article thumbnail

Internet Identity Workshop 37 Report

Phil Windley

We recently completed the 37th Internet Identity Workshop. In closing circle someone said (paraphrashing) that authentication is solved and the next frontier is authorization. Summary: The latest IIW was great with many high intensity discussions of identity by people from across the globe. The topics were diverse.

article thumbnail

In Memory of Kim Cameron

Phil Windley

But my relationship with him grew into friendship through Internet Identity Workshop (IIW). The idea was that everyone would pay for their own meal since the workshop hadn't collected any money in the registration for that. Microsoft has sponsored the workshop dinner at every in-person IIW we've held.

Microsoft 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

At the most recent Internet Identity Workshop , Drummond Reed gave a session on how X.509 Provided the certificate includes information about the entity beyond the domain name, the verifier can use that information to determine whether or not the credential is authentic (i.e., 509 certificates could help with this.

Data 69
article thumbnail

Ready or not, IoT is transforming your world

Dataconomy

The Internet of Things (IoT), a revolutionary network of interconnected devices and systems, is propelling us into a new era of possibilities. Internet of Things (IoT), has brought about revolutionary changes to the way we live, work, and interact with our surroundings.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

The summit features presentations, panel discussions, and workshops on up-to-the-minute trends and issues faced by those in charge of sharing, analyzing, and defending government data through Enterprise Forensics, E-Discovery and Cybersecurity in the U.S. Cyber Security'

Software 257
article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Dick Hardt has often been “early to the new,” as he puts it: Microsoft Windows in 1986, neural networks in 1989, the internet in 1993, open source in 1995, and even Burning Man in 1999. “The internet does not have an identity layer,” said Hardt, our latest Geek of the Week. back in 2005.

Internet 114
article thumbnail

Identity, Sovrin, and the Internet of Things

Phil Windley

Summary: Building the Internet of Things securely requires that we look to non-hierarchical models for managing trust. Sovrin provides a Web of Trust model for securing the Internet of Things that increases security and availability while giving device owners more control. Not bad stuff as far as it goes. Indeed, I think we have to.