|May 1, 2012||to||May 3, 2012|
Founded in 2005 IIW is focused on user-centric digital identity.
The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. We also work on trying to address social and legal issues that arise with these new tools. This conference we are going to also focus some attention on business models that can make this ecology of web services thrive.
Today it goes beyond “just” identity to be inclusive of
- Open Standards that have been born and developed at IIW – OpenID, OAuth, Activity Streams, Portable Contacts, Salmon Protocol, SCIM, UMA ….
- The Federated Social Web
- Vendor Relationship Management
- Personal Data Services - collection, storage and value generation
- Anonymity Pseudonymity and Reputation Online (think google+ controversy)
- Legal Innovation including, Information Sharing Agreements, Data Ownership Agreements and the development of “trust” frameworks.
- NSTIC – the National Strategy for Trusted Identities in Cyberspace (it uses the term “user-centric identity” 4 times & “citizen-centric identity” once)
- Cloud Identity and the intersection of enterprise ID and people (consumer) ID.
IIW is the place where everyone from a diverse range of projects doing the real work of making this vision happen gathers and works intensively for three days. It is the best place to meet and participate with all the key people and projects! As a community we have been exploring these kinds of questions:
- How are social networking sites and social media tools applying user-centric identity?
- What are the open standards to make it work? (identity and semantic)
- What are technical implementations of those standards?
- How do different standards and technical implementations interoperate?
- What are the new social norms and legal constructs needed to make it work?
- What tools are needed to make it usably secure for end-users?
- What are the businesses cases / models that drive all this?
Tuesday Day 1 will begin at 9:00AM with introduction/orientation followed by Agenda Creation. There will be 5 working sessions
Wednesday Day 2 NSTIC Day will have agenda creation beginning at 9:00AM. There will be 5 working sessions and a demo hour after lunch.
Thursday Day 3 YUKON Day Will begin at 8:45AM with a brief introduction followed by agenda setting. There will be 5 working sessions and we will end by 4pm.
Special Day’s at this IIW!
Wednesday is NSTIC Day: This simply means that if you are super keen on talking about NSTIC topics and technologies and you only have one day to attend then come Wednesday. NSTIC will be covered on all days of the conference and other things will be discussed this day too.
Join the Data Portability conversation at IIW and help make a difference.
Each day of the conference, a variety of sessions will include aspects of Data Portability and how it relates to identity, privacy, and individual rights. This will culminate on Thursday with a live forum, including the Chairman of the DataPortability Project and other board members and industry leaders, to bring it all together and set the agenda for the next steps. So please join us and let your voice be heard.
Thursday is Yukon Day: One of the longtime themes of IIW is how identity and personal data intersect. Many important discussions about Vendor Relationship Management (VRM)
have also taken place at IIW. In recognition of how personal data and identity are intertwined, the third day of the IIW, will be designated “IIW + Yukon” and will stress the emerging personal data economy. The primary theme will be personal data control and leverage, where the individual controls and drives the use of their own data, and data about them held by other parties.
This isn’t social. It’s personal. This day you can expext open-space style discuss ions of personal data stores (PDS), PDS ecosystems, and VRM. One purpose of Yukon is to start to focus on business models and value propositions, so we will specifically be reaching out to angels and VC’s who are interested in personal data economy plays and inviting them to attend.
How does it work?
After the brief introduction on the first day there are no formal presentations, no keynotes, no panels. We make the schedule when we are face to face the first day of the conference. We do this in part because the field is moving so rapidly that we your organizing team are in no position to know what needs to be talked about. We do know great people who will be there and it is the attendees who have a passion to learn and contribute to the event that will make it.
The event compiles a book of proceedings with the notes that are gathered from the conference. You can find the Book of Proceedings for IIW7, IIW8, IIW9, IIW10, Satellite IIW Europe & DC-East Coast, IIW11, IIW12 here. BTW these documents are your key to convincing your employer that this event will be valuable. As attendees register we ask about topics they wish to discuss – they are posted here on our wiki.