Looks like this event has already ended.
Check out upcoming events by this organizer, or organize your very own event.
Internet Identity Workshop #8 - 2009A
Monday, May 18, 2009 at 9:30 AM - Wednesday, May 20, 2009 at 3:00 PM (PDT)
Mountain View, CA
The Interent Identity Worskhop #8 - 2009A
Early Bird Rates are in effect until April 1st. This is a $50 discount for independents and a $75 discount for regular tickets from last year’s price.
We need to get 75 people registered by April 1 to make a final confirmation for our conference space at the Computer History Museum. All those who book early will get a special thanks.
The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. We also work on trying to address social and legal issues that arise with these new tools. This conference we are going to also focus some attention on what they business models are that can make this ecology of web services thrive.
This is where everyone from a diverse range of projects doing the
real-work of making this vision happen gather and work intensively for
three days. It is the best place to meet and participate with all the
key people and projects. Here is a list of project & standards represented.
Providing identity services between people, websites, and organizations that don’t necessarily have a formalized relationship is a different problem than providing authentication and authorization services within one or a few organizations (enterprise provisioning/termination or federation between 2 companies).
As a community we have been exploring these kinds of questions:
- How are social networking sites and social media tools applying user-centric identity?
- What are the open standards to make it work? (identity and semantic)
- What are technical implementations of those standards?
- How do different standards and technical implementations interoperate?
- What are the new social norms and legal constructs needed to make it work?
- What tools are needed to make it usably secure for end-users?
- What are the businesses cases / models that drive all this?
How does it work?
After the brief introduction on the first day there are no formal presentations, no keynotes, no panels. We make the schedule when we are face to face the first day of the conference. We do this in part because the field is moving so rapidly that we your organizing team are in no position to know what needs to be talked about. We do know great people who will be there and it is the attendees who have a passion to learn and contribute to the event that will make it.
We have a listing of proposed topics generated as participants register. You can see the notes from prior conferences linked from here. At the last IIW we collected notes for 90% of the sessions and complied them in a book.
The schedule for this IIW is here. It includes an opening presentation on Monday morning from 9:30-12:30 followed by agenda creation for the rest of Monday’s schedule. Tuesday agenda creation begins at 8:30 and the afternoon will include a time for demonstrations of technology. Wednesday begins at 8:30 and closes by 3:00 - please book your flights after this time. Both Monday and Tuesday have hosted dinners in Downtown Mountain View that are part of the conference.