IIW 39 Proposed Topics
From IIW
Register here for IIW 39: https://iiw39.eventbrite.com
These possible Session Topics have been put forth by individuals who have registered to attend IIW 39
What topics are you planning to present about or lead a discussion about at this IIW?
- Verifiable Credentials with identity assurance claim schemas
- KERI
- Issuance and verification of verifiable credentials Web/cloud wallets UX related to all the new VC-stuff
- Data analytics
- service user (aka workloads, technical users etc) ICAM topics (e.g. towards device-IAL, service-user-IAL&AAL), Organizational Identities, Attestation/notary services, advanced authorization, SSI topics, * ICAM in (I)OT use cases...
- Digital Credentials Protocols
- My KERI training course
- vLEI
- transaction tokens
- TBD
- federated authentication and web browsers; career development; SPICE
- Externalized Authorization and the OID AuthZEN WG
- Decentralized Web Nodes, LER and Educational Credentials, Federated Learning for AI, Homomorphic Encryption
- Augmented Call Authentication Using Organizational Identity Verifiable Credentials
- DIDs
- Technologies and governance rules about selective disclosure and related frameworks
- Work on our LInkedClaims project and possibly it's follow on work the Resume Author. The first is a web-based Verifiable Credential self-asserted credential authoring tool, with a companion *Recommendation VC that can be bound to the former by a hashlink. The Resume Author builds an traditional resume from a compound VC with a hashlinked Narrative Credential that guides a reader through a *story arc telling why someone is applying for whatever it is, and uses hashlinks from the text to either credentials or elements in credentials in the resume.
- Verifiable credential trust frameworks in research and education
- Introduction to Trust Over IP
- Establishing trust in digital ecosystem
- Decentralized semantics
- AI and Identity - Current and future trends
- Integration of SSI to standard IT security protocols (Kerberos and EAP)
- SSI with Identus (formally known as Atala PRISM)
- Authorization policy languages, ideally in plain english
- User Experience for SSI/KERI
- Master patient indexes.
- OAuth, OpenID Connect, FedCM
- Oauth Flows (SPAs?), Authorization implementation difficulties, Migration Woes, Abstraction Layers and Standards
- usability, accessibility, inclusion, interoperability, privacy
- Digital Travel Profile (example of consumer personal data for consumer transactions)
- Data Provenance (including compare contrast of C2PA vs. ACDC)
- Data Transparency and minimal/appropriate sensitive data requests are in the interest of Verifiers, a solution to complex consumer consent requests."
- Update on C2PA / CAWG identity work
- pseudonymous, verifiable, and decentralized social network based on verifiable credentials
- Verifiable credentials, blockchain, ai, authentication, private key recovery, and account recovery.
- OpenID4VC, SD-JWT VC, EUDIW
- governance of identity systems and interop
- Externalized Authorization AuthZEN Topaz
- Fine grained and just-in-time authorization.
- Open source components for digital wallets
- Data transfer
- Finding the balance between security and usability to achieve market adoption
- OpenID Federation
- Consent as verifiable credential
- Standards for a self-sovereign (medical) AI assistant.
- Human rights-centric design for digital ID implementations
What are you hoping to learn about or hear a presentation about at IIW?
- SSI, mDL adoption
- service user (aka workloads, technical users etc) ICAM topics, OrgIds, Attestation/notary services, advanced authorization (reincarnations of ABAC standards, pushing CEDAR to the next level), SSI topics, *ICAM in (I)OT use cases
- Dave Grantham's Cryptid work, CESR 2.0, eIDAS 2.0, digital identity regulations, privacy regulations, DIDComm 2.0, ToIP TSP and DIDComm integration, goConfirm, Cardano Identity Wallet
- secure organizational identity
- new developments in zero standing privilege, identity in microservices, CAEP and SSF, and authorization
- whether wallets understand they have a federation problem
- The intersection of identity, authorization and governance.
- OpenID Connect for VC developments
- Latest in OPenbadges and VCs
- Decentalized Web Nodes and othr DIF Projects
- Enjoy the comraderie of the most welcoming community in the internet
- Digital Identity for physical products/things
- Applications & Procedures for Government, Civil, & Commercial Issuers of Verifiable Credentials
- Zero-Knowledge Proofs
- Governance and standardization process of digital identities and digital identity wallet
- More about meronymous methods to selectively disclose chosen attributes of an individual and leverage trusted endorsers. Anything about selective disclosure would be attractive. Also interested in the use of verifiable credentials in particular kinds of money transfers.
- OpenID4VCI, OpenID4VCP OpenID Federation, etc.
- Trust registries
- Trust
- Everything regarding IAM innovations
- SSI
- Verifiable Credential Standards news
- Interoperable permissions for all your information
- I love hearing Sam's talks! Mostly just trying to understand the latest in SSI.
- Health identity strategies for state.
- New Standards, proofs of concepts for advanced implementations, interoperability, ease of use
- Digital Identity
- ID wallet ecosystem, interoperability, use cases, business models, privacy
- Roads to interop on VCs, DIDs, ....
- Trust registry, protocol and interop (goes w VCs)"
- Latest in credential aggregation and ecosystems
- content authenticity with VC/VP
- Verifiable Credentials, FIDO, FedCM
- New insights on digital identity.
- Connections between OAuth2 / RAR / GNAP ecosystem and AuthZEN
- How to seamlessly layer authorization on top of the existing / evolving authentication standards, implementations, ideas.
- Cutting edge discussions in emerging standards for digital wallets
- Many things
- How can we align on one approach instead of this standard battles Wallet ecosystems Cryptography"
- State of adoption and evolution of verifiable credentials.
- Practical access to digital identity in the wild.
- Discussions around federations and upcoming standards
- how VCs can relate to R&E federations
- Minimalist technologies for digital ID
What are the critical questions about user-centric identity and data you hope to discuss with peers at IIW?
- standardization of IAM topics in beyond human use cases (e.g. IAL and AAL pendants for service users
- Key management solutions, threshold recovery services, user experience, product ideas.
- How future architectures could be constructed in truly zero trust way across the application stack.
- How can we protect the sanctity of your health data including wearables in the age of AI.
- How can people be given agency to their employment credentials"
- Is there a market survey for applications and products providing or using Self-Sovereign Identity (SSI)?
- What alternative frameworks, if any, are there to DID “methods”?
- Which standards organizations and working groups are the most engaged in developing user-centric identity?
- What is the “killer app” for user-centric identity?
- How to realize ways to utilize personal information for personalized services without infringement on privacy
- The use cases for retaining identity privacy but allowing issuers to track the verification of their credentials by relying parties without disclosing the holder.
- Trust stuff
- How to manage streaming data that cannot have content addressable identifiers in a decentralized ecosystem.
- Continous authorization models in the cloud native era
- DWN, latest standards, EU wallet adoption
- How will AuthZ become as standardized as AuthN?
- I'd like to see any new design patterns, and any new design challenges in the space as well.
- Why should I case about distributed identities (or SSI!) when it's still going to be controlled by someone or some organization or government?
- What is the promised land of AI in IAM? Are we still waiting for it? or is it here today to be seized?"
- Future or Identity, Identity Fabric, AI Agents and more
- usability over the whole lifecycle vs privacy / security
- How to make sense of the overwhelming plethora of identity standards that are out there
- How do we make digital identity more self-sovereign.
- How do we get a critical mass of relying parties to externalize authorization?
- What are the steps, measures, standards required to control and prevent the undesired data exposure (data leaks, sharing of data, data fakes, etc.)
- Bottom-up approach
- Interoperability
- Practical applications of verifiable credentials.
- My Personal AI is a delegate of me and you need to respect that.
- Discussions around federations and upcoming standards
- how VCs can relate to R&E federations
- How do we create technology that allows and supports a right to identity that includes the right to anonymity and can exist in that spectrum, adapted to different use-case scenarios?