|||
|
- [Higgins in seven minutes (PPT file)](http://web.archive.org/web/20090210172350/http://www.eclipse.org/higgins/documents/2007.5.16-IIW-Higgins-in-seven-minutes.ppt), =paul.trevithick presented this at the beginning of a session
|
|||
|
- [IDTrust Overview iiw 051607-v1.pdf OASIS IDTrust Overview](http://web.archive.org/web/20090210172350/http://idmfg.com/may-2007/in/OASIS), [OASIS IDTrust Member Sector](http://web.archive.org/web/20090210172350/http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=idtrust-ms), [Abbie Barbir](http://web.archive.org/web/20090210172350/http://www.oasis-open.org/who/tab.php#barbir),[Nortel](http://web.archive.org/web/20090210172350/http://www.nortel.com/)
|
|||
|
|
|||
|
## [IIW 3 - December 2006](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/Workshop2006b)
|
|||
|
|
|||
|
- Welcome: Kaliya Hamlin and Phil Windley
|
|||
|
- Landscape Map: Kaliya Hamlin and Mike Ozburn
|
|||
|
- The Identity Gang Lexicon and Laws of Identity: Dick Hardt
|
|||
|
- OSIS - Open Source Identity System: [Johannes Ernst](http://web.archive.org/web/20070126064639/http://netmesh.info/jernst) ([slides](http://web.archive.org/web/20070126064639/http://netmesh.org/slides/) from the presentation)
|
|||
|
- CardSpace/iCards: Kim Cameron or someone else from Microsoft
|
|||
|
- Higgins: Paul Trevithick, Mary Ruddy
|
|||
|
- SAML/federation/Liberty Alliance: Eve Maler (presentation in [PDF](http://web.archive.org/web/20070126064639/http://www.xmlgrrl.com/publications/SAML-Liberty-IIWb-Dec2006.pdf))
|
|||
|
- URL Based Identity (OpenID which includes, LID, Yadis, I-names/XRI, Sxip): David Recordon, Scott Kveton
|
|||
|
- [Identity Commons](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/Identity_Commons): [Eugene Eric Kim](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki?title=Eugene_Eric_Kim&action=edit)
|
|||
|
- [OSIS](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/OSIS)
|
|||
|
- [FinancialID](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/FinancialID)
|
|||
|
- [Who are the You I care about](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/Who_are_the_You_I_care_about)
|
|||
|
- [Deployment Interoperability (User centrism and Federation)](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki?title=Deployment_Interoperability_%28User_centrism_and_Federation%29&action=edit) - Lena Kannappan
|
|||
|
- [OpenID Libraries and Implementation](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/OpenID_Libraries_and_Implementation)
|
|||
|
- [Pat Patterson's YADIS/XRI/SAML Demo](http://web.archive.org/web/20070126064639/http://blogs.sun.com/superpat/entry/yadis%2Fxri_identifier_resolution_with_saml)
|
|||
|
- [SAML LSSO Profile and SimpleSign Binding](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/SAML_LSSO_Profile_and_SimpleSign_Binding)
|
|||
|
- [IdP Tools - Mixing & Matching - What's Available?, What's Coming?](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/IdP_Tools_-_Mixing_%26_Matching_-_What%27s_Available%3F%2C_What%27s_Coming%3F)
|
|||
|
- [Beyond Passwords](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/Beyond_Passwords)
|
|||
|
- [OpenID and SAML Convergence Touchpoints](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/OpenID_and_SAML_Convergence_Touchpoints)
|
|||
|
- [LegalFramework](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/LegalFramework) Who owns identity? - Mark Lizar & Louis Monvoisin
|
|||
|
- [Creative Uses for I-names](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/Creative_Uses_for_I-names)
|
|||
|
- [(Room B)](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/%28Room_B%29) (need title)
|
|||
|
- [IdP Interoperability](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/IdP_Interoperability)
|
|||
|
- [OpenID in Politics](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/OpenID_in_Politics)
|
|||
|
- [Identity and Reputation](http://web.archive.org/web/20070126064639/http://iiw.windley.com/wiki/Identity_and_Reputation)
|
|||
|
|
|||
|
## [IIW 1 - 2005](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?internet_identity_workshop_2005)
|
|||
|
|
|||
|
- Identity in the Marketplace: The Rise of the Fully Empowered Customer - Doc Searls
|
|||
|
- [Use Cases for the Social Web](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?use_cases_for_the_social_web) - Mary Ruddy, SocialPhysics
|
|||
|
- [Microsoft's Vision for an Identity Metasystem](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?microsoft_s_vision_for_an_identity_metasystem) - Mike Jones, Microsoft
|
|||
|
- [Liberty Alliance Overview](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?liberty_alliance_overview) - Brett McDowell, Liberty Alliance
|
|||
|
- [XRI Metaidentifiers](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?xri_metaidentifiers) - Drummond Reed
|
|||
|
- [Identity 2.0 Design Guidelines and the Evolution of the SXIP Protocol](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?identity_2_0_design_guidelines_and_the_evolution_of_the_sxip_protocol) - Dick Hardt, SXIP
|
|||
|
- [Decentralized, REST-ful Digital Identity with LID](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?decentralized_rest_ful_digital_identity) - Johannes Ernst, NetMesh
|
|||
|
- [OpenID](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?openid) - Brad Fitzpatrick, LiveJournal
|
|||
|
- SocialPhysics And [The Higgins Trust Framework](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?the_higgins_trust_framework) - Paul Trevithick, SocialPhysics
|
|||
|
- [Identity Commons](http://web.archive.org/web/20070809183242/http://www.socialtext.net/iiw2005/index.cgi?identity_commons) - Owen Davis & Joel Getzendanner -
|
|||
|
- [Kaliya Hamlin](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?kaliya_hamlin) Civil Society Meta-Network building and new business models that arise from this.
|
|||
|
- Rob Marano and Simon Ben-Avi [Architecture and Process of Federated Digital Authentication and Authorization](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?architecture_and_process_of_federated_digital_authentication_and_authorization)
|
|||
|
- Nick Ragouzis [Bandwagon Economics, the Necessary Ingredient for Success on the Identity Internet](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?bandwagon_economics_the_necessary_ingredient_for_success_on_the_identity_internet)
|
|||
|
- Craig Calle [Roadmap and Challenges to Open Standards in Networking Applications](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?roadmap_and_challenges_to_open_standards_in_networking_applications)
|
|||
|
- Christopher Allen [Four Kinds of Privacy or Progressive Trust or ...](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?four_kinds_of_privacy_or_progressive_trust_or)
|
|||
|
- Adrian Blakey [Xanthus, an Open Source Implementation of LID](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?xanthus_an_open_source_implementation_of_lid)
|
|||
|
- ... no, not that Xanthus (the [NeXTSTEP hypermedia system](http://web.archive.org/web/20070502201748/http://bulletin.sigchi.org/archive/1997.1/backlund.html)from Sweden ...)
|
|||
|
- [Allan Schiffman](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?allan_schiffman): You’re Nobody Till Somebody Rejects You: Requirements for Internet-scale Identity.
|
|||
|
- [Brett McDowell](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?brett_mcdowell) The Consensus Whiteboard Project as discussed on the mailing list.
|
|||
|
- [Victor Grey](http://web.archive.org/web/20070502201748/http://livingdirectory.net/profile/139) Expanding on Brett McDowell's idea, a proposal to create an IETF-like
|
|||
|
organization to seek consensus and open voluntary standards for
|
|||
|
distributed authentication and user-owned data. The proposal can be read on the [ic_dev wiki](http://web.archive.org/web/20070502201748/http://ibroker.idcommons.net/moin.cgi/AuthenticationAndDataSharingVoluntaryStandardsProject)
|
|||
|
- [Eric Hayes](http://web.archive.org/web/20070502201748/http://ehayes.typepad.com/) Controlled Identity (bits to a lot of your identity information), Privacy, and [Attention Data](http://web.archive.org/web/20070502201748/http://developers.technorati.com/wiki/AttentionXMLBrainstorming) as a single topic.
|
|||
|
- YADIS [http://www.yadis.org](http://web.archive.org/web/20070502201748/http://www.yadis.org/) proposal by [Johannes Ernst](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?Johannes%20Ernst), [David Recordon](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?David%20Recordon), and [Brad Fitzpatrick](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?Brad%20Fitzpatrick)
|
|||
|
- [Owen Davis](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?Owen%20Davis) - Help create the Identity Commons: what is the call to action?
|
|||
|
- [Mary Hodder](http://web.archive.org/web/20070502201748/http://www.socialtext.net/iiw2005/index.cgi?mary_hodder)
|