• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Identity Commons

MyData 2018: Domains of Identity & Self-Sovereign Identity

Kaliya Young · August 30, 2018 ·


Here are the slides of my talks and some links to the material covered.
1. The MyData —> Identity Connection 
If you don’t have control of your identifiers you can’t control your data.
2. How did I begin in Identity?
Via the Planetwork Community and its vision of the Augmented Social Network White Paper.
3. The Domains of Identity – My Masters Report 
4. An Overview of Self-Sovereign Identity
If you are interested in our report on SSI it can be found here.  It is priced for the audience we wrote it for C-Level Executives. 
5. Conclusion —> Creating Alignment
I referenced my three phase plan for Systems Leadership & the Short, Long  Report  & resource guide that accompany them.

  1. See the Larger System
  2. Reflective and Generative Conversation
  3. Co-Create the Future

I concluded by highlighting ideas from this post by Eugene Kim
The Art of Aligning Groups 

The Domains of Identity & Self-Sovereign Identity MyData 2018 from Kaliya "Identity Woman" Young

Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea

Kaliya Young · February 3, 2018 ·

I decided to open a thread On Twitter for ID & security professionals to share why (/if) putting hashed PII on any immutable ledger(blockchain) is a bad Idea.
Not everyone agreed that it was bad if certain things were done right.
There were 15 direct responses and then a whole lot of subthreads. I have pulled out all the subthreads. All tweets are linked to. Yes…all of them. Let me know if i missed a thread and I will pull it in. Let me know if you post about this thread on your blog – I will post a link. Also I am giong ot share this with the identity gang list – you can join it here: https://lists.idcommons.net/lists/subscribe/community
Jeff Lombardo also made a summary of the conversation on his blog. https://x-iam.com/can-blockchain-solves-the-privacy-of-identity-connundrum.html
 
[Read more…] about Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea

IIW 23! Register. Its going to be great!

Kaliya Young · August 26, 2016 ·

Powered by Eventbrite

IIW is early!! We are 20!! We have T-Shirts

Kaliya Young · March 4, 2015 · Leave a Comment

Internet Identity Workshop is only a month away. April 7-9, 2015
Regular tickets are only on sale until March 20th. Then prices to up again to late registration.
I’m hoping that we can have a few before we get to IIW #20!!
Yes it’s almost 10 years since we first met (10 years will be in the fall).
I’m working on a presentation about the history of the Identity Gang, Identity Commons and the whole community around IIW over the last 10 years.
Where have we come from?…leads to the question…. where are we going?  We plan to host at least one session about these questions during IIW.
It goes along with the potential anthology that I have outlined (But have a lot more work to get it completed).

Internet Identity Workshop #20 is in April !!

Kaliya Young · December 14, 2014 · Leave a Comment

IIW is turning 20 !
That is kind of amazing. So much has evolved in those 10 years.
So many challenges we started out trying to solve are still not solved.
I actually think it would be interesting as we approach this milestone to talk about what has been accomplished and what we think is yet to be accomplished.
I am working on organizing a crowd funding campaign to support completing an anthology that I have outlined and partially pulled together. I will be asking for your support soon. Here is the post on my blog about it.
In the mean time tickets for IIW are up and for sale! You can also order a special T-shirt we are designing especially for the occasion.

Online Ticketing for Internet Identity Workshop XX #20 – 2015A powered by Eventbrite

Online Community Unconfernece "Its BACK!"

Kaliya Young · March 19, 2013 · Leave a Comment

I am really excited to be working with a super awesome crew of leaders of the Online Community Manager Tribe – or OCTribe.  We have been considering reviving the event and the pieces have finally come together to do it.

May 21st at the Computer History Museum

Registration is Open!
I really love the other co-organizers who are all rockstar community managers.

  • Bill Johnston, Red Plastic Monkey
  • Susan Tenby, Blog
  • Gail Williams, Blog
  • Scott Moore, Phoom
  • Marina Ogneva, Twitter, Facebook 
  • Rachel Luxemburg, Fait Lux

The conference was originally produced by Forum One and I contracted with them to help design and facilitate. That event itself grew out of an invitational summit they hosted annually on online communities.  I actually attended one of these in 2004 as a replacement for Owen Davis who I worked for at the time at Identity Commons (1).
My firm Unconference.net is doing the production and facilitation for the event.
I plan to bring forward topics of digital identity forward at the event and hopefully get some of the amazing expertise on identity and reputation to participate in NSTIC.
 
 

Recent Travels Pt1: IIW

Kaliya Young · November 27, 2011 · Leave a Comment

IIW is always a whirlwind and this one was no exception. The good thing was that even with it being the biggest one yet it was the most organized with the most team members.  Phil and I were the executive producers. Doc played is leadership role.  Heidi did an amazing job with production coordinating the catering, working with the museum and Kas did a fabulous job leading the notes collection effort and Emma who works of site got things up on the wiki in good order.
We had a session that highlighted all the different standards bodies standards and we are now working on getting the list annotated and plan to maintain it on the Identity Commons wiki that Jamie Clark so aptly called “the switzerland” of identity.



 
 
 
 
 
 
 
 
 
 
We have a Satellite event for sure in DC January 17th – Registration is Live.
We are working on pulling one together in Toronto Canada in
early February, and Australia in Late March.
ID Collaboration Day is February 27th in SF (we are still Venue hunting).
I am learning that some wonder why I have such strong opinions about standards…the reason being they define the landscape of possibility for any given protocol. When we talk about standards for identity we end up defining how people can express themselves in digital networks and getting it right and making the range of possibility very broad is kinda important.  If you are interested in reading more about this I recommend Protocol:  and The Exploit. This quote from Bruce Sterling relative to emerging AR [Augmented Reality] Standards.

If Code is Law then Standards are like the Senate.

 
 


 
 
 
 
 
 
 
 
 
 

Join us for IIW – NSTIC, Nymwars, OpenID, Personal Data, and more.

Kaliya Young · September 1, 2011 · Leave a Comment


Founded in 2005 by me, Doc Searls, and Phil Windley (Yes it is an odd but fun bunch), IIW is focused  on user-centric digital identity.   Registration is Open!

Internet Identity Workshop #13 October 18-20 in Mountain View

The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. We also work on trying to address social and legal issues that arise with these new tools.  This conference we are going to also focus some attention on business models that can make this ecology of web services thrive.
The NSTIC Stakeholder community has been invited.
[Read more…] about Join us for IIW – NSTIC, Nymwars, OpenID, Personal Data, and more.

Is Google+ is being lynched by out-spoken users upset by real names policy?

Kaliya Young · August 28, 2011 · 5 Comments

Following my post yesterday Google+ says your name is “Toby” not “Kunta Kinte”, I chronicled tweets from this morning’s back and forth with  Tim O’Reilly and Kevin Marks, Nishant  Kaushik, Phil Hunt,  Steve Bogart and Suw Charman-Anderson.
I wrote the original post after watching the Bradley Horwitz (@elatable) – Tim O’Reilly (@timoreilly) interview re: Google+. I found Tim’s choice of words about the tone (strident) and judgement (self-righteous) towards those standing up for their freedom to choose their own names on the new social network being rolled out by Google internet’s predominant search engine disappointing.  His response to my post was to call me self-righteous and reiterate that this was just a market issue.
I myself have been the victim of a Google+ suspension since July 31st and yesterday I applied for a mononym profile (which is what it was before they insisted I fill out my last name which I chose to do so with my online handle and real life identity “Identity Woman”) 
In the thread this morning Tim said that the kind of pressure being aimed at Google is way worse then anything they are doing and that in fact Google was the subject of a “lynch mob” by these same people.  Sigh, I guess Tim hasn’t read much history but I have included some quotes form and links to wikipedia for additional historial context.
Update: inspired in part by this post an amazing post “about tone” as a silencing/ignoring tactics when difficult, uncomfortable challenges are raised in situations of privilege was written by Shiela Marie.  
I think there is a need for greater understanding all around and that perhaps blogging and tweeting isn’t really the best way to address it.  I know that in the identity community when we first formed once we started meeting one another in person and really having deep dialogues in analogue form that deeper understanding emerged.  IIW the place we have been gathering for 6 years and talking about the identity issues of the internet and other digital systems is coming up in mid-October and all are welcome.  The agenda is created live the day of the event and all topics are welcome.
Here’s the thread… (oldest tweets first)
 Note all the images of tweets in this thread are linked to the actual tweet (unless they erased the tweet).  [Read more…] about Is Google+ is being lynched by out-spoken users upset by real names policy?

Google+ and my "real" name: Yes, I'm Identity Woman

Kaliya Young · July 31, 2011 · 25 Comments

When Google+ launched, I went with my handle as my last name.  This makes a ton of sense to me. If you asked most people what my last name is, they wouldn’t know. It isn’t “common” for me.  Many people don’t even seem to know my first name. I can’t tell you how many times I have found myself talking with folks at conferences this past year and seeing ZERO lighbulbs going off when I say my name “Kaliya”, but when I say I have the handle or blog “Identity Woman” they are like “Oh wow! You’re Identity Woman… cool!” with a tone of recognition – because they know my work by that name.
One theory I have about why this works is because it is not obvious how you pronounce my name when you read it.  And conversely, it isn’t obvious how you write my name when you hear it.  So the handle that is a bit longer but everyone can say spell “Identity Woman” really serves me well professionally.  It isn’t like some “easy to say and spell” google guy name like Chris Messina or Joseph Smarr or Eric Sachs or Andrew Nash. I don’t have the privilege of a name like that so I have this way around it.
So today…I get this

I have “violated” community standards when using a name I choose to express my identity – an identity that is known by almost all who meet me. I, until last October, had a business card for 5 years that just had Identity Woman across the top.

Display Name – To help fight spam and prevent fake profiles, use the name your friends, family, or co-workers usually call you. For example, if your full legal name is Charles Jones Jr. but you normally use Chuck Jones or Junior Jones, either of these would be acceptable. Learn more about your name and Google Profiles.

[Read more…] about Google+ and my "real" name: Yes, I'm Identity Woman

Proactive Development of Shared Language by NSTIC Stakeholders

Kaliya Young · July 31, 2011 · 2 Comments

This is the “punchline section” (in my response it is after what is below…the history of collaboration in the identity community):

Proactive Development of Shared Language by NSTIC Stakeholders

In 2004-5 the Identity Gang (user-centric identity community) was 1/10 the size of the current NSTIC stakeholder community.  It took us a year of active grassroots effort to develop enough common language and shared understanding to collaborate. NSTIC doesn’t have 5-10 years to coalesce a community that can collaborate to build the Identity Ecosystem Framework. To succeed, the National Program Office must use processes to bring value and insight while also developing  shared language and understanding amongst stakeholders participating.
[Read more…] about Proactive Development of Shared Language by NSTIC Stakeholders

Emerging Themes for IIW12

Kaliya Young · April 14, 2011 · Leave a Comment

One of the reasons I love IIW is that really smart people with passion can come together, discuss hard problems AND make real progress towards solving them.  This is just my take – of course the workshop will be created by the people who attend.

OpenID “The Next Generation”:

In my last post I said some things that some people associated with particular technologies may have interpreted in a way that I didn’t intend.  I said “OpenID as we know it” was dead – but OpenID itself is very much alive and making progress to the next generation of OpenID. The work led by Nat Sakimura on Attribute Binding and the proposal to do an OpenID Connect by David Recordon have merged into OpenID-ABC.   They are making steady progress led by John Bradley and Nat with active participation from Microsoft, Google and Facebook.  My hope is that some more people from independent web perspectives – hint hint Evan and Sarah 😉  can get involved too.
The OpenID Summit on May 2 will be a place where people are gathering to focus on the technology and progress will be made at IIW following.

Media, Trust and the Freedom to Comment:

Issues surfacing around the release of Facebook Comments and the “protection” they in theory give against trolls – articulated here on TechCrunch.

Facebook Comments homes in on trolling by forcing real identity, but the end result isn’t just the silencing of trolls, it’s the silencing of everyone.

I have been surprised by the number of projects surfacing about how individuals share and connect information about media.  Bill Densmore has had a project called CircLabs for a while. Hypothes.is is a project that I just learned about that is in the research phase.
 

Personal Data – Legal and Technical Issues:

The buzz around various startups in the Personal Data Ecosystem is growing. Kynetx, Phil Windley’s company, has launched their new site for apps on the live web. This week TrustFabric put out Beta 3. Tara Hunt published an article about Personal Data on O’Reilly Radar.  Drummond & Joe are working on Connect.me. Azigo has new software out. Mydex has completed its community prototype in the UK. Personal.com has a site up but is not live yet. Statz.com has begun a board of trade for people’s data and lets them upload their data. Folks from the Locker Project will also be attending.
Last week was Personal Data 2.0 with many sessions about key issues – it was a great warmup for IIW and precursor for the same workshop a week after IIW in London the same day as a similar conversation at the European Identity Conference.  We are hosting Yukon Day, a day we are inviting investors to, on the third day of IIW.  There are many legal issues to be discussed around data and rights. Scott David wrote a post about why lawyers should come to IIW.

NSTIC: Making it Real

The National Strategy for Trusted Identities in Cyberspace is being announced today at the US Chamber of Commerce. I wrote about why we shouldn’t freak out about it after the program office was announced at Stanford. Government leaders working on actually implementing open standards for identity login at NIH and other agencies participated in our east coast satellite event last September in DC.  This coming IIW will be a great opportunity to make progress in the dialogue about the issues NSTIC raises and to get down to the nitty gritty of implementing.
 
 

IIW #12, Themes, Yukon Day, Digital Death to follow, OpenID Summit to preceed & Personal Data Warm Up in April

Kaliya Young · March 7, 2011 · Leave a Comment

Re-Posted from the IIW blog.

The Internet Identity Workshop #12 – 2011A
May 3 – 5, 2011
Computer History Museum, Mountain View, CA

[Read more…] about IIW #12, Themes, Yukon Day, Digital Death to follow, OpenID Summit to preceed & Personal Data Warm Up in April

ID Collaboration Day

Kaliya Young · January 24, 2011 · 3 Comments


I am really looking forward to ID Collaboration Day in San Francisco just before RSA.
Bringing together user-centric, enterprise and government identity initiatives.
Registration is live and you can see who is registered on the page.
We have an amazing group of people registered and a really diverse range of proposed topics.
AND we have this really cool poster!

Personal Data Ecosystem talk at Digital Privacy Forum, Jan 20th, 2011 in NYC

Kaliya Young · January 20, 2011 · 8 Comments

This is my talk presented to the Digital Privacy Forum produced by Media Bistro, January 20th, 2011 about Personal Data Ecosystem and the emerging consortium in the space.
Thanks for inviting me here to speak with you today.
The purpose of my talk is to share a new possibility for the future regarding users’ personal data that most have not yet explored. It sits between the two extremes of a familiar spectrum.
On one end, “Do not track” using technology and a legal mandate to prevent any data collection.
AND
On the other end, “Business as usual” leaving the door open for ever more “innovative” pervasive and intrusive data collection and cross referencing.
There is a third possibility that aligns with peoples’ privacy needs as well as offering enormous business opportunities.
A nascent but growing industry of personal data storage services is emerging.  These strive to allow individuals to collect their own personal data to manage it and then give permissioned access to their digital footprint to the business and services they choose—businesses they trust to provide better customization, more relevant search results, and real value for the user from their data.
With other leading industry thinkers, I have come to believe that there is more money to be made in an ecosystem that allows users to determine which businesses have access to what data,and under what terms and conditions, than there is under present more diffused, scattershot, and unethical collection systems. Today I will articulate the broad outlines of this emerging “personal data ecosystem” and talk about developments in the industry.
Those of you who know me will find it unusual for me to have such a keen focus on making money on user data and emerging business models.
I am, after all, known as the “Identity Woman – Saving the World with User-Centric Identity”. Since first learning about issues around identity technologies online in 2003, I have been an end user advocate and industry catalyst.
[Read more…] about Personal Data Ecosystem talk at Digital Privacy Forum, Jan 20th, 2011 in NYC

Authored: National! Identity! Cyberspace! Why we shouldn’t freak out about NSTIC.

Kaliya Young · January 10, 2011 · 2 Comments

This is cross posted on my Fast Company Expert Blog with the same title.

I was very skeptical when I first learned government officials were poking around the identity community to learn from us and work with us.  Over the last two and a half years, I have witnessed dozens of dedicated government officials work with the various communities focused on digital identity to really make sure they get it right. Based on what I heard in the announcements Friday at Stanford by Secretary of Commerce Locke and White House Cybersecurity Coordinator  Howard Schmidt to put the Program Office in support of NSTIC (National Strategy for Trusted Identities in Cyberspace) within the Department of Commerce. I am optimistic about their efforts and frustrated by the lack of depth and insight displayed in the news cycle with headlines that focus on a few choice phrases to raise hackles about this initiative, like this from CBS News: Obama Eyeing Internet ID for Americans.
I was listening to the announcement with a knowledgeable ear, having spent the last seven years of my life focused on user-centric digital identity. Our main conference Internet Identity Workshop held every 6 months since the fall of 2005 has for a logo the identity dog: an allusion to the famous New Yorker cartoon On the internet, nobody knows you are a dog. To me, this symbolizes the two big threads of our work: 1) maintaining the freedom to be who you want to be on the internet AND 2) having the freedom and ability to share verified information about yourself when you do want to.  I believe the intentions of NSTIC align with both of these, and with other core threads of our communities’ efforts: to support identifiers portable from one site to another, to reduce the number of passwords people need, to prevent one centralized identity provider from being the default identity provider for the whole internet, to support verified anonymity (sharing claims about yourself that are verified and true but not giving away “who you are”),  support broader diffusion of strong authentication technologies (USB tokens, one-time passwords on cellphones, or smart cards), and mutual authentication, allowing users to see more closely that the site they are intending to do business with is actually that site.
Looking at use cases that government agencies need to solve is the best way to to understand why the government is working with the private sector to catalyze an “Identity Ecosystem”.
The National Institutes of Health is a massive granting institution handing out billions of dollars a year in funding.  In the process of doing so, it interacts with 100,000’s of people and does many of those interactions online.  Many of those people are based at institutions of higher learning.  These professors, researchers, post-docs and graduate students all have identifiers that are issued to them by the institutions  they are affiliated with.  NIH does not want to have the expense of checking their credentials, verifying their accuracy and enrolling them into its system of accounts, and issuing them an NIH identifier so they can access its systems. It wants to leverage the existing identity infrastructure, to just trust their existing institutional affiliation and let them into their systems.  In the United States, higher educational institutions have created a federation (a legal and technical framework) to accept credentials from other institutions. The NIH is partnering with the InCommon Federation to be able to accept, and with that acceptance to trust, identities from its member institutions and thus reduce the cost and expense of managing identities, instead focusing on its real work: helping improve the health of the nation through research.

The NIH also has a vast library of research and information it shares with the general public via the internet.  Government sites are prohibited from using cookie technology (putting a unique number in your browser cookie store to remember who you are) and this is a challenge because cookies are part of what helps make Web 2.o interactive experiences. So say that your mom just was diagnosed with breast cancer and you want to do a bunch of in-depth research on breast cancer treatment studies.  You go to the NIH and  do some research on it, but it really requires more then one sitting, so if you close your browser and come back tomorrow, they don’t have a way to help you get back to the place you were.

The NIH doesn’t want to use a cookie and doesn’t want to know who you are.  They would like to be helpful and support your being able to use their library over time, months and years, in a way that serves you, which means you don’t have to start from scratch each time you come to their website. It was fascinating to learn about the great lengths to which government officials were going to adopt existing standards and versions of those standards that didn’t link users of the same account across government websites (see my earlier post on Fast Company).  They proactively DID NOT want to know who users of their library were.

One more use case from the NIH involves verified identities from the public. The NIH wants to enroll patients in ongoing clinical trials. It needs to actually know something about these people – to have claims about them verified, what kind of cancer do they have, where are they being treated and by whom, where do they live, etc.  It wants to be able to accept claims issued by third parties about the people applying to be part of studies.  It does not want to be in the business of verifying all these facts, which would be very time consuming and expensive. It wants to leverage the existing identity infrastructures in the private sector that people interact with all the time in daily life, and accept claims issued by banks, data aggregators, utility companies, employers, hospitals etc.

These three different kinds of use cases are similar to others across different agencies, and those agencies have worked to coordinate efforts through ICAM which was founded in September 2008 (Identity, Credential and Access Management Subcommittee  of the Information Security & Identity Management Committee established by the Federal CIO Council).  They have made great efforts to work with existing ongoing efforts and work towards interoperability and adopting existing and emerging technical standards developed in established industry bodies.

Let’s continue exploring what an identity ecosystem that really works could mean. The IRS and the Social Security Administration would each like to be able to let each person it has an account for login and interact with it online. We as those account holders would like to do this – it would be more convenient for us – but we want to know that ONLY we can get access to our records, that that they won’t show our record to someone else.
So let’s think about how one might be able to solve this problem.
One option is that each agency that interacts with anywhere from thousands to millions of citizens issues their own access credentials to the population it serves. This is just a massively expensive proposition.  With citizens interacting with lots of agencies, they would need to manage and keep straight different IDs from different agencies.  This is untenable from a end-user perspective and very expensive for the agencies.

Another option is that the government issues one digital ID card to everyone ,and this one ID could be used at a bunch of different agencies that one might interact with. This is privacy-invasive and not a viable solution politically. No one I have ever talked to in government wants this.

So how to solve this challenge – how to let citizens login to government sites that contain sensitive personal information – whether it be tax records, student loan records, Department of Agriculture subsidies, or any other manner of government services, and be sure that it really is the person via an Identity Ecosystem.
Secretary Locke’s Remarks: The president’s goal is to enable an Identity Ecosystem where Internet users can use strong, interoperable credentials from public and private service providers to authenticate themselves online for various transactions.
What does a private sector service provider use case look like in this ecosystem?

When we open accounts, they are required to check our credentials and verify our identities under know-your-customer laws. People have bank accounts and use them for many years. They know something about us because of their persistent ongoing relationship with us: storing our money. Banks could, in this emerging identity ecosystem, issue their account holders digital identity credentials that would be accepted by the IRS to let them see their tax records.

The private sector, for its own purposes, does a lot to verify the identities of people, because it has to do transactions with them that include everything from opening a bank account, to loaning money for a house, to setting up a phone or cable line, to getting a mobile phone, to a background check before hiring.  All of these are potential issuers of identity credentials that might be accepted by government agencies if appropriate levels of assurance are met.


What does is a public service provider look like in this ecosystem?
The Federal Government does identity vetting and verification for its employees. Homeland Security Presidential Directive 12 (HSPD-12), Policy for a Common Identification Standard for Federal Employees and Contractors directs the implementation of a new standardized identity badge designed to enhance security, reduce identity fraud, and protect personal privacy.  To date, it has issued these cards to over 4 million employees and contractors.
These government employees should in this emerging ecosystem be able to use this government-issued credential if they need to verify their identities to commercial entities when they want to do business with in the private sector.

There is a wide diversity of use cases and needs to verify identity transactions in cyberspace across the public and private sectors. All those covering this emerging effort would do well to stop just reacting to the words “National”  “Identity” and “Cyberspace” being in the title of the strategy document but instead to actually talk to the the agencies to to understand real challenges they are working to address, along with the people in the private sector and civil society that have been consulted over many years and are advising the government on how to do this right.

I am optimistic that forthcoming National Strategy and Program Office for Trusted Identities in Cyberspace will help diverse identity ecosystem come into being one that reduce costs (for governments and the private sector) along with increasing trust and overall help to make the internet a better place.

[Read more…] about Authored: National! Identity! Cyberspace! Why we shouldn’t freak out about NSTIC.

ID Collaboration Day

Kaliya Young · December 29, 2010 · Leave a Comment

RSA is coming up in February and to celebrate Valentines Day Kantara and IIW/ID Commons are collaborating to put on a day of unconferencing to get work done across the user-centric, enterprise and government Identity efforts.
Because of the nature of the Monday of RSA with morning and afternoon activities – we are offering Morning and Afternoon tickets ad will make the agenda following lunch for the afternoon.
You can see the topics proposed so far here on the IIW wiki.
Here is the Announcement on the IIW Site

The Emerging Personal Data Ecosystem

Kaliya Young · October 25, 2010 · Leave a Comment

This week I am heading to Telco 2.0 because the conversations with telco’s about how they participate in the Personal Data Ecosystem are moving forward in interesting ways.   IIW #10 had several long sessions about the topic. IIW-East was full with each of the 8  time slots having a session about different aspects and IIW-Europe October 11th coincided with the announcement of the first community prototype personal data stores by MyDex.
Learning from one of the mistakes of the past – market confusion inhibiting understanding and adoption of user centric identity technologies. The Personal Data Ecosystem is going to be a “front door” for those seeking to understand the ecosystem overall with a simple message and clear picture of what is happening. It will also connect people to the community working on the aspect of the ecosystem relevant to them. Our focus is on developing the  core communities needed for success and fostring communication amongst them.  These communities include  end users, large personal data service providers, companies providing data to personal data services, developers and startups leveraging this new ecosystem, regulators and advocacy groups along with the legal community and their efforts to create the legal frameworks needed to really protect people.
We arleady have a number of projects working on key aspects around the ecosystem and we will support their success linking them together – Project VRM, ID-Legal, Project Nori, Higgins-Project, Project Danube, XDI.org and IIW (they are linked at the bottom of the Personal Data Ecosystem site),   This is a big tent ANY OTHER projects that are related are welcome.  We don’t need another dot org to link efforts togethers so PDE is going to be chartered as part of IC3 (Identity Commons).
Right now the Personal Data Ecosystem site is aggregating content from blogs of those covering and building in the space.   This week we will be doing our first Podcast covering this emerging industry – Aldo Casteneda who you may remember from The Story of Digital Identity will be hosting it with me.
Next week we will be able to collect links submitted via delicious for the blog. I am working with the fabulous Sarah Dopp on website strategy and online community development and Van Riper is working with me on community management.
IIW coming up in a week is going to be a core community gathering for emerging developments.

IIW #11 in a Week

Kaliya Young · October 25, 2010 · Leave a Comment

IIW begins in a week on Tuesday November 2nd. Election Day in the US (if you can vote we want you to remember to do that before leaving for IIW)
We are really excited about all the attendee’s who are registered so far. The list is diverse and interesting and includes, independents, startups, students and people from big companies. I encourage you to browse it at on the bottom of our registration page
We have one day tickets now available and regular registration ends Thursday at midnight. “IIW-Nov” is a discount code for 10% off that.
The emerging themes we have identified are reflected in the topics proposed on our wiki

  • User-Centric Identity applied (OpenID, OAuth, XRD, SAML, InfoCard, Activity Streams, etc.)
  • Personal Data Ecosystem
  • Federated Social Web
  • Vendor Relationship Management
  • Active Clients (tools in the browser and other clients)
  • Identity in the Cloud

We have Demo slots available for Wednesday after lunch.
There is more room for your project to share please let me know (kaliya[at]mac.com) if you are interested in doing so. I need a name, link and 280 character description by Friday October 30th.  There are about 10 requests via registration.  Here is where the description will be posted once submitted.
Schedule
Tuesday doors will open at 8AM for registration. Phil Windley will give the opening talk at 9am and we will begin agenda creation by 9:30. We will have 5 sessions per day. Dinner on Tuesday and Wednesday will be hosted and at local restaurants. You can find the schedule online. If you are wondering about how the unconference works please read this post on Kaliya’s unconference blog.
I pulled these from the topics wiki
Critical Topics to discuss with peers:
* I fear that Facebook Connect and Twitter Connect are the new AOL
* current and future business cases
* Need for web agent (browser) externsions. psuedonym, NSTC
* Understanding what has stabilized about protocols so we can standardize our partners on them
* Open Identity Trust Framework
* Future of authentication from a user perspective.
* What are the components of a personal data ecosystem? What rights and protections do we need to articulate in law and enforce through social norms?
* Best applications and issues for combining social information
* how do we want to represent identity in the OS/browser
* “all sorts of “”real world users”” issues and questions”
* How to make this stuff invisible
* “what are all stakeholder identity needs; what system “”metrics”” would help them”
* how/if their ideas apply when a domain name or IP address is the only identifier
* Where do we go from here?
* “How do we start the path to laws that give power to people over “”their data””
* What’s on the horizon, how are people bridging consumer & enterprise identity protocols, how does OAuth change things, what about Info Cards, etc., etc.
* zero password initiatives
* adoption of OpenID and OIX Trust Frameworks
* Personal data store interop
* “Multiple “”Identities”” and the requirement to be conscious of them”
* Full session life-cycle management
* UMA / Personal Datastore
* how to make this all user comprehensible
http://iiw.idcommons.net/Proposed_Topics_IIW11

IIW-East Introduction

Kaliya Young · September 9, 2010 · Leave a Comment

This was the presentation I shared for the opening of IIW-East it covers an overview of the history of the community and where we are going next. Mary Ruddy’s presentation on Open Identity for Open Government followed this.

IIW-East Introduction to Identity Community

View more presentations from Kaliya Hamlin.

Mary Ruddy presented about Open Identity for Open Government.

Iiw east openidentityforopengovfinal

View more presentations from MaryIIW.

IIW-East opens Thursday

Kaliya Young · September 8, 2010 · Leave a Comment

Phil and myself just got back from our walk through at the Josaphine Butler Parks Center where IIW-East opens tomorrow.  He shot some photos of it (outside) (inside)
We are doing our first Internet Identity Workshop outside of the Bay Area and our first with a theme – Open Identity for Open Governmnet.
We have over 75 people attending from around the world – you can see the names at the bottom of the registration page.
The proposed topics shared so far as attendees register can be seen here on the wiki. They are amazingly diverse and center around key issues about policy, standards, legal frameworks and the path forward for those who care about creating an identity layer/infrastructure/platform that really works for people.
The actual agenda will be created tomorrow morning at 10 am following an introductory talk by Kaliya Young Hamlin and Mary Rudy at 9am.  We will make the agenda for Friday at 9am that day.
Personally I am passionate about the conversations that will be happening about personal data stores and their evolution.

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 5
  • Go to Next Page »

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact