mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-13 01:24:20 -05:00
111 KiB
111 KiB
title | description | excerpt | categories | permalink | last_modified_at | |
---|---|---|---|---|---|---|
IIW Session Topics | Session topics from the Internet Identity Workshop over the past 15 years | If you want to stay current in digital identity, keeping an eye on the session topics of the bi-anual internet identity workshop is a good place to start. |
|
workshops/iiw/ | 2020-11-03 |
IIW 15
Tuesday
Session 1
- Identity Clearing House – Loosely Coupled open standards based architecture for Identiy in the extendedenterprise
- A2P3
- Rhetoric – How do we talk plain language about Identity and Personal Data?
- Privacy by Design – New Oasis Tech comm.. for Sotware Engineers
- Focus on Consumer – Turning fear into excitement, delight about Personal Data
Session 2
- Respect Network Founding Partners
- IDESG – Mgt Council CAll
- VRM Challenge: Let’s Fix Subscription Bin from Customer Side
- IDP - Initiated Layin and Deep Linking for Open ID Connect
- Mobile Specific Open ID Connect use Cases
- Anonymous – political, institutional, cultural and memitc organization without identity
Session 3
- Connect Me and miiCard “Trusted Reputations”
- Account Chooser Launching – Taking the AC Show on the road this autumn – help write the show
- Account Chooser Launching – Taking the AC Show on the road this autumn – help write the show
- Authentication on Mobile Devices – Crypto and
- Collaboration, Forking, and organic proliferation in the age of the personal cloud
- Customer Commons plus VRM Brainstorm
- Death To NSTIC -2- Long Live NSTIC
- Use Cases for Personal Clouds, Community Clouds, Family Clouds
- Reputation Consulting .05 cents
Session 4
- OAuth Security (Beyond Bearer Tokens)
- NSTIC Pilot Overview – Attribute Exchange Network (AXN) / Demo
- Unleashing the Multimind – What’s next – or could be – in our most personal daily experience and utilization of all this stuff
- Building the Identity Ecosystem Framework
- Kynetx – Personal Cloud Prototype
- Consuming OpenID Connect 101
Session 5
- OX Open Source – OpenID Connect and UMA / Demo
- Personal Analytics and Insight for Consumers – using Personal Data to Enlighten the Individual
- How will Identity plus VRM Change Real Estate and Mortgage Banking
- Secure Identity Without Username or Password
- Location = Control Control = Ownership – How addressing establishes ownership and what to do about it
- XDI Personal Cloud Desktop
Wednesday
Session 1
- Sales Force Identity – The Facebook for Business (Part 2)
- OpenID Connect Session – Management and Login
- External Browser and Mobile Apps
- Identity and API Economy plus Privacy by Design
- The New Privacy
- Manufacturing, Registration Cards and Digital Birth Certificates
Session 2
- Sales Force Identity – The Facebook for Business (Part 2)
- Hybrid Mobile/Nets App Auth With Oauth2 Trickery
- Liberating Personae from Identity
- OAOTH 2.0 RS – AS Token Query Flows
- Customer Commons - The Magic Wand Project
- Consumers and Public Records
- Personal Data Startups Connect and Catalyze – next steps and PDEC StartUp Map (stages, models, patterns)
Session 3
- Education Customers and Companies
- Google Identity Toolkey – What other problems should we research?
- Mobile SSO Password Proliferation…. Any solutions??
- SCIM
- The act1v8 Project (VRM and Trust for Charity and Community Services
- DATA COOPS and BIZ Models
- Customer 2 Business – Will Federation Really work?
- Social Intentions – Private App on Facebook to express your true intentions
- Personal Cloud Prototype (Reprise)
- Opportunities for Developers around Personal Cloud Cloudstore
Session 4
- Trusted Identities “You are who you say you are”
- OIX (Axw6) Attribute Exchange Trust Framework – Progress Report
- Attribute Exchange Technical Overview
- Health Record Banks – Personal Cloud for Health
- Investors Corner / Where Investors and Entrepreneurs Come Together
- MAKE HISTORY – Be the 1st to get a User-centric Next-gen Secure Private Identity
- Security and Permission in Personal Cloud Connections
- SCIM – As An ATTRUBUTE Provider?
- World Economic Forum: Update on ‘Rethinking Personal Data’
- Freedom Box Workshop
Session 5
- OpenID Graph 1.0
- OIDF Workgroup – Account Chooser
- Beyond Prophylaxis – Next Steps post ad and tracking blocking W5F: KRL – XDI Integration
- correct house battery staple: Strong Passwords…. Passphrases.. are they still relevant/necessary?
- Personal Data and Gamification---Consumer use case Brainstorming focus on *Fun *Beneficial *Opt-In
- OATH 2 Dynamic Client Registration
Thursday
Session 1
- Mapping the Identity Ecosystem Framework ‘A Whiter Shade of Gray” – (Input for NSTIC Plenary Next Week)
- [OAuth2 Chaining and Re-Delegation
- [Personal.Com Blog Post
- [11 Models of “Trust”
- Education and beyond… How to mamage new Privacy Risks on Rapid Moving trends
Session 2
- [IDESG Mapping Prep… Source Documents and SEEDS for Mapps (NSTIC)
- Wallets - Ours OR Google, Apple, ? (VRM)
- [A Trust Framework for Open ID Connect AND beyond…. (with Unicorns)
- [What is ‘Real Name” ?
- [High Level Programming
- Webfinger
Session 3
- [OIDF Board Meeting
- [UE for ID/PDE or UX plud Tech for IDENTITY across Devices ‘1 Enterprise Experience from Browsers to Washing Machines?
- Account Recovery: How can we do better? Without back doors?
- Ultimate Realization of User Managed Contract / Terms and Policies Proffered by individuals
- FED. SOC. WEB SUM.
Session 4
- [OAuth RoadMap (new specs, more interop, additional use cases)
- [OIDF MTG #2
- [Interesting Challenges of Bi-Directional Federated and Delegations
- Freedom Box Workshop
- [Open Source Personal Clouds / What, Why, How
Session 5
- [Intent Casting Prototype
- ‘Group Therapy’ Being a Pioneer and Communicating You Vision to Stakeholders
- REDDIT are there lessons for the Identity Community in recent events?
IIW 14 Notes - IIW
https://iiw.idcommons.net/IIW_14_Notes
Tuesday
Session 1
- Film (T1A)
- OAuth Overview for Beginners (T1C)
- Personal (Mozilla) Browser ID (protocol) (T1D)
- NSTIC Update, Pilots, Government Recommendations (T1E)
- VRM Intro (Vendor Relation Management) Developments (T1F)
- New to IIW / Identity etc… overview from Kaliya Q and A (T1G)
- Identity Management for the Internet Advertising Ecosystem (T1I)
Session 2
- OIX Attribute Exchange Working Group (AXWG) Progress Update (T2A)
- OpenID Connect – The Intro (T2B)
- Find Out And Control You Digital Footprint (T2D)
- XDI: what the hell is it? What is it good for? how does it fit with openID connect? Why isn’t it dead yet? (T2E)
- DATA ----- the gap ------ Getting it (AHA!) (T2G)
- Building a 4th Party VRM Start-Up (T2H)
- OAuth and SASL / Open Issues “to http or not http….” (T2K)
Session 3
- Account Chooser.com / OIDF Working Group update, next steps, your ideas (T3A)
- Demo with Freedom Box (you can participate!) (T3C)
- OAuth Security (T3D)
- How to Educate Consumers on privacy/identity/security issues? (T3E)
- VRM 2012 Outreach Planning / What vendors will go first? (T3F)
- Standard Information Sharing /Label (T3G)
- Health Care Regs: What Are They REALLY? (T3H)
- Federated Authorization / XACML, OAUTH, TVE…. (T3I)
- NSTIC’s Identity Ecosystem / Privacy Coord. Standing Committee (T3J)
- What is a Personal Cloud? (T3K)
Session 4
- Attribute Provider Network Demo via Open ID/OAuth (T4A)
- Mobile Identity and Dual – (multi) Persona (T4C)
- A Deterministic Model for Trust Framework Interoperability (T4D)
- OAuth/SMAL/OpenID for non-web applications – SMTP/IMAP/SSM (T4E)
- VRM Language (lockers vs smelly socks) Lexicon = what do we call the WHO and WHAT we work on? (T4F)
- What Happens When my Federated Identity Fails? (T4G)
- Zero – Trust Identity (T4H)
- Open ID Connect + Metadata ???? (T4I)
- How Can My Company Afford VRM? (T4J)
Session 5
- Writing Apps that are Easier to Defend than Attack (T5A)
- Resource Server to Authorization Server Commuications JACML? (T5C)
- Biometrics into the NET with Smartphones (T5D)
- Personal Data Ecosystem Consortium (PDEC) (T5G)
- Government of British Columbia Digital ID + Authentication (T5H)
- Novel uses for Context and what is it anyway (T5I)
- Sovereign ID vs Admin ID (T5J)
- User – Managed Access F.A.Q: How UMA Enables – Selective Sharing (T5K)
Wednesday
Session 1
- VRM + CRM(need help) Event – Sept 2012 Santa Clara (W1B)
- NSTIC Steering Group by-laws (W1D)
- Account Linking Service (W1F)
- Rethinking Patents in an Open Web World – reverse the burden of discovery? (W1G)
- Enterprise OAuth Infrastructure (W1H)
Session 2
- Personal Data Rights Language / Self Asserted Terms – Policies – Preferences (W2A)
- Backplane 2.0 Widget Collaboration Protocol (W2B)
- SCIM 101 (W2C)
- API’s (W2D)
- NSTIC How do we bring relying parties to the table? (W2F)
- Personal Data Tagging a Utopia? (W2G)
- Survey of UDID Replacements for Mobile Identity (W2H)
- New Gov Open Data to Corral Politicians (W2I)
Session 3
- Data Wallet (W3A)
- VRM Personas & Faceted Identity (W3B)
- SCIM 201 (W2C)
- ID Federation Trust Framework Use Cases and Mock Trials (W3D)
- Dynamic, Multi-Attribute Authentication – OASIS Trust Elevation TC /Open Meeting (W3F)
- Practices, Policies and Procedures around Identity Validation (W3G)
- CIPHER – whiteboarding on open-source language for consistent cross-platform CRYPTO (W3H)
- New Gov Foundation / Open Board Meeting (W3I)
- Personal Cloud work (W3J)
Session 4
- NSTIC and Governance (W4A)
- How can my company afford VRM? VRM Co-opetition, Developing Creative Relationships (W4B)
- Setting up an Open Source Community - To drive adoption of a cool ID technology (W4F)
- Communication Channels in our Personal Clouds (W4H)
- Client Certificate Authentication & Browser Pitfalls (W4I)
- DEMO – Social Verification and Google Street Identity (W4J)
Session 5
- Browser Cryptography – Enabling Stronger Authentication for ID (W5A)
- Commercializing VRM – in the marketplace (W5B)
- Backplane 2.0 – Implementation (W5F)
- XDI 1)Graph 101 2)Messaging 3)Link ContractsGraph_101_2)Messaging_3)Link_Contracts) (W5G)
- Assets Discovery for Simple Web Payment (openTransact) (W5I)
- Personal Data Rights and Underlying Principles (W5J)
- Health Care Regs: What are they REALLY? (W5K)
Thursday
Session 1
- Windows 8 Identity Investments (TH1A)
- VRM: Where does it start? (TH1F)
- Privacy - Enhanced Attribute Management / Help me understand "Privacy"' (TH1J)
Session 2
- Confused about ID token and Access Tokens??? Lean the Key Differences (TH2A)
- Beyond Caif - Cow / Escape from Client Server (TH2F)
- Are Custom URI Handles EEEEVil? Or Workable? Alternatives? (TH2G)
- Lifecycle's of Digital ID's Personal Online Including DEATH ... what is life online like after you die? (TH2J)
Session 3
- How to add an account chooser to your site - 4 line's of code but what if you want more! (TH3A)
- Trust Framework System Rules - Business, Legal, Technical (TH3F)
- Open ID Connect/OAuth - Token Lifetime Management (TH3G)
- XDI the Killer App? (TH3H)
Session 4
- SCIM 202 - Part 2 (TH4A)
- Personal Data Rights Language NEXT STEPS PDEC StartUp Circle (TH4F)
- Delivering Entropy Via DNS / WOrkability Challenges (TH4G)
- UMA Open Meeting - Part 1 (TH4J)
Session 5
- XDI Databases / small footprint - mobile development (TH5F)
- How can we continue the discussion? (TH5H)
- UMA Open Meeting - Part 2 (TH5J)
IIW Satellite DC
- What's Going On With NSTIC? Pilots! Steering Groups! - (1A)
- OIX Update (1A2)
- Open ID Connect – the History and Practice (1F2)
- How Private Is It? Privacy Metrics and Preservation Techniques (1G1)
- Personal.com Demo (1G2)
- What Would a Great NSTIC Pilot Look Like? (2A)
- Personal Data Services (2F2)
- Gov Use of OAUTH2, OPEN ID Connect, UMA? (2G1)
- Attribute Management (2G2)
- FICAM Profile, OAUTH2 and 800-63?? (3A)
- ABA IDM Work Group “Redefining Terms” (3F1)
- Why A Super Voter ID? Architecture *Certified Constituent (3F2)
- Constant Use Of Attribute Sharing UI (3G1)
- SCIM Who's Doing What? Standard for Managing Users & Groups (3G2)
- Level 3 and 4 Credentials in the Exosystem (3H)
- Why You Should Care About OAUTH2 (4A)
- Impact of Consumer Permission on Data Use Compliance Laws (4F1)
- Making OAUTH Scopes Interoperable With UMA (4F2)
- Limited Liability Persona.... Can This Leagal Innovation Address Issues of “Psuedonimity” for Trust & Transactions? (4G2)
- Why You Should Care About OAUTH 2 (4H)
- Limited Liability Persona.... Can This Leagal Innovation Address Issues of “Psuedonimity” for Trust & Transactions? (4G2)
- Eat My Attributes (5A)
- Use Case for OAUTH 2 & Structured Takens (5F1)
- Why A Super Voter ID? Architecture *Certified Constituent (5F2)
- Global Attribute Trust Level – Standardization (for RP's) (5G1)
- Common/Open (NPO) Solution For – The Person in the “Personal Identity Movement” (5G2)
IIW 12
Tuesday
Session 1
- Introduction to the JSON Spec Suite
- Yahoo! DAA DNT Hybrid from W3C webtracking & user ID
- Google’s Open ID Relying Partyr
- Respect Trust Framework & Founding Trust Anchors
- Identity Community 101
- Simple Cloud Identity Management
- Gov’t Regulation & Security Services & Bill of Rights
Session 2
- [NSTIC,
, IDPs, TELCOS, DANKS](https://iiw.idcommons.net/NSTIC,_
,_IDPs,_TELCOS,_DANKS) - How to meet privacy goals of NSTIC
- Yahoo! As a relying party
- Open ID ABC Identifiers & Discovery
- Federated Identity for non-web apps
- VRM + Browers
- The line between public and private internet ID
- Users in control of their data UMA
- How many IDPs do we need?
Session 3
- Verified ID in the browser
- Secure Cloud Interop using JWI + OAUTH
- An architectural approach to harmonizing data between personal data stores
- Reputation Systems (whuffie?)
- Open ID ABC session management
- PUSHEE
- Can Banks act as digitial ID providers? Is there money to be made?
- Portable Contacts 2.0
- Security measures identity protocol flows
Session 4
- W3C Identity in the browser topic gathering session/Info Card
- New UMA solutions for scoped access and centralized AUTHZ
- DNS as a personal data store and discovery mechanism
- SSEDIC: Scoping the Single European Digital Identity Community
- User info end point of Open ID ABC
- JSON activity streams spec
- Success factors for fourth parties/user agents
- When SAAS apps exchange customer data should they use OAUTH, Open ID, or other (SAML) protocols to access the data
- Higgins 2: Open Source personal data service
- Bizzaro ID revenue from user purchased ID services
- Open ID 2.0, OAUTH 2.0, Open ID ABC Where are we going?
- Do not track! It won’t work!
Session 5
- Personal Data: what’s the state of things today?
- Getting rid of usernames & passwords – for real?
- OAUTH2 Device Profile
- Open XDI OX
- Data portability for trust framework
- Open Identity protocols and banking
- Portable contexts
- OStatus (Federate the social web)
Wednesday
Session 1
- Beyond the NASCAR UI Google’s Account Chooser
- Chained Identity in Online Entertainment
- Info Sharing Agreement
- Virtual Problems
- SCIM Use Cases
- Different IDP Business Model
Session 2
- Packaging RP Best Practices: Google Identity Toolkit
- Identity in the Browser: Open ID for Firefox
- Smart User Managed Access Demo
- Public Policy Issues in Identity
- How do we publish from our personal data stores? Save the restful web.
- What’s possible at intersection of trust, identity info, commerce and journalism
Session 3
- NSTIC.
- Proxy Auth for Native App Hosts
- Respect Trust Framework 2
- User Managed Access: User Interface
- SCIM Core Schema
- Pseudo Anonymity and Reputation Systems
- Beautiful Payment Systems w/OAUTH
Session 4
- OAUTH2 User Agent via Window Post Message
- What’s available for the shared user profile? Is Poco end all answer?
- Adapting Levels of Assurance for NSTIC
- Building a Trust Framework for Multi-side Markets
- VRM + CRM
- SCIM Bindings
- Two Legs Good? “Client-Server” OAUTH Usage
- Extended Demo: UI for personal data store + data sharing on mobile device cubicon
Session 5
- Backplane Spec
- OAUTH, Open ID Mobile UX: How should it work?
- How to Manage Digital Multiple Identities Securely and Assuring Privacy on Internet
- The Payment Card Trust Framework
- VRM @ Work
- ID/Legal: Dialogue Collaboration
- Conversation Around Data as Currency
- How Yahoo! Became RP: A Large Scale Implementation Study
- Open Architecture for Step Up Authentication
Thursday
Session 1
- For Public Consumption. Choose Wisely: Identity as selective pressure on biology
- Respect Trust Framework Q+A (part 3) Become a trust anchor
- Data Portability for Trust Frameworks
- OpenID Specification Work
- Internet Bill of Rights for “Vegas” Model
Session 2
Session 3
- What part is Identity? What part is Personal Data?
- Open ID Specification Work
- Bill O’Rights O Rama
- Strategies for Ubiquity
- NSTIC Risks Legal Liability
- News personalized by inference or expression…managing the user’s persona
- The Locker Project
Session 4
- What part is Identity? What part is Personal Data?
- Open ID Specification Work
- Legal Structures
- Personal Data - Stores, Lockers, Vaults
- Square Tag
- Red Teaming Trust Frameworks
- Give me tips on creating persona
- Field Guide to Real World Trust Frameworks
- Start-ups table
Session 5
- Open ID Specification Work (Cont.)
- Is there value in an open reputation framework?
- Digital Death
- Real world VRM example + code for VRM App
- Make OAUTH2 Easy for Rest Developers
- Certified Identity
IDCollab Day
ID Collaboration Day Book of Proceedings
- Identity Commons Claims Agent Working Group
- Citizen ID’s and Winlogon credentials? Why AND/OR Why not
- How Will the Enterprise do Identity In The Cloud?
- UK Government ID For Digital Public Service
- Why (Identity, Privacy, Turst) Frameworks are Failing
- Identity In The Browser
- ID Adoption Discussions: Compliance + Service Certification Requirements for Cross-Domain IDM Deployments – Govt, Financial etc…
- Personal Data Ecosystem Personal Data Stores and Services Emerging. What is Happening, How To Be Involved, What To Do Next
- Architecture for A Personal Data Ecosystem
- Organizations and Their Individual Affiliates (retirees, contractors, etc…) Bringing Their “Own Identity” to the Organizations Services
- Measuring ID Assurance Through Complex Supply Chains – “The Weakest Link Breaks the Chain” + Is There a Market for Assurance?
- U-Prove CTP RZ
- ANSI / NASPO – ID-V Standards Workgroup Update
- Machine Readable Policies to Informed Consent
- NIH Seeks Higher LOA
- Personal Data Management (part2) Practical Applications and Market Considerations
- NSTIC.US
- Use Cases for User Centric and Communicating Them On The Web–Identity Labs?
- Kantara Universal Login Experience
- Open ID ABC – High LOA Secure Discovery
- User Managed Access and SMART
- 5 Minute Higgins 2.0 Personal Data Service Demo
IIW 11
Tuesday
Session 1
- Intro to PDS (Personal Data Store)
- Trust Frameworks Analogue to Digital Converters
- Decline of User-Centric Identity an analysis
- OAuth Listening Tour
- Activity Streams 101
- Verified Identity Claims 1
- UMA 101 User Managed Access
Session 2
- OpenID OAuth - Social Networking for online retailers
- ID Commons -IIW Intro
- Deep Dive OpenID - AB
- VRM Development
- No Base String
Session 3
- Attenuated Redelegation
- Verified Identity Claims "U Prove Intro"
- Facebook as a Personal Data Store
- OpenID Connect Discovery
Wednesday
Session 4
- Pseudonyms for Privacy
- Rap Leaf Is it a joke?
- Verified Identity Claims 3
- Handling Unregistered Clients in OAuth and OpenID connect
Session 5
- Change Notify Proposal
- OAuth Multiple Token
- Personal Data Ecosystem
- Making Security Decisions Disappear
Thursday
Session 1
- Value Network Mapping Analysis for personal data ecosystem
- Future Phone Device Authorization
- Enterprise OAuth BOF Level Set
- OpenID Connect Sessn Mgmt
Session 2
- PDE- Why would anyone adopt?
- Fix Session Mgmt Jacking
- UMA 201 Q and A
- Poor Man Verified ID
- Int'l Presence of OpenID
- OAuth for Installed Apps
Session 3
- VERIFIED IDENTITY CLAIMS – Selectors (W3A)
- OAuth2 for Devices
- Building a CAKE Detector
- Shifting Global Economy w-Identity
- OpenID ABC Artifact Binding
Session 4
- Personal Data Ecosystem Biz Models
- Using a Personal Data Store
- JSON Token Spec - Encryption
- Verified Identity Claims - UX
Session 5
- Deadly Sins Distributed Authentication
- Personal Data Ecosystem Model 2
- Cloud Directory Standards
- Infrastructure Focus - Relationships Among Things
- JSON Token Spec - Claim Names
- OAuth LEELOO
- What do USERS want?
- OpenID Attrib - Beyond AX-SREG
Session 1
- Go To Market - PDE Adoption drives for Personal Data Ecosystem
- Google Sample OpenID RD and RP Best Practices
- JSON Spec Work continued
- User Managed Permission Interface
Session 2
Session 3
- PDE - Go to Market and Community Strategy
- Adopting OAuth 2 OpenID Connect
- Email is not Dead Yet
- Policy Framework
Session 4
Session 5
IIW Europe
Session 1
- What is the MYDEX Prototype?
- Federated Network Access
- Partial Identities Privacy and Credentials
- Privacy and Federated Social Networking w/o Correlation
- OpenID Tiered Providers
- Federated Identity as a Business Model
Session 2
- Scoping the Single European Digital Identity Community
- WebID and DNSSEC - combined session
- U-Prove - How Do We Use Privacy Enhancing Crypto?
Session 3
- What Do We Actually Mean When We Talk About Identity?
- The Quality of Customer Intelligence (Authenticity/Relevance Correlation)
- Personal Data Store Harmonizing = Project Nori DEMO
- Claims
- Authent-New Tools - Opportunities - Business
- Remonetizing the Web: from 'Give privacy, get service' to: A win-win social web ecosystem for customers, Telcos, Banks, Websites
- Identity Assurance (merges with) Automated Policy Negotiation
Session 4
- CardSpace in the Clouds
- Introduction to Digital Death - What Happens to Internet Identity After Death?
- One Social Web . org
- Why do Politicians Understand So Little? Our Fault or Theirs?
- How Do You (we) Manage Heterogeneous Groups?
- Issues About Profiling and Cross-Border Data Stores
- OpenID the Nascar Problem Revisited
Session 5
- UK Gov. - They Want To Talk Identity. How Do We Help?
- Embedding Privacy Controls in OnLine Identity Mechanism: How and Why?
- Privacy Dashboard Demo
- Financial Services - distance selling, money laundering, "Know Your Customer"
- Personal Data Ecosystem.org
IIW EAST
THURSDAY
Session 1
- Role of Government as Identity Oracle (Attribute Provider)
- B2B and B2C: How to Balance the Difference and Challenges of Each Environment
- Proofing the Masses
- NSTIC 101 (wtf?)
- More Government Employees at IIW Next Time
- PDX Ecosystem
- High Assurance Consumer Identity
Session 2
- Certifying Use Location for Politics Governance
- Useability: Addressing the click - click - click problem
- Leveraging Identity to Enable and Foster Scientific Collaboration
- Identity and Cross Domain Systems (multilayer security)
- Should We Create "Ownership Rights" in Law for Personal Data?
- Personal Data Vision of Future: Video
- Attributes Claims - Identify Attributes LOA
Session 3
- Are Mediation Tools Useful in Authentication?
- Open Identity for Closed Government: NSTIC the Cybersecurity Answer?
- Wholesale Privacy
- Building Standards for "Trustable" ID Providers
- Liability and Financial models for Identity Providers, Attribute Providers and Identity Proofers
- Personal Data Stores and Context Automation
- Patient Centric Medical Record Federation - Securing HData
- How to Make HTTP Authentication Useful Again?
Session 4
- PRIVACY - Did We Solve Privacy for Web Identity Systems (technically already?)
- Personal Data Store/Archive
- Service Chaining and Trust
- Extending OpenID Assertions with SAML+
- NSTIC - "Identity Ecosystem"
- Cross Federation Trust w/Meta Data
FRIDAY
Session 1
- OAUTH - What Topics Should We Focus On Next?
- Liability for ldps, APs, RPs... Continued
- Getting More .gov @IIW
- Identity Commons "3.0" Big Tent Creation
Session 2
Session 3
- "Today Geekdom, Tomorrow the World"
- Personal Data Locker? What is it and Why?
- Ownership Rights in Data Pt2
- Information Security Standards and "Levels of Protection"
- Certification Coordination - OIX, Kantara, ID Commons
Session 4
- OAUTH Signing #2
- Making NST IC Open/Making NST IC Happen
- Hybrid Online/Offline Debate BYO Issue
- Roadmap for Personal Data Store Ecology: Let's Make One
- Demo
IIW 10 - Spring 2010
Monday
Session 1
- Designing Faceted ID System
- Nascar for Sharing and Personal Service Distovery
- Using DNS + ENUM
- Getting Started in Internet Identity
- Can the Open Pile Become Beautiful Again
- Small Business Software on the Open Web
- OAuth 2.0 WTF
- Online Voter ID How do we do that?
Session 2
- Mozilla Proposes
- Digital Heritage
- Recovering a Lost Identity
- Voluntary Oblivious Compliance
- P2P Network Version Vega
- A New Liberty? to prevent single vendor dominance
- OpenID Connect WTF
Session 3
- Magic Signatures and Salmon
- Cet Competing e-ID providers creating a Market
- OneSocialWeb XMPP & Social Web
- What do regular web devs need to know about ID
- User Managed Access - UMA (protocol)
- Permission vs Consent
- eCitizen OpenID National Architecture
- OpenID Connect: Under the Hood
Session 4
- Trying to use PubSubHubbub
- Privacy Enhancing Approach
- Contextual Identity
- Identity Lifecycle
- Verified Attribute Schema
- Personal Data Stores
Session 5
- Voice Biometrics
- VRM Parts & Whole
- Linking Data Across Social Networks APIs
- Six Degrees of Sharing
- OAuth 2
- ORCID Open Research Contributor ID
TUESDAY
Session 1
- Strong Auth and OpenID getting Comfie
- Information Cards and Gov Cards
- De-Confusion Big Picture
- Open Geneology
- XRD Provisioning
- Building MITER ID
- OAuth 2.0 and SASL
Session 2
- Info Grid Graphic Database
- Legal Issues Underpinning of UMA ("UMA and the law")
- Contacts in the Browser
- Migrating from HTTP to HTTPS OpenID
- Identity Business Models
- Patents, People Development Pools
- Enterprise Signing in OAuth
Session 3
- Simple Reputation Feed
- Lawyers and Accountants
- The Right Question Making Privacy Policies User-Centric vs. Data Centric
- OIX
- UX w/no logout...single sign out
- URL-Sharing Using the OExchange Protocol Stack
- Secure Web Auth
- The Case for and Design of KRL
Session 4
- Research Report on Info Sharing
- OAuth 2 for Native Apps
- User Managed Access (Claims 2.0)
- Client Side OptIN Cross Site Data Sharing
- Telco vs. The NET
- Web Biz Card
- SAML Profiles for OAuth
- Separating: ID, Credential, and Attribute Management
- Story Cubing and Synergies
- OpenID-Artifact Binding
Session 5
- Biz Model on Distributed Social Web
- Directory Federation
- Honey Roasted Death Camp Salad
- OpenIDvNext Discovery
- Implications of User Owned Controlled Data as Official Government Policy
- Google as an OpenID RP
WEDNESDAY
Session 1
- Personal Data Store Ecosystem Design
- (In)Coherent Web (in)security Policy Framework
- Bootstrapping OAuth 2.0 Ecosystems
Session 2
- OAuth Provisioning continued
- Stateless Distributed Membership an Inquiry
- Emancipay VRM and CRM
- Breaking up with Atom Activity Streams
Session 3
- DNSSEC
- Certifying Open ID, IdPs, RP
- SMART UMA
- Catalyst Interop Planning
- PCITF: Payment Card Industry Trust Framework
Session 4
Session 5
IIW 9 - Fall 2009
Session 1
- OpenID Artifact Binding =Nat
- Gluu Metaprise - MIke Schwartz
- Cloud Selector - Susan Marrow
- Vulnerabilities in ID tech - Rich Smith
- VRM Loyalty Cards in Real World - Chris Carfi
- Data Portability TOS EULA - Steve Greenberg
- Social Consent - Angus Logan, Kevin Marks
- Social InterNetworking - Rohit Khare
Session 2
- Attribute eXchange =Nat
- Biz Case for Data Portability - Elias Bizannes
- Identity Selector for OpenID - Mike Jones, Ariel Gordon, Oren Melzer
- Enterprise Use of Consumer Identities - Pamela Dingle
- Activity Streams - Monica Keller, Chris Messina
- Privacy Risk Assessment at the data item level - Jeff Stallman
- Question to ask for request - Alan Karp
- Legal Layer of the Stack - Scott David
- Twitter What's with it? - Kaliya
Session 3
- Salmon - John Panzer
- Selling to Consumers - Phil wolff
- User- Managed Access - Eve Maler
- Email Sucks What's Next - JAM
Session 4
- Attribute Aggregation - David Chadwick
- OpenID Security - Breno, Jeff, Ashish
- Building Action Cards - Phil Windley
- Microformats Meaning in HTML existing formats - Kevin Marks
- elgg Open Source Social Networking - Justin Richer
- Defining Meaningful Claims - Patricia
Sessoin 5
- OpenID for Science Community - Dhiva, Mike Helm
- Identity in the Browser: Security and Protocol Issues
- Role of 3rd Parties in enabling trust frameworks, challenges, business models, opportunities - Lena Kannappan
- What an RP Needs - Joseph Smarr
- The Business Imperative of User-Driven Data - Darias Dunlap
Session 6
- Trust Nexus - Mike Duffy
- Open Identity Trust Framework - Drummond Reed, Don Thibeau
- The Hammer-Stack "advanced"
- Identity and Cloud Computing - Anil Saldhana
- Active Client iiw9 - RL "Bob" Morgan
- The Small Business Web Issues of building a "whole product solution" - Sunir Shah, Freshbooks
- 4th Party Provider Brainstorm
Day 2 Lunch
- ID Commons Stewards Call - Mary Ruddy
Session 7
- OpenID Contract Exchange and Japan Update =Nat
- Identity and iPhone - Jeff Shan
- OpenID Session Management Best Practices - Johannes Earst
- Going to Market Mobilizing a community of RP's and OpenID InfoCard enabled session - Mike Ozburn, Scott David
- Is Assurance Real? - RL "bob Morgan
- OpenID Provider Office Hours - Yahoo, Google, AOL, MyOpenID
Session 8
- Salmon Pixie Dust - Johnathan Panzer
- I'm from Phone Company How can I help - Kevin Marks, BT
- Strong AuthN - Micheal Sprague, Wave Systems
- Schema Mapping Using Personal Data Madel - Paul Trevithick
Session 9
- OpenID v. Next
- Information Sharing - Joe Andreu
- Data Traceability in the cloud - Steve Holcombe
- Facebook Recycling -
- Spectrum of Identity and other things - Kaliya Hamlin Rick Smith
Session 10
- WRAP - Simple OAuth - Web Resource AuthN Protocol - Dick Hardt, Allen Tom, Brian Patton
- From Paramecium to People - Bioinformatics,Identity and Law - Scott David
- Portable Contexts - Joe Andreu
- How Should Identity Support in the browser look like? - Johannes Ernst
- My Ideal Identity Flow - Eran Sandler
Session 11
- Public Key Discovery
- Identity in the Browser
- SAML and OAuth - Paul Madsen
- Open Identity Trust Frameworks
- Lessons Learned Past Efforts...Email Auth... Ev SSL - Jim Fenton, Craig Spiezle
Lunch Day 3
- Why Facebook doesn't implement OAuth today - Luke, David
- Getting data into XRD - Will Noris
Session 12
- Rich Sharing on the Web - Alan Kar
- XRI Resolution using XRD 1.0 =Drummond
- Where should Identity Live - Andrew Arnott
- Factors Influencing VRM/CMI Enabled marketing systems - Michael Becker
IIW 8 - Spring 2009
Session 1
- Identity Doesn't Matter - Authorization Does, Alan Karp
- Distributed Identity Based on Relationships, Pat Sankar from Rel-ID
- Do People want to Own and Manage Their Identity? If so, How?, Ernie..... State of OpenID - Authoratatives Discussoin RE: State of 1) Trust/Security 2) User Experience 3) Nascarization 4) Attribute Exchange 5) Adoption by David Eyes
- Defining an Architecture and Lexicon for VRM and Volunteered Personal Information building on VRM Workshop Dialogue - Iain Henderson (video)
Session 2
- Authentication or Authorization? Can we move to verification Now?, Doug Whitmore
- Financial Institutions as Identity Providers, Guiyom
- Identity and Privacy - Who to Trust with Your Data, Mainak
- Identity Quartet and User Driven Identity, Joe Andrieu (video)
- Identity Services Business Models, Bob Blakley
- OpenID For Desktop Applications: How? When?, Infinity Linden
- Sharing Permission RESTfully with Web-Keys, Tyler Close.... ... Authorization without boring crypto (It is possible and it is secure), Hans Granquist
Session 3
- Filtering the Noise in the Activity Streams How to <3 your stream..., Monica
- Role as Identity and Organizational Trust, Justin Richer
- Higgins Cloud Selector (a way to use i-cards without installing anything on your Machine), Markus (video)
- Keeping User Happy on the Desktop vs. On the Web (OS-level vs Online ID Management), Aridren N. (Apple) / Ariel G. (MSFT) ... ...What would it look like if Apple designed OpenID?, Chris Messina
Session 4
- Action Cards (Part 1) What are they, How do they Work, what are the Issues, Drummond Reed (also see opening talk (video) by Drummond)
- Becoming an OpenID Relying Party, Luke Shepard (Facebook) and George Fletcher (AOL)
- Enhanced Transaction Model Using InfoCards, Jeff Stollman
- Distributed Expertise Location, Terrell Russell
- Characteristics of VRM Joe (video) (also see opening talk (video) by Doc Searls)
- Claims, Tickets and OAuth Yaron Y. Goland
Session 5
- Action Cards (Part 2) Building Action Cards with Kynetx (Demo), Phil Windley
- Identity Brokers What are they? How do they Work?, Ben Sapiro
- Claims, Tickets and OAuth Yaron Y. Goland Value of Identity (end user) and SEO,
- ID-Legal "straw man" blog, Lucy
- Self Asserted Attributes When to Trust Them, AssertID
- Claims, Tickets and OAuth Yaron Y. GolandVRM 1st and 4th Parties, Doc (video)
- User-Managed Identity Use-Case Gathering (To Identity Symergy), Trent Adams
- Developing a Secure Discovery Based Messaging System, Nika
Session 6
- Are there "standards" for Registering to Call an API, Angus Logan
- Protect Serve Relationship Management for User-Driven Access Control, Eve Maler (video)
- VRM and Media, Doc
- OAuth for High Value Transactions, Jeff Shan
- Managing Alternative Identities, Infinity Linden
- Introduction to Discovery or How Do we Interact with the Unknown, Eran Hammer
- Big Dialogue and Online Community Identity Rules MIT Media Lab/ Harvard Berkman Center
- Innovation Games, Nancy Frishberg (video)
- Assurance in the Real World Levels, Communities, Certificates, Governments, Protocols, Bob Morgan ........ Discovering Federation and Trust Levels for OpenID Info-Card SAML, John Bradley.......Next-Gen O PenID Discovery: LRDD, XRD, signed delegation etc., Dirk Balfanz
Session 7
- OpenID UX OpenID UI Extension Best Practices, Allen Tom
- Confetti Stop Storing Passords and Start using Delegation -> Get more users, Kevin Marks
- Use Cases for User-Managed Access, Eve Maler, Alan K, Trent A, Paul T. Dazza G.
- Failed Identity Businesses, Chris
- Contextual Friends Lists and Sexuality Online, Sarah Dopp
- Kantara Initiative, Brett McDowell
- Activity Strea.ms Formalizing Draft Spec
Session 8
- Detecting User Login State and Preferences Brian E, Luke Shepard (Facebook)
- Microformats *distributed data, *in HTML, *in Google SERPs, Kevin Marks (video)
- User Driven Search, Joe Andrieu
- Personal Relationship Management What about starting an Open-Source project?
- Web 2.0 vs. Rich Internet Apps (RIA), Brett McDowell
- OAuth for Installed Applications, Nathan Beach, Eric Sachs
- Identity and the Future of Money, Giyom
- Having Fun with Wakame, Asa Hardcastle (video)
Other
- Demos
- How to talk to Business People, Mike Ozburn
Session 9
- 9A: Use Case Selection and Metrics, Eve Maler, Alan Karp
- Activity Streams, Twitter API, Facebook, Open Social, Yahoo! Updates, Kevin Marks (QT video)
- Simpler OAuth For Lower Risk Use Cases, Brian Eaton, Eric Sachs
Session 10
- Use Case Selection and Metrics Part 2: See 9A: Use Case Selection and Metrics
- What does and RP need to survive compromise of user@idp? Breno (Google), Luke Shepard (Facebook)
- OSIS Testing John Bradley
- Innovation Design and Serious Games To Make Your Products Rock, Kaliya and Nancy F (QT video)
- Identity in 10 Years - How People Change Chris
- OAuth for Enterprise Use Cases (2 legged), Eric Sachs
Session 11
- Personal Hype Quotient: OAuth in Use - meet the OAuthors
- Visual e-ID (Certificate Image Extension
- InfoGrid sneak preview, Johannes Ernst
- WebFinger (Personal Web Disco)
- Internal and External Identity in the Enterprise, Justin Richer
- What if an IDP allows logins to multiple accounts at the same time? RP Impact?, Eric Sachs
Session 12
- NASCAR DEMO with Action Cards, Phil Windley and Drummond
- OpenID, Open Social and Mobile, Jeff
- Open Liberty Released - Wakame VI.O ID-WSF FUN, Asa Hardcastle (QT video)
- Validation Extension for OpenID, Henrick
- Use Cases for Identity Brokers Ben S. Ashish J.
- OpenID PGP and Thawte Key Signing, SignpollyMa, Will Norris
IIW 7 - 2008b
Monday
Session 1
- Designing Faceted ID System
- Nascar for Sharing and Personal Service Distovery
- Using DNS + ENUM
- Getting Started in Internet Identity
- Can the Open Pile Become Beautiful Again
- Small Business Software on the Open Web
- OAuth 2.0 WTF
- Online Voter ID How do we do that?
Session 2
- Mozilla Proposes
- Digital Heritage
- Recovering a Lost Identity
- Voluntary Oblivious Compliance
- P2P Network Version Vega
- A New Liberty? to prevent single vendor dominance
- OpenID Connect WTF
Session 3
- Magic Signatures and Salmon
- Cet Competing e-ID providers creating a Market
- OneSocialWeb XMPP & Social Web
- What do regular web devs need to know about ID
- User Managed Access - UMA (protocol)
- Permission vs Consent
- eCitizen OpenID National Architecture
- OpenID Connect: Under the Hood
Session 4
- Trying to use PubSubHubbub
- Privacy Enhancing Approach
- Contextual Identity
- Identity Lifecycle
- Verified Attribute Schema
- Personal Data Stores
Session 5
- Voice Biometrics
- VRM Parts & Whole
- Linking Data Across Social Networks APIs
- Six Degrees of Sharing
- OAuth 2
- ORCID Open Research Contributor ID
TUESDAY
Session 1
- Strong Auth and OpenID getting Comfie
- Information Cards and Gov Cards
- De-Confusion Big Picture
- Open Geneology
- XRD Provisioning
- Building MITER ID
- OAuth 2.0 and SASL
Session 2
- Info Grid Graphic Database
- Legal Issues Underpinning of UMA ("UMA and the law")
- Contacts in the Browser
- Migrating from HTTP to HTTPS OpenID
- Identity Business Models
- Patents, People Development Pools
- Enterprise Signing in OAuth
Session 3
- Simple Reputation Feed
- Lawyers and Accountants
- The Right Question Making Privacy Policies User-Centric vs. Data Centric
- OIX
- UX w/no logout...single sign out
- URL-Sharing Using the OExchange Protocol Stack
- Secure Web Auth
- The Case for and Design of KRL
Session 4
- Research Report on Info Sharing
- OAuth 2 for Native Apps
- User Managed Access (Claims 2.0)
- Client Side OptIN Cross Site Data Sharing
- Telco vs. The NET
- Web Biz Card
- SAML Profiles for OAuth
- Separating: ID, Credential, and Attribute Management
- Story Cubing and Synergies
- OpenID-Artifact Binding
Session 5
- Biz Model on Distributed Social Web
- Directory Federation
- Honey Roasted Death Camp Salad
- OpenIDvNext Discovery
- Implications of User Owned Controlled Data as Official Government Policy
- Google as an OpenID RP
WEDNESDAY
Session 1
- Personal Data Store Ecosystem Design
- (In)Coherent Web (in)security Policy Framework
- Bootstrapping OAuth 2.0 Ecosystems
Session 2
- OAuth Provisioning continued
- Stateless Distributed Membership an Inquiry
- Emancipay VRM and CRM
- Breaking up with Atom Activity Streams
Session 3
- DNSSEC
- Certifying Open ID, IdPs, RP
- SMART UMA
- Catalyst Interop Planning
- PCITF: Payment Card Industry Trust Framework
Session 4
Session 5
IIW 6 - 2008a
- Creating an InfoCard IdP in 30min Daniel Sanders
- Tracking stuff I've Done Killer OpenID app?, Dick
- Open Social Making the Web More Socail, Kevin Marks
- Verified Claims From Here to Reality - Bob Morgan, UW
- User-Driven Search Joe A.
- Large OPs and RPs Shreyas, Y!
- Relationships Bob Blakley
- InfoCard Capabilities Pam Dingle
- Why OpenID matters to the Enterprise Pete Metralus and Ed Amemiya
- Higgins R-Cards Markus S.
- Digital Deal Johannes
- Project Concordia Eve Maler
- Venn Sweetspot Alexis Bor
- Role of Data Silos Mike Carc
- Identity Beyond the Web Harlan Iverson
- Partitioning the Space Johannes Ernst
- Enterprise Identity RoadMap Marty Schleiff
- CardSpace and Fedlets and SAML Pat Pattersion
- ID Futures Kaliya
- Friend Connect Kevin Marks
- Paradoxes of Identity Management Everything you know is wrong, Brad Templeton
- XRDS - Simple + OAuth Discovery Eran
- You can get a degree for this? Bryant Cutler and Devlin Daley present their research
- Legal IIW Kaliya and Bob Blakley
- ID Commons Infrastructure Kaliya and Mary Rudy
- FOAF SSL Proposal for Simple distributed single sign on protocol in a web of trust - semantic web, linked data. Henry Story.
- CallVeifID 2nd Facto rfor My OpenID Technology and Design Decision
- What to do on an OAuth Permission page Shreyas, Y!
IIW 5 - December 2007
- Concordia
- XRDSP (XRDS Provisioning protocol) (10-15)
- OAuth (5)
- HBX (Higgins Browser Extension) Provisioning and Authentication Working Session. (12)
- OSIS Tutorial
- VRM 101
- OpenLife Bits
- Dynamic Federation
- Implementing OpenID and OAuth
- Ubiquitous Computing
- UI Best Practices for OpenID RPs
- VRM Standards Gap
- Landscape 2008
- OpenID Security & Privacy
- Who Wants To Be A Billionare
- Information Cards Intro
- Intro to OAuth
- Trusted Data Exchange & RP Reputation (=nat)
- Real Identity
- Identity Architecture, RM-ODP
- OpenID Tutorial
- OSIS Interop
- IdP Trust and Reputation
- Connectivity from the Edge
- Higgins Tutorial
- OAuth Extensions
- Reliable Identities for Relying Parties
- Who's Who
- OpenID Foundation
- OSIS Interop
- Identity Commons 101
- Open Reputation Management Systems
- OAuth and OpenID
- Deployment Challenges
- Limited Liability Personas
- OSIS Interop
- Understandable Usability
- Identity Commons Resources
- Non-browser OpenID and OAuth
- What IIW Means to Enterprise
- Second Life Residents Supporting OpenID
- Open Reputation Management System (ORMS)
- VRM Projects
- What's Next for OpenID (3.0)
- Bandit Project
- Sxipper Demo
- VRM Use Cases
- Identity Assurance Framework
- Understanding Usability
- La Leche League ID Implementation
- OSIS Steering Comittee
- The ITU World E-Trust Initiative
- Considerations and Best Practice for Large OpenID Providers
- Intro to Concordia
- IIW What's Next Part 2
- Python Future Implementation of OAuth
- Concordia Use Case
- Friends List Portability
- Newbies4Newbies
- XDI-RDF 123
IIW 4 - May 2007
- What's Ahead for OpenID
- SimplePermissions: Delegation via OpenID
- Identity in ad-hoc, standalone and disconnected networks
- User-Centric Delegation
- Identity Management Legal and Regulatory (Tony Rutkowski, VeriSign)
- Vertical Integration of IDS from devics to users to access networks to core networks to services and content Rakesh Radhakrishnan, Sun]
- Concordia multi-protocol use case session
- Sxipper demo
- IdM Beyond Application Layer
- Managing schema in the identity metasystem
- VRM
- Higgins in seven minutes (PPT file), =paul.trevithick presented this at the beginning of a session
- IDTrust Overview iiw 051607-v1.pdf OASIS IDTrust Overview, OASIS IDTrust Member Sector, Abbie Barbir,Nortel
IIW 3 - December 2006
- Welcome: Kaliya Hamlin and Phil Windley
- Landscape Map: Kaliya Hamlin and Mike Ozburn
- The Identity Gang Lexicon and Laws of Identity: Dick Hardt
- OSIS - Open Source Identity System: Johannes Ernst (slides from the presentation)
- CardSpace/iCards: Kim Cameron or someone else from Microsoft
- Higgins: Paul Trevithick, Mary Ruddy
- SAML/federation/Liberty Alliance: Eve Maler (presentation in PDF)
- URL Based Identity (OpenID which includes, LID, Yadis, I-names/XRI, Sxip): David Recordon, Scott Kveton
- Identity Commons: Eugene Eric Kim
- OSIS
- FinancialID
- Who are the You I care about
- Deployment Interoperability (User centrism and Federation) - Lena Kannappan
- OpenID Libraries and Implementation
- Pat Patterson's YADIS/XRI/SAML Demo
- SAML LSSO Profile and SimpleSign Binding
- IdP Tools - Mixing & Matching - What's Available?, What's Coming?
- Beyond Passwords
- OpenID and SAML Convergence Touchpoints
- LegalFramework Who owns identity? - Mark Lizar & Louis Monvoisin
- Creative Uses for I-names
- (Room B) (need title)
- IdP Interoperability
- OpenID in Politics
- Identity and Reputation
IIW 1 - 2005
- Identity in the Marketplace: The Rise of the Fully Empowered Customer - Doc Searls
- Use Cases for the Social Web - Mary Ruddy, SocialPhysics
- Microsoft's Vision for an Identity Metasystem - Mike Jones, Microsoft
- Liberty Alliance Overview - Brett McDowell, Liberty Alliance
- XRI Metaidentifiers - Drummond Reed
- Identity 2.0 Design Guidelines and the Evolution of the SXIP Protocol - Dick Hardt, SXIP
- Decentralized, REST-ful Digital Identity with LID - Johannes Ernst, NetMesh
- OpenID - Brad Fitzpatrick, LiveJournal
- SocialPhysics And The Higgins Trust Framework - Paul Trevithick, SocialPhysics
- Identity Commons - Owen Davis & Joel Getzendanner -
- Kaliya Hamlin Civil Society Meta-Network building and new business models that arise from this.
- Rob Marano and Simon Ben-Avi Architecture and Process of Federated Digital Authentication and Authorization
- Nick Ragouzis Bandwagon Economics, the Necessary Ingredient for Success on the Identity Internet
- Craig Calle Roadmap and Challenges to Open Standards in Networking Applications
- Christopher Allen Four Kinds of Privacy or Progressive Trust or ...
- Adrian Blakey Xanthus, an Open Source Implementation of LID
- ... no, not that Xanthus (the NeXTSTEP hypermedia systemfrom Sweden ...)
- Allan Schiffman: You’re Nobody Till Somebody Rejects You: Requirements for Internet-scale Identity.
- Brett McDowell The Consensus Whiteboard Project as discussed on the mailing list.
- Victor Grey Expanding on Brett McDowell's idea, a proposal to create an IETF-like organization to seek consensus and open voluntary standards for distributed authentication and user-owned data. The proposal can be read on the ic_dev wiki
- Eric Hayes Controlled Identity (bits to a lot of your identity information), Privacy, and Attention Data as a single topic.
- YADIS http://www.yadis.org proposal by Johannes Ernst, David Recordon, and Brad Fitzpatrick
- Owen Davis - Help create the Identity Commons: what is the call to action?
- Mary Hodder