龙八8国际

          
          

                    Posts with keyword: iiw


                    Self-Sovereign Identity at IIW: We Have Liftoff

                    Last week was the 28th semi-annual Internet Identity Workshop (IIW). There were 129 session conducted by people from all over the world and about many different aspects of identity. There were technical discussions, standards works, policy debates, and lots of demonstrations. I'll post a link to the Book of Proceedings when it's available so you can read about them yourself.1 One thing that stood out to me is the impact self-sovereign identity is having. There were several dozen sessions on SSI. I was excited to see seven different implementations of Indy Agents that were working together and combined to
                    Continue reading...


                    Identity, Sovrin, and the Internet of Things

                    Building the Internet of Things securely requires that we look to non-hierarchical models for managing trust. Sovrin provides a Web of Trust model for securing the Internet of Things that increases security and availability while giving device owners more control.
                    Continue reading...


                    Regaining Control of Our Data with User-Managed Access

                    User-managed access is real and promises to change how we control our personal data. This article describes one of the problems that UMA solves and shows what that's good for user control.
                    Continue reading...


                    Why is Blockchain Important

                    Yesterday at the IIW closing circle someone asked why blockchain matters. I gave an answer that felt right, so I figured I'd write it down.
                    Continue reading...


                    Sessions I Want to Hold at IIW

                    I'm going to hold a few sessions at IIW. Here's my list so far. And there's a homework assignment for the bureaucracy session.
                    Continue reading...


                    On Names and Heterarchy

                    Heterarchical (non-hierarchical) naming systems are vital if we are to avoid the pitfalls and dangers of surrendering our rights and our privacy to a tyranny of connected computers and devices that intermediate our lives at every level based on centralized authority. This post explores names and alternatives to names, including the use of bitcoin as a distributed directory that is immune from the problems that hierarchical solutions impose.
                    Continue reading...


                    Google Plus: On Trust, Reputation, Pseudonyms, and Value

                    Google made an architectural decision to require real names, rather than pseudonyms, on Google Plus. The result is a platform that encourages better reciprocal acts and thus creates more value, for users as well as Google, than one based on pseudonyms.
                    Continue reading...


                    Podcast: Kaliya Hamlin Interview Me on Personal Data Ecosystems

                    Kaliya interviewed me for her Personal Data Ecosystem podcast series. Here's her description? In this podcast Kaliya talks to Phil Windley who is the CTO and co-founder of Kynetx and co-founded and co-produces the Internet Identity Workshop with Kaliya & Doc Searls. He gives his perspective on the key differentiator between today's social networks and Personal Data Ecosystem the emergence of the personal data store where individuals control their own data. He also covers the event based architecture his company Kynetx is developing and refers to the project neck pain demo. In the podcast he mentions Twillio.
                    Continue reading...


                    Discovery: Webfinger and OpenID Connect

                    I'm sitting in a session on webfinger, OpenID Connect, and discovery session. Discovery is a the process of turning a small piece of information (like a user ID) into the URLs and APIs needed to service some specific request. For example, say I tell you my email address is windley@gmail.com, how do you find my profile? Of course, as long as we're talking about one site, like Google, we can just hard code that translation. But how can the discovery problem be generalized? That's the goal of Webfinger: WebFinger is about making email addresses more valuable, by letting people
                    Continue reading...


                    Essential Characteristics of a Personal Data Store

                    I'm in a session at IIW where personal data stores are being discussed. Drummond Reed and Paul Trevethick are moderating. Someone asked Paul why Facebook isn't a personal data store. Certainly is a store of personal data. Facebook has a rich and powerful mechanism for sharing data with apps. But... They can change the terms any time they like They monetize my data--who owns or controls the transactions Mary Hodder gave a "bank vs bar" analogy. Facebook is a bar, not a bank. There are lots of options and things to do, but no fiduciary responsibility or interoperability. The
                    Continue reading...


                    IIW XI Is Next Week

                    IIW begins in a week on Tuesday November 2nd. We are really excited about all the attendee's who are registered so far. The emerging themes we have identified are reflected in the topics proposed: Personal Data Ecosystem Federated Social Web User-Centric Identity applied (OpenID, OAuth, XRD, SAML, InfoCard, Activity Streams, etc.) Vendor Relationship Management Active Clients (tools in the browser and other clients) Identity in the Cloud It is not to late to register. If you want invite friends to IIW-Nov still you can give them this 10% discount code good for Regular that ends at Thursday at midnight:
                    Continue reading...


                    Kynetx DevDay After IIW on November 5

                    Kynetx will be hosting an Impact DevDay on November 5th at the Computer History Museum in Mountain View, CA. This is the Friday after Internet Identity Workshop XI at the same place. Impact DevDay is an all-day, intensive training designed for programmers interested in creating apps that are cross-platform, context-aware, cross-browser and event-driven using the Kynetx Rules Lanaguage (KRL). I've written extensively about KRL and some about why I believe event driven APIs are critical to the Web we all want to build. This is a chance to understand the platform we've built to support this vision and learn
                    Continue reading...


                    PDX Principles

                    There was a lot of discussion around Personal Data Stores (PDS) and Personal Data Lockers at IIW East. Every time slot on both days had at least one and sometimes two sessions on the subject. (As an aside, if you're not familiar with IIW, the agenda is created in real time, by the participants, not months in advance by a program committee, so it represents more fully the interests of the participants than a normal conference aganda might.) I'm confident that this will also be a major theme at the upcoming IIW in Mountain View CA in November. The
                    Continue reading...


                    Referencing and Encoding Metadata

                    We need data permissions to be as portable as the data itself. So too for all metadata. Over the course of IIW East, I had a revelation (for me) that there's real power in having metadata encoded in the same format as the data itself and, in a related way, allowing self-refernce so that the meta data can be referenced from the document it describes. I think I've always believed that, but hadn't really articulated it to myself until yesterday. Certainly, this idea isn't new. Just look at XML for the largest, recent example. Nearly everything about and XML
                    Continue reading...


                    Changes for IIW

                    There are a couple of changes coming to IIW, one pragmatic and one philosophical. First the pragmatic... Due to some scheduling snafus, the Computer History Museum is not available during the time we'd advertised for IIW XI (Nov 9-11). After much thought and discussion we've determined that the best course of action is to move it to another day rather than change the venue. CHM has many things to like and it's become the workshop's home. So, we're moving IIW XI to November 2-4. We realize the 2nd is election day and hope you'll vote early. We also realize
                    Continue reading...


                    Come to Internet Identity Workshop East Next Week

                    The East Coast edition of the Internet Identity Workshop (IIW) will happen next week on Thursday and Friday (Sept 9-10) at the Josaphine Butler Parks Center in Washington DC. The theme for this edition of IIW is Open Identity for Open Government. You can register online. Late registration fees kick in after Friday, so register now.
                    Continue reading...


                    IIW XI, IIW East, and IIW Europe

                    In addition to our traditional semi-annual meeting at the Computer History Museum on November 9-11, IIW is also holding events in Washington DC and London this fall. Unlike other identity conferences, IIW's focus is on the use of identity management approaches based on open standards that are privacy protecting. The IIW East (more info here) will be September 9-10 at the Josephine Butler Parks Center. I suspect that because of the location and discussion that's going on around identity in government circles that this event will have a distnctly different flavor and set of sessions than IIW has traditionally
                    Continue reading...


                    The Future of Internet Identity: Data Access and Modeling

                    In my previous blog post, wrapping up IIW X and discussing what wasn't discussed, I talked about what was missing at IIW: discussions about authentication. What was hot at IIW were discussions about authorization and personal data. OAuth, UMA, and PDX talks were happening in every corner this time and these topics (with data access and modeling as their unifying theme) will be a major area of focus as IIW continues. Back in the dark days of the Web, if you wanted access to data in your account in someone's system via an API, you had to pass along
                    Continue reading...


                    IIW Wrap-Up: Moving Past Login...Sort Of

                    The 10th iteration of the Internet Identity Workshop wrapped up yesterday in Mountain View, CA. Since Kaliya, Doc, and I started IIW in 2005, we've always wondered when (or if) there would be a "big bang" when internet identity just took off. If this IIW wasn't the big bang, it was certainly a great indication that we're headed toward one. There were about 240 people at IIW this time, 80 more than the highest past attendance. There were companies represented that you'd not think of as "early adopters" in internet identity. And the discussion has finally, mostly moved on
                    Continue reading...


                    Come to Digital Death Day

                    The day after IIW (that would be May 20th), Kaliya is running a workshop called Digital Death Day at the Computer History Museum. Death is a part of life but what does death of the physical self mean for the digital self? This is a conference focused on this question and others around "digital death". What does it mean for loved ones of the departed? What does it mean for professionals in end of life care and post mortem services? What does it mean for online tool and service providers? What does it mean for estate
                    Continue reading...


                    IIW Trending Topics: OpenID and IC Cooperation and Activity Streams

                    IIW IX, the 9th Semiannual Internet Identity Workshop is underway at the Computer History Museum in Mountain View. At each meeting, I'm usually surprised by the emergence of one or two topics and pleased to see continued moves toward even further consolidation and cooperation between mature identity protocols. There continues to be increased cooperation between OpenID and Information Cards. I've see demos of using Information Cards to store and apply OpenID from Microsoft and heard discussion around OpenID selectors and trust frameworks. I quipped that OpenID keeps adding features incrementally in a way that asoptotically approaches the design of
                    Continue reading...


                    IIW IX Is Coming Up! Register and Spread the Word

                    The Ninth Semianual Internet Identity Workshop (IIW IX) is coming up in about 9 weeks: November 3-5 (Tuesday to Thursday) in Mountain View California at the Computer History Museum. It's time to register and to help us spread the word about the event. We are excited about all the developments in the industry with protocol evolution in the social web space AND larger and larger scale deployments of open identity technologies including OpenID and Information Cards. There will be much to talk about at this fall's event. We have low rates for early bird registration until September 16 then
                    Continue reading...


                    The Eighth Internet Identity Workshop - IIW2009A

                    Image by Adriana Lukas via Flickr I can't believe that a week has passed since IIW8 ended. I was planning on writing a wrap-up blog post then and time has just slipped away. When we were planning for this IIW, we were pretty worried about whether people would come and whether we'd get sufficient sponsor support. As it happened, things turned out fine. We had more people than ever--about 180. And while some sponsorships went unsold, overall we had great support for which we're grateful. The workshop itself was one of the best ever. There was a lot of
                    Continue reading...


                    Registration for IIW8 (2009A) is Open

                    You're invited to the 8th Internet Identity Workshop to be held May 18-20, 2009 at the Computer History Museum in Mountain View California. Registration for IIW2009A (IIW8) is open now. Early Bird Rates are in effect until April 1st. This is a $50 discount for independents and a $75 discount for regular tickets from last year's price. We need to get 75 people registered by April 1 to make a final confirmation for our conference space at the Computer History Museum. All those who book early will get a special thanks. Sponsorship opportunities are still available for the following:
                    Continue reading...


                    Social Web TV and TechCrunchIT at IIW

                    John McCrea, David Recordon, and Joseph Smarr recorded a special edition of their video podcast Social Web TV at IIW this week. Their guests were Max Engel of MySpace, Eran Hammer of Yahoo, Dick Hardt of Sxipper, Paul Trevithick of Parity, and Doc Searls of the Berkman Center for Internet and Society. Steve Gillmor recorded a TechCrunchIT show with David Recordon of Six Apart, Kevin Marks of Google, and with the help of Echovar's Cliff Gerrish. where they talk about the open standards debate.
                    Continue reading...


                    After the Death of Advertising, Shopper and Merchants Can Start Talking

                    Dave Winer Dave Winer wrote yesterday about the death of online advertising. He says: I've been saying it for as long as people have been building businesses on advertising on the web, it's not a longterm thing. Now we're at the end of the road. Assuming the economy comes back from the recession-depression thing that it's in now, when it does, we will have completely moved on from advertising. The web will still be used for commercial purposes, people will still buy things from Amazon and Amazon-like sites, but they will find information for products as they do now,
                    Continue reading...


                    A Great Internet Identity Workshop!

                    Computer History Museum About a month ago, Kaliya and I had a serious conversation about possibly having to cancel the Internet Identity Workshop this time. Registrations were not coming in as fast as usual and no one had committed to any of the major sponsorships. I was concerned I'd end up personally eating the cost of the conference if we moved forward. Shortly after that, Ping Identity and Microsoft both stepped up and gave us confidence to move forward. That's a good thing because this turned out to be the best IIW I can remember. There seem to be
                    Continue reading...


                    Supporting Authentication Discovery in a Standard Way

                    I'm sitting in a session at Internet Identity Workshop that is discussing what standardized support browsers could provide to all authentication systems. Right now all browsers support one: Username/Password over HTTP Authentication. Authentication's come a long way since 1993. Dick Hardt of Sxipper made the observation that users view what's "inside the chrome" as the application. The browser chrome is largely ignored. That seems right to me. Authentication systems like basic form-based, openid, and information cards are all existing without explicit browser support. Forms have password fields, but that's just so that the browser blanks out the characters. Beyond
                    Continue reading...


                    Tweetdeck Rocks

                    Yesterday I found out about Tweetdeck, an Adobe Air application for managing twitter. Tweetdeck is much more than a way for watching your tweet stream and posting tweets. Tweetdeck is a dashboard for Twitter. You can create separate panels, for example, to follow searches. Yesterday I was using it to follow three different searches related to Internet Identity Workshop and seeing tweets from all kinds of people who I don't normally follow. Of course, I found more people to follow! Related articles via ZemantaLooking for Mr. Goodtweet: How to Pick Up Followers on TwitterTweetDeck Offers Features Twitter Lacks [Featured
                    Continue reading...


                    Getting Ready for IIW2008B (Nov 10-12)

                    We'll be holding the Internet Identity Workshop (IIW) again on November 10-12 at the Computer History Museum in Mountain View CA. The Internet Identity Workshop focuses on what has been called user-centric identity; basically asking the question how can people manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. IIW is a working meeting for a range of groups focused on the technical, social and legal issues arising with the emergence identity, relationship and social layer of the web. Providing identity services between people, websites, and
                    Continue reading...


                    One Is the Loneliest Number: Relationships on the Internet

                    Bob Blakely is speaking about building a relationship layer for the Internet. A relationship is the context within which we observe one another. Past history and even attitudes are not directly observable. This is imperfect--distant relationships are the basis for inaccuracies. More observations at a closer distance make for a more useful and feature rich relationship. Bob puts forward the emergence of the credit card industry as an example. Rather than requiring shoppers to create intimate relationships with every merchant, you create a single intimate relationship with your bank and the merchant has an intimate relationship with their bank
                    Continue reading...


                    What's Your Architecture's Agenda?

                    One of the topics that came up in today's free range small groups discussions are IIW2008A was the idea that architectures have agendas. Brad Templeton voiced the idea that all designs have defaults and those defaults represent an encoding of some kind of agenda. For example, let's say that you collect click streams from your web site visitors in order to give them recommendations, optimize banners, or whatever. What is the default for how long that data is stored? One week? A month? A year? Forever? You might not think of that default as an agenda, but it is
                    Continue reading...


                    IIW Is Just Around the Corner

                    If you are wondering what the Internet Identity Workshop is all about we have a new articulation posted on the main wiki page for our upcoming conference. It goes into the range of topics covered along with the technology and social issues. This is our 6th event and I think it will be a great one. MONDAY IS FREE (beginning at 1PM) We have Monday’s program figured out and Monday afternoon is FREE to anyone who wants to come and check out the emerging field. We will open at 1pm. We will open with a ‘newbie’ perspective from Ryan
                    Continue reading...


                    IIW 2008 Happening May 12-14

                    The announcement and registration pages for IIW 2008 are now live. Please take minute and do three things: Register so we know you're coming. Having a good count early makes the whole thing go smoother. Help us spread the word by blogging about it. Put a badge for IIW on your Web site if you can. Here's the code for the badge you see on the right hand side of my blog: We expect that IIW2008 will be every bit as productive and fun as past IIWs have been I hope you can make it.
                    Continue reading...


                    What's New in OpenID 2.0?

                    OpenID 2.0 was finally release yesterday. I've put a piece up at Between the Lines on what's new in OpenID 2.0. There's some important capabilities that will move this forward in a big way.
                    Continue reading...


                    Understanding OpenID

                    Here's a screencast that Dan Lullich sent me showing how OpenID works using a whiteboard cartoon. Very clever! Dan was also my guest on the Technometria podcast this week. We talked about reputation--go figure.
                    Continue reading...


                    Reputation at IIW2007B

                    Doc juggles(click to enlarge) I just posted a summary piece from Tuesday at IIW2007B at Between the Lines: Reputation taking center stage. I also have pictures. Look for more IIW coverage with the iiw2007b tag.
                    Continue reading...


                    Placing the User at the Center of Identity

                    Coincidentally, a feature I did for InfoWorld on user-centric identity appeared today. Here's what I contributed: Federating identity for the WebUser-centric innovations CardSpace and OpenID may finally bring the promise of federation within reach Understanding OpenID and CardSpaceOpenID and CardSpace are at the forefront of user-centric identity. Here's how they work Podcast: An identity layer for the WebMicrosoft's Kim Cameron speaks to the advantages of placing the user at the center of enterprise identity systems Podcast: User-centric identity in the enterpriseBurton Group's Mike Neuenschwander discusses the state of federated identity, delving deep into the business proposition user-centric identity presents
                    Continue reading...


                    IIW2007B Kicks Off

                    IIW2007B is underway. I flew to San Jose with two of my grad students, Bryant Cutler and Devlin Daley this morning. We went to Costco to buy food for snacks and showed up at the Computer History Museum about noon. The first day of IIW continues to evolve. Kaliya and her design team set out an agenda this time that included a set of parallel tracks to start off. The parallel tracks allowed us to run a real "intro" track for new comers alongside some working groups sessions. I was in charge of the intro track. Paul Madsen started
                    Continue reading...


                    PayPal Really Makes Me Mad!

                    I got an email from PayPal today: We have reason to believe that your account was accessed by a third party. We have limited access to sensitive PayPal account features in case your account has been accessed by an unauthorized third party. We understand that having limited access can be an inconvenience, but protecting your account is our primary concern. Well, it wasn't a third person, it was me. I used PayPal to collect registration fees for IIW (happening next week). All the money we have to pay vendors, etc. is in that account and I can't get to
                    Continue reading...


                    User-Centric Identity Events at DIDW

                    There are several user-centric identity events happening at the upcoming Digital Identity World. Identity Open Space User-Centric Digital Identity is gaining traction. OpenID is one of first of several efforts moving out on the web. There is a cluster of working groups working on various issues including Identity Schema's, Identity Rights Agreements, Interoperability with OSIS, protocols working together on the Concordia Project and others. You're invited to participate in a half-day Identity Open Space being held in conjunction with Digital Identity World on September 26, 2007 (Wednesday) at the San Francisco Hilton. Cost for this afternoon of open space
                    Continue reading...


                    IIW2007

                    This is not the Internet Identity Workshop--but going to Croatia to learn to weld might be fun. We'll be doing the first Internet Identity Workshop this year on May 14-16, 2007 at the Computer History Museum in Mountain View, CA. Put it on your calendar now. Registering early will help us plan and pay for upfront fees.
                    Continue reading...


                    Exploring Interoperability Space

                    Paul Trevethick has put together a document identifying the dimensions along which components and data flows can be changed in user-centric identity systems. His space is a diagram that is general enough to cover most wire-level interactions of various user-centric identity systems. I found it instructive. For any specific set of interactions with various components some of the components or flows would drop out. This is timely because we're trying to figure out how to do interoperability demonstrations for IIW07 in May. That requires mapping out scenarios that various parties will try to play in. Paul's diagram gives a
                    Continue reading...


                    IIW2006 Lost and Found

                    After IIW2006B was over last week, we found a few things. Kaliya has them, so if they're yours contact Kaliya to get them back. Here's pictures (click picture to enlarge): Phone charger Glass case IBM power adapter Macbook (65W) mag power adapter
                    Continue reading...


                    Kaliya Wins DIDW Award

                    Kaliya Hamlin won a DIDW award for "behind the scenes" work on the Internet Identity Workshop and th Identity Gang. It was well deserved. Kaliya is a motive force in this area and someone who makes the community better. Over and above that, she's a genuinely nice person and someone who's a pleasure to work with. Congratulations Kaliya!
                    Continue reading...


                            
                            

                                      汇爵国际彩票

                                      凤凰福彩app下载

                                      雷速体育网

                                      best365怎么玩才可以赢

                                      晓风彩票登陆

                                      鑫源彩票登录

                                      澳门足彩

                                      博亚体育投注

                                      大发888官方下载