Sean Deuby thinks that the standard Internet identity layer may be nearly at hand.
The year's premier identity conference reporting the building blocks for a standard internet identity layer are almost in place.
Lots more news on the identity front...
Nishant Kaushik: The Hitchhikers Guide to Identity Sounded simple enough. Join forces with Pam and Dale to put on a three hour workshop at the Cloud Identity Summit exploring all things identity management, each of us having a whole hour in which to dazzle the crowd. And with an awesome theme like the Hitchhikers Guide to help us keep it entertaining. This was bound to be more fun than a bar full of people enjoying Pan Galactic Gargle Blasters, right?
Dave Kearns: Passwords: Identity's last mile So in that context it was very interesting to hear what Ping Chief Technology Officer Patrick Harding had to say in his keynote to this year's Summit. He told his audience that what is needed is "a modernized identity protocol stack..."
The 8-Character Password Is No Longer Secure A mixed-case password that is eight characters long and contains a numeral and a symbol has long been considered strong, even by many IT departments. After all, it is one of 6.1 quadrillion combinations, and would take a reasonably fast computer nearly a year to crack. That password, however, is no longer secure enough, thanks to human behavior and technology.
Jim Speredelozzi, Courion: The Password is Dead, Long Live the Password Unfortunately for these petitioners, passwords are more like the French Monarchy, circa 1422: when the password dies it will only be replaced with yet more passwords! Surely, some companies have and will continue to buy into more secure methods of authentication. We won't see a massive shift to something different unless it is free and infinitely portable.
Craig Burton: Privacy and Prohibition The first incident of wire tapping was in 1922 of Roy Olmstead--the prohibition king pin of Seattle. The federal judge ruled that the courts could use wire taps as evidence even without a warrant.
Holger Reinhardt, Layer 7: IoT: The Weighting Game Yet strangely enough - when talking about the IoT - the trustworthiness of sensor data does not appear to be of concern. All data are created equal or so the assumption seems to be. But data have an inherent quality or weight inferred by the characteristics of the endpoint and how much it is trusted.
Phil Windley: Updated CloudOS Roadmap There are undoubtedly things I'm forgetting and none of this includes incremental improvements to existing CloudOS services to support SquareTag. Given the progress we've made, I decided it would be nice to lay out a roadmap of what we envision happening in the near to medium-term in CloudOS.
Ian Yip: Securing the hybrid cloud The Australian Government published their National Cloud Computing Strategy in May earlier this year, placing the spotlight on data and where it resides. Ultimately, this is the key to how organisations can understand and prioritise the risks they expose themselves to in the cloud.
Peter Brantley, Hypothes.is: Annotating the news That's why Hypothes.is is organizing a series of "tiger teams" - small groups of stakeholders within each of these communities that we will gather together for a day, holding informal conversations about how annotation and commentary might be used by both lay and professional practitioners.
Andy Land, UnboundID: Just Because They Say We Are Anonymous, Are We? What is UnboundID doing about it? We are evangelizing that companies need to earn users' trust and do the right things with their data, a concept we call Identity Etiquette. We believe in the movement called Little Data - where the user is in control of their data, not the corporation.
Identity Woman: Interesting events in 2013 This is a calendar of events that I know in 2013 (and beyond). I think they're interesting, I'm currently planning on attending all the events in BLACK, I'm helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach.
Trusted Computing Conference Sep 9-12, 2013 Orlando, FL, USA The Trusted Computing Conference brings together experts in the field of computer security to discuss, explore, promote and emphasize the critical need for standards-based computer security.
Call For Papers - Open Identity Summit 2013 September 10th - 11th 2013, Kloster Banz, Germany Deadline for electronic submissions: May 15th, 2013 The aim of Open Identity Summit 2013 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management and Open Source with a special focus on Cloud Computing.
User-Centric ID Live Opportunities for relying parties in NSTIC and the new identity ecosystem October 15-16, 2013 - Washington Convention Center, Washington, D.C.
eID & ePass 5th edition National eID & ePassport Conference - the Global Forum on the drivers behind the digitalization of citizen ID documents proudly announce the 5th edition in BERLIN 2013, 28th & 29th of October @Intercontinental Berlin.
InCommon Advance CAMP: Identity Services Summit November 12-13, 2013 San Jose, CA. https://spaces.internet2.edu/display/ACAMP2013/Home Part of the 2013 Identity Week (www.incommon.org/idweek) Join leading identity architects and developers from U.S. research and higher education and international and commercial identerati. Explore the state of the art in identity services and discuss the leading edge work that's taking us there. Join us and get involved!
InCommon: CAMP Cloud: Identity and Access in an Era of Outsourced Services November 14-15, 2013 - San Jose, California Part of the 2013 Identity Week (www.incommon.org/idweek) Are your campus stakeholders looking at cloud-based solutions? Are you experiencing challenges or do you have concerns with outsourcing email, storage, or other essential services? Are you concerned about the management and maintenance of an accurate, accountable identity inventory?