• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

IIW topics so far

Kaliya Young · March 4, 2015 · Leave a Comment

We keep track of topics folks want to talk about on our Identity Commons wiki.
I figured I would pull the list out from there and share it here…Its looking good so far.
What topics are you planning to present about or lead a discussion about at this IIW?

  • Notification management – Notifs
  • unhosted identity
  • Redelegation of OAuth bearer tokens
  • “OpenID Connect certification
  • Proof of Possession”
  • Trust-elevation (adaptive access)
  • IdM for future scientific collaborations
  • I am a member of the W3C Credentials Community Group (http://opencreds.org) and will present status/progress/goals/roadmap/use cases and how they relate to other identity initiatives.
  • OpenID Connect mobile profile
  • “Consent management UI and internals International consent issues”

What are you hoping to learn about or hear a presentation about at IIW?

  • what’s new in identity protocols, VRM, …
  • Trust Frameworks including Public and Private Sector organizations and international governments
  • http-free protocols http://www.wavis.org/blog/http-free-web-protocols“
  • SCIM, OpenID Connect
  • UMA – VRM – OIDF Certification Threat Management Reputation Management
  • What others are doing
  • OAuth OpenID Connect and FIDO profiles
  • OpenID Connect, OAuth 2.0, UMA
  • Federated and delegated IdM
  • How other technologies overlap and can potentially integrate with the Credential CG standards.
  • “Personal control of data sharing OAuth/OpenID Connect”
  • SCIM extensions or anything SCIM
  • OpenID Connect, UMA, vectors of trust
  • Others working on consent management

What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?

  • social physics consensus and collaboration using decentralized mechanisms (e.g. blockchain)
  • How to have identity without subscription to a service. IE How to have a service recognize rather than authenticate.
  • Password management use cases with SCIM OpenID Connect NAPPS Profile
  • User Centric Business Models
  • What are the remaining roadblocks to adoption of higher LOA BYOI
  • “Identity Management as a Service – Use Cases Attribute based credentials – Use casesMulti factor authentication on Mobile Devices”
  • Consent

Uncategorized

ConvertKit Form

Join to get updates from Identity Woman

Kaliya is beginning to share regular updates about her work. This will help keep you up to date with all her work.

Success! Now check your email to confirm your subscription.

There was an error submitting your subscription. Please try again.

We won't send you spam. Unsubscribe at any time. Powered by ConvertKit

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact