IIW 37 Proposed Topics
From IIW
Register here for IIW 37: https://iiw37.eventbrite.com
These possible Session Topics have been put forth by individuals who have registered to attend IIW 37
What topics are you planning to present about or lead a discussion about at this IIW?
- Explore complexity regarding the shaping of digital identity (presence) and our Human Operating System aka HumanOS aka Human Nature. This relationship with connected systems is foundational to assuring respectful and non-game space paths to people accomplishing their intention on the digital landscape.
- KERI, ACDC, Signify, vLEI
- KERI, ACDC, GLEIF
- KERI ACDC etc
- OAuth, OpenID Connect
- Cryptographic authentication
- KERI/ACDC/vLEI
- Log in with KERI and ACDC
- definition and towards standardization of non-human user identity and authenticator assurance levels, advanmced authorization topics, ID proofing, IAM in general
- Cloud-native authorization (OPA, Zanzibar, Topaz) Interoperable protocols for authorization
- Authorization
- Distributed credentials originating from an affinity group
- identity
- SSI and Authorisation
- Identity, authentication, anonymity; Pseudonymous identity and recovery in an uncaring world. How underrepresented and minority communities are adversely impacted by so called "Real Names" polices, and technical methods to remediate some of the harms caused by these problems, while still allowing for social accountability and trust.
- Governance, Privacy, Issuers, Trust Registries
- The UX patterns of user-centric identity for the future of the web
- Credential exchange protocols comparison, interoperability work, trust registries
- Credentials for education; VC use case in Loyalty
- Humanity Verification , Group Tech, and DIsintermediation of Platforms
- Verifiable Credentials
- Governance challenges and opportunities in user-centric identity.
- The Mesh, the Universal Name System (UNS), how to leverage Confidential Computing to automate decentralized cryptography in a globally attested and verified way to provide global assurance of data provenance, integrity, confidentiality and privacy for people and things.
- Social Recovery
- Organizational Identity, verifiable credentials, key management, KERI, business cases, SSI adoption
- permissions war stories, standardizing authorization, translating between authorization languages, Cedar, Cedar demo
- DIDs and DID methods
- Customer use case
- Verifiable credentials with zero-knowledge proof
- Verifiable credentials
- euCONSENT Interoperable face-to-face digital identity validation"
- Using KERI in Healthcare to Solve Health Data Fraud
- Scaling impact with low-code and open source. Our Farmworker WalletOS project proposes a unique approach to building enterprise-grade digital wallets powered by open-source digital trust software with a low-code app platform. The wallet engine project proposal is currently under review at the Open Wallet Foundation.
- Revocation Mechanisms - European Digital Identity Wallet (?)
- Privacy Enhancing Mobile Credentials
- KERI 101
- Decentralized Identity, a response to KOPA-style laws
- Verifiable Credentials/Presentation Selective Disclosure
- Government Identity, privacy-protecting verifiable credentials, DIDComm/Trusted Messaging Channel
- Introduction to KERI
- TBD hadn't thought about it, but possibly wallets, usability, self custody, trust networks
- User experience design as it relates to the SSI wallet experience.
- Flexible - doing work with zero trust and pbac, which are important consumers of identity.
What are you hoping to learn about or hear a presentation about at IIW?
- The systems and tools being developed regarding the shaping of digital identity (presence) and our Human Operating System (HumanOS) aka human nature.
- JWTs, mDL
- Identity solutions impact
- ISO/IEC 18018-7 and theSS forthcoming ISO/IEC23220 series of standards
- Real world identity solutions
- How people are using digital identity for access control.
- DID, GovId, Biometric ID, IDs in fraud prevention
- expert exchange on modern IAM challenges, solution patterns and lessons learned. Finde like minded to drive standardization of non-human user identity and authenticator assurance levels
- Just getting to know everyone and learning about any SSI topic as I am pretty new to this world.
- How to finally solve authorization
- Authorization
- ACDC tools & services
- identity
- SSI and Authorisation
- Other people working on non-federated an corporate controlled methods of identity and access management that exist outside of walled gardens that cater to surveillance capitalism.
- Access Management in a DiD world: migration, provisioning, deprovisioning of access rights in a user-friendly way.
- Everything
- Real usage of identity specs like DID, VC, etc. Realistic discussions of the pros/cons, dangers, pitfalls, and risks.
- Anonymous credentials; educational credentials
- I'm already in the mix.
- Deployment stories for Verifiable Credentials
- Looking to discuss partner with folks on solving personal agency and global trust, confidentiality and privacy.
- Innovation in digital identity, biggest challenges and potential solutions
- Verifiable credentials
- all things authorization
- AI and identity/privacy
- Trying to understand where the industry is going from a standards/protocols point of view.
- How can we trust issuers and verifiers in the field of decentralized identity
- mDL GDPR impact on mDL Open Wallet Foundation eIDAS 2.0
- Adoption vectors for DID/SSI solutions across multiple industries
- DIDComm, Trust Spanning Layer, Trust Registries. I’m also looking forward to hearing more about the US/DHS adoption roadmap for W3C VC and W3C DID enabled public service solutions.
- Progress on KERI
- verifiable credentials, new standards
- Greatest, latest, best
- OAuth for Native first party apps
- Status of standardization at IETF, W3C
- OpenID4VC/VP, European credential standards and legislation
- I'd like to learn about KERI, OpenID Connect, what is going on in the various standards bodies, as well as any sessions on the Open Wallet Foundation and various governmental policy bodies.
- Government Identity, privacy-protecting verifiable credentials, DIDComm/Trusted Messaging Channel
- How people are solving usability, education, and getting real world use cases off the ground
- User research and product design rationale for SSI wallet development.
- All things identity really - esp interested in the continued development of user-centric identity, application of identity to security
- Updates on DID in Europe and stories of adoption
- Biometrics in and around authentication and verifiable credentials.
- How we can help folks migrate off resource owner password flow.
- Privacy and Identity
- Self sovereign identity interoperability. Verifiable claims.
- Decentralized Identity, Identity Verification, Identity Fraud
- Computer over data, DIDComm, vLE. Second Generation VC.
- How the protocols around various government ids are resolving
- How people are thinking about incorporating VCs or other digital ids provided by a wallet into existing IAM lifecycle
- Answering the privacy challenges for government ids presented by the ACLU
- Better understanding of the linkage between local user authentication and VCs and anchoring VCs to a wallet identity"
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
- Leveraging our human intellect to assure our intention is achievable on the digital landscape.
- Nuanced, hierarchical, real world identity solutions
- Verifiable credentials, self-sovereign identity, FIDO credentials, fusion credentials
- Nuanced and hierarchical identity and key management
- Interoperability with decentralized identity systems, smart contract bridges to payment channels, and settling payments on payment channels connected to decentralized identities.
- Adoption of new types of secure in user friendly digital IDs
- Amenability of US healthcare to blockchain-enabled SSI
- How do we really apply the principle of least privilege to our applications
- Identity?
- How are we going to bridge the divide between corporate and personal identity. In theory, your corporate ID will be anchored to your personal ID as the means of verifying you during onboarding. But many schemes (like Android Workspaces) draw an inpenetrable barrier between the two. It seems that a new paradigm will be needed to make this work in a way that users will actuall want to use.
- How to turn the concepts into a SPAC experience that is seamless for all Parties
- How might we make the UX of user-centric identity so good your grandma could do it? What are the biggest risks and blockers that user-centric identity is facing?
- Selective presentation; identity binding
- WHat are the identity centric apps that will give traction to self- sovereign approaches either short or long term?
- Standards convergence
- Privacy and cooperative solutions to identity challenges.
- What is the true purpose of digital "identity"? User-centric identity is a means to personal digital agency and freedom, which means that we must solve personal cybersecurity first. Automated decentralized key management is a critical enabler for mainstream people.
- What is the biggest barrier to broader adoption of user-centric identity models. (2) What is the most exciting innovation you've seen in the last 12- months.
- Business cases, adoption
- Is it only about user-centric. What about enterprise-centric?
- How can we incentivize potential issuers to issue more and more privacy-preserving credentials
- Roadmap Commercial models
- What are possible exploits of the SSI/DID infrastructures to be aware of and how to solve those problems.
- UX/Consent/Biometric binding/Information sharing/Communications (DIDComm case studies)
- What does a user beneficial identity ecosystem look like
- Why is the adoption so slow? Is it possible to pursue user-centric identity without involving the Government?
- How does personally owned hardware and infrastructure play into identity, vs corporate
- Bottom-up, individual-centric SSI adoption.
- Should we promote both DID and VC or VC only?
- Where do we go from here and what opportunities will exist in the future?
- Usability, what are initial use cases, how to preserve privacy while building a technology that could be abused.
- How do we create a user-centric experience when building SSI technology.
- Assurance of privacy, identity validation networks (human, non-human, etc), gaining insight from identity analytics, understanding developments in identity law and policy.
- Biometrics, both local and centralized to manage contextual reputation.
- Privacy and Fraud.
- Onboarding and interoperability in the user-centric identity space.
- How can we merge Machine Learning and Privacy.
- User experiences in ID verification flows with a wallet
- How OS and Browser providers are thinking about those user experiences
- Wallet selection user experience
- Portability with ID wallets"