Looks like this event has already ended.
Check out upcoming events by this organizer, or organize your very own event.
Internet Identity Workshop XIII #13 - 2011B
Tuesday, October 18, 2011 at 8:00 AM - Thursday, October 20, 2011 at 5:00 PM (PDT)
Mountain View, CA
The Internet Identity Workshop #13 - 2011B
October 18,19 & 20, 2011
Computer History Museum
Mountain View, CA
The agenda will be created live each day by attendees present at the opening of the day. Doors will open at 8:00 each day with espresso and light breakfast.
Tuesday Day 1 will begin at 9:00AM with introduction/orientation followed by Agenda Creation. There will be 5 working sessions
Wednesday Day 2 NSTIC Day will have agenda creation beginning at 9:00AM. There will be 5 working sessions and a demo hour after lunch.
Thursday Day 3 YUKON Day Will begin at 8:45AM with a brief introduction followed by agenda setting. There will be 5 working sessions and we will end by 4pm.
The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. We also work on trying to address social and legal issues that arise with these new tools. This conference we are going to also focus some attention on business models that can make this ecology of web services thrive.
Today it goes beyond “just” identity to be inclusive of:
- Open Standards that have been born and developed at IIW - OpenID, OAuth, Activity Streams, Portable Contacts, Salmon Protocol, SCIM, UMA, and more
- The Federated Social Web (peer to peer following)
- Vendor Relationship Management
- Personal Data Services - collection, storage and value generation
- Anonymity, Pseudonymity and Reputation Online (think google+ controversy)
- Legal Innovation including, Information Sharing Agreements, Data Ownership Agreements for and the development of “trust” frameworks across the ecosystem.
- NSTIC - the National Strategy for Trusted Identities in Cyberspace (it uses the term “user-centric identity” 4 times & “citizen-centric identity” once)
- Cloud Identity and the intersection of enterprise ID and people (consumer) ID.
Special Day's at this IIW!
Wednesday is NSTIC Day: This simply means that if you are super keen on talking about NSTIC topics and technologies and you only have one day to attend then come Wednesday. NSTIC will be covered on all days of the conference and other things will be discussed this day too.
Thursday is Yukon Day: One of the longtime themes of IIW is how identity and personal data intersect. Many important discussions about Vendor Relationship Management (VRM) have also taken place at IIW. In recognition of how personal data and identity are intertwined, the third day of the IIW, will be designated "IIW + Yukon" and will stress the emerging personal data economy. The primary theme will be personal data control and leverage, where the individual controls and drives the use of their own data, and data about them held by other parties.
This isn't social. It's personal. This day you can expext open-space style discussions of personal data stores (PDS), PDS ecosystems, and VRM. One purpose of Yukon is to start to focus on business models and value propositions, so we will specifically be reaching out to angels and VC's who are intersted in personal data economy plays and inviting them to attend.
IIW is the place where everyone from a diverse range of projects doing the real work of making this vision happen gathers and works intensively for three days. It is the best place to meet and participate with all the key people and projects! As a community we have been exploring these kinds of questions:
- How are social networking sites and social media tools applying user-centric identity?
- What are the open standards to make it work? (identity and semantic)
- What are technical implementations of those standards?
- How do different standards and technical implementations interoperate?
- What are the new social norms and legal constructs needed to make it work?
- What tools are needed to make it usably secure for end-users?
- What are the businesses cases / models that drive all this?
How does it work?
After the brief introduction on the first day there are no formal presentations, no keynotes, no panels. We make the schedule when we are face to face the first day of the conference. We do this in part because the field is moving so rapidly that we your organizing team are in no position to know what needs to be talked about. We do know great people who will be there and it is the attendees who have a passion to learn and contribute to the event that will make it.
As people register we are collecting Proposed Topics on our wiki - the list is beginning...
The Hotel Avante has given IIW a special rate and offers free shuttle service to the Computer History Museum where IIW is held.