The document discusses the history and goals of Higgins, an open source project that aims to give users control over their personal data and digital identity. It provides an overview of Higgins and describes how active clients and information cards allow users to manage attributes and authenticate across multiple websites from a centralized location. It also outlines the development of next generation active clients, including personal data stores that would integrate a user's profiles, preferences, and social graphs across different online accounts and applications.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
https://ssimeetup.org/streetcred-improving-developer-experience-ssi-michael-boyd-webinar-41/
Michael is the Cofounder and Chief Product Officer of Streetcred ID. Coming from multiple startup ventures as technical lead, Michael was the first software engineer at Sovrin Foundation, where he was a strong advocate for privacy and security in decentralized identity systems. He was an original contributor to the initial Hyperledger Indy Agent code, which later became Hyperledger Aries Project. He is passionate about creating a pleasant experience for developers who want to implement self-sovereign identity with Streetcred.
In this talk, Michael will discuss the evolution of the developer experience in the SSI community, including the easiest ways to get started building credential issuers, verifiers, and identity wallets. He’ll introduce a framework for how to best approach user experience problems in decentralized identity, touching on hard topics like key management, schema discovery, and building a web of trust.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
https://ssimeetup.org/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36/
The DID Report 1 about the First Meeting of the New W3C DID Working Group with Drummond Reed, co-author of the W3C DID specification, and Markus Sabadello from Danube Tech. Headline news in SSI land: this month W3C members approved forming a full W3C Working Group for Decentralized Identifiers (DIDs).
DID spec co-author Drummond Reed has been in Fukuoka Japan for the first official meeting of this new Working Group and he will share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
https://ssimeetup.org/streetcred-improving-developer-experience-ssi-michael-boyd-webinar-41/
Michael is the Cofounder and Chief Product Officer of Streetcred ID. Coming from multiple startup ventures as technical lead, Michael was the first software engineer at Sovrin Foundation, where he was a strong advocate for privacy and security in decentralized identity systems. He was an original contributor to the initial Hyperledger Indy Agent code, which later became Hyperledger Aries Project. He is passionate about creating a pleasant experience for developers who want to implement self-sovereign identity with Streetcred.
In this talk, Michael will discuss the evolution of the developer experience in the SSI community, including the easiest ways to get started building credential issuers, verifiers, and identity wallets. He’ll introduce a framework for how to best approach user experience problems in decentralized identity, touching on hard topics like key management, schema discovery, and building a web of trust.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
https://ssimeetup.org/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36/
The DID Report 1 about the First Meeting of the New W3C DID Working Group with Drummond Reed, co-author of the W3C DID specification, and Markus Sabadello from Danube Tech. Headline news in SSI land: this month W3C members approved forming a full W3C Working Group for Decentralized Identifiers (DIDs).
DID spec co-author Drummond Reed has been in Fukuoka Japan for the first official meeting of this new Working Group and he will share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
On March 19, 2020, Evernym's product team gave a webinar introducing several new features for Verity and Connect.Me and unveiling our embedded wallet SDK for the very first time.
Here are the slides.
In this May 2020 webinar, Evernym's Andy Tobin gives an overview of safe credentials and the five tests to determine whether or not a portable verifiable credential is safe.
Then, we invite panelists from CULedger and Mastercard to share what safe credentials mean for them and their organizations.
Panelists:
- Julie Esser, SVP Marketing & Comms, CULedger
- Bryn Robinson-Morgan, VP Digital Identity, Mastercard
- Daniel Hardman, Chief Architect, Evernym
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
http://ssimeetup.org/overlays-1o1-establishing-schema-definitions-self-sovereign-identity-ssi-ecosystem-paul-knowles-webinar-17/
Paul Knowles, Innovation & Emerging Technology at Dativa and chair of the Schemas and Overlays Working Group at Sovrin Foundation, will be our next guest presenting a new data capture model to the global SSI (Self-Sovereign Identity) community.
This talk introduces Overlays, data structures that provide extra layers of contextual and/or conditional information to Schemas. Paul will show how Overlays ensure that Schema definitions can remain in their simplest form thus providing a standard base from which to decentralise data. The extra context provided by Overlays can be used by an Agent to transform how information is displayed to a viewer or to guide the Agent in how to apply a custom process to Schema data. All components within this flexible data capture architecture contain DIDs (Decentralised Identifiers) for linked association and search purposes.
The presentation will also include a live demonstration from *Robert Mitwicki from Lab10 Collective* to show how a set of Overlays can be added to a plain Schema to provide richer complexity to the base structure.
Want to watch the video of this talk & hear about free speaker hangouts?
Hop over here: http://bit.ly/IoTForum16Talks
We will keep you up to date with new talks. We will never sell your email address and you can unsubscribe at any time.
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Why are Smart Gateways & the Blockchain Important in the Internet of Things?
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
http://ssimeetup.org/did-resolution-given-did-how-do-retrieve-document-markus-sabadello-webinar-13/
Markus Sabadello, CEO of Danube Tech, will talk about DID Resolution and how to retrieve a DID document. As we know, Decentralized Identifiers (DIDs) are a key component in SSI architecture. They are used as building blocks for verifiable credentials, wallets, agents, and data exchange protocols. To make all this work, we need to be able to “resolve” DIDs to their associated DID Documents. This process fulfills a similar purpose as DNS does in the classic web. And while DID Resolution is not a very complicated topic, it is still important to understand how it works and how it relates to other topics. In this webinar, we will give a general introduction to DID Resolution, discuss a few in-depth topics, and also demo concrete tools that are available today.
Most DID Resolution implementations envision an architecture where a common base component invokes a set of “drivers” or “plugins” or “modules” to implement method-specific functionality, e.g. see the DIF Universal Resolver, Digital Bazaar’s did-client, or the uPort JavaScript DID Resolver. We envision such “DID Resolver” tools to become as central to SSI infrastructure as DNS is for the web today.
SSI: The Trillion Dollar Business OpportunitySSIMeetup
https://ssimeetup.org/ssi-trillion-dollar-business-opportunity-webinar-34/
This webinar, based on a panel of the same name held at Seattle Devcon in July 2019, will feature four experts from different areas of the digital identity industry explaining why they believe Self-Sovereign Identity (SSI) is one of the most significant applications of blockchain technology to enable all kind of new business model for the digital economy.
Panelists will include Chris Spanton, Principal Architect—Blockchain at T-Mobile; Vaughan Emery, CEO of Datafi Labs; and Drummond Reed, Chief Trust Officer at Evernym and a Trustee of the Sovrin Foundation.
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
http://ssimeetup.org/identity-privacy-past-present-digital-brenda-k-leong-webinar-12/
Brenda K. Leong, Senior Counsel & Director of Strategy of the Future of Privacy Forum, will talk about Identity and Privacy. The problem of whether private citizens should be required to have government-issued documentation (verifying their personal identity in order to access goods and services, seek employment, travel, or obtain government benefits), long predates the current discussions related to digital identity systems, the use of biometrics, or platforms like blockchain. But whether past or present, these challenges are all based on the question of how to balance government efficiencies and national security against protections for individual freedoms and liberty.
Underlying this conversation is the concept of privacy. Is it a fundamental right? What does it mean? Who gets to decide which conveniences are worth the tradeoffs they require? Are the protections for personal data offered by policy and law sufficient, or should technical and security protections be required? Are some systems simply too high-risk to implement regardless of perceived benefits? To answer those questions, it’s important to understand the technologies at work – biometrics such as fingerprints and facial recognition offer greater reliability, security and certainty, but raise fears of “permanent” breach if the personal data is compromised. These systems offer accessibility at scale that can be updated throughout a lifetime in a way that password-based accounts cannot equal. But fair access to all, protections of personal data, and most importantly, legal, policy, and technical protections against discrimination and abuse are critical to ensuring these and related technologies are not simply used to restrict personal freedom, or target groups and other populations. Brenda covers how these and other aspects of the modern concept of “digital identity” are being approached in different ways, and what some of the benefits and risks are for the future.
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
I created this Windows DNA report file I have tried my best to clarify all relevant details of the topics that should be included in the report. Although I initially tried to outline this topic, my efforts and my unconditional commitment to common business ended in success. I sincerely thank those who support me in coaching this topic, thank you for giving me strength, trust in me, and most importantly, every time I want, there will be a hint of this topic. Priyanka Vijay Jadhav "Windows DNA" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43690.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-architecture/43690/windows-dna/priyanka-vijay-jadhav
Control of Communication and Energy Networks Final Project - Service Function...Biagio Botticelli
Final Project of the Control of Communication and Energy Networks course of the Master Degree in Engineering in Computer Science at University of Rome "La Sapienza".
The technical report introduce the concepts of Service Function Chaining (SFC) and Network Function Virtualization (NFV) analyzing an approach to merge the two technologies.
Privacy has quickly risen to the top of the list, predominantly driven by Zoom’s rise in popularity as their user base has grown as the world entered lockdown.
Their 90 day push for increased security on their platform has highlighted how digital services can adopt blockchain technology to facilitate end-to-end encryption.
This coincides with WeChat’s (Tencent Holdings) announcement that they will be investing nearly $70 Billion in fintech development, including blockchain, to mirror Beijing’s call for new (digital) infrastructure.
Regardless of investments in digital infrastructure, in response to a rise in demand, applied blockchain continues to find its place in large consumer facing products.
The Italian government has demonstrated its faith in blockchain technology, through a $16.2 million investment to combat counterfeit “Made in Italy” products. This project outlines the value blockchain can deliver to provide a secure ledger of intellectual property rights and the authentication of goods and raw materials through the supply chain.
Whilst this project deals in more tangible products, it demonstrates blockchain’s ability to protect the intellectual property of a brand.
And lastly, the World Economic Forum have produced a timely toolkit designed to help enterprise plan and deploy a blockchain solution. The toolkit has been created from lessons learned from over +40 global supply chain use cases –Giving readers an idea of how many use cases are already in play.
Independent of the source of data, the integration of event streams into an Enterprise Architecture gets more and more important in the world of sensors, social media streams and Internet of Things. Events have to be accepted quickly and reliably, they have to be distributed and analyzed, often with many consumers or systems interested in all or part of the events. Dependent on the size and quantity of such events, this can quickly be in the range of Big Data. How can we efficiently collect and transmit these events? How can we make sure that we can always report over historical events? How can these new events be integrated into traditional infrastructure and application landscape?
Starting with a product and technology neutral reference architecture, we will then present different solutions using Open Source frameworks and the Oracle Stack both for on premises as well as the cloud.
I Know What Youll Do Next Summer - The Skills You Will Be Learning as a Domi...Grégory Engels
HTML5, CSS3, OpenSocial, OAuth, this are all new technologies that will be in the tool box of each Domino Developer. HTML5 was mentioned in every second slide during the App-Dev Keynote at the 2010 Lotusphere in Orlando. Reason enough to look at the buzzwords and start gathering experiences with this upcoming new technologies today.
We also will take a closer look at what was announced as “Project Vulcan”
Backgrounded on Rococo Software including three product areas:
- Java/Bluetooth and JSR82
- Bluetooth in the Browser with BONDI / WAC / JIL
- Social Proximity Framework : LocalSocial
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
On March 19, 2020, Evernym's product team gave a webinar introducing several new features for Verity and Connect.Me and unveiling our embedded wallet SDK for the very first time.
Here are the slides.
In this May 2020 webinar, Evernym's Andy Tobin gives an overview of safe credentials and the five tests to determine whether or not a portable verifiable credential is safe.
Then, we invite panelists from CULedger and Mastercard to share what safe credentials mean for them and their organizations.
Panelists:
- Julie Esser, SVP Marketing & Comms, CULedger
- Bryn Robinson-Morgan, VP Digital Identity, Mastercard
- Daniel Hardman, Chief Architect, Evernym
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
http://ssimeetup.org/overlays-1o1-establishing-schema-definitions-self-sovereign-identity-ssi-ecosystem-paul-knowles-webinar-17/
Paul Knowles, Innovation & Emerging Technology at Dativa and chair of the Schemas and Overlays Working Group at Sovrin Foundation, will be our next guest presenting a new data capture model to the global SSI (Self-Sovereign Identity) community.
This talk introduces Overlays, data structures that provide extra layers of contextual and/or conditional information to Schemas. Paul will show how Overlays ensure that Schema definitions can remain in their simplest form thus providing a standard base from which to decentralise data. The extra context provided by Overlays can be used by an Agent to transform how information is displayed to a viewer or to guide the Agent in how to apply a custom process to Schema data. All components within this flexible data capture architecture contain DIDs (Decentralised Identifiers) for linked association and search purposes.
The presentation will also include a live demonstration from *Robert Mitwicki from Lab10 Collective* to show how a set of Overlays can be added to a plain Schema to provide richer complexity to the base structure.
Want to watch the video of this talk & hear about free speaker hangouts?
Hop over here: http://bit.ly/IoTForum16Talks
We will keep you up to date with new talks. We will never sell your email address and you can unsubscribe at any time.
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Why are Smart Gateways & the Blockchain Important in the Internet of Things?
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
http://ssimeetup.org/did-resolution-given-did-how-do-retrieve-document-markus-sabadello-webinar-13/
Markus Sabadello, CEO of Danube Tech, will talk about DID Resolution and how to retrieve a DID document. As we know, Decentralized Identifiers (DIDs) are a key component in SSI architecture. They are used as building blocks for verifiable credentials, wallets, agents, and data exchange protocols. To make all this work, we need to be able to “resolve” DIDs to their associated DID Documents. This process fulfills a similar purpose as DNS does in the classic web. And while DID Resolution is not a very complicated topic, it is still important to understand how it works and how it relates to other topics. In this webinar, we will give a general introduction to DID Resolution, discuss a few in-depth topics, and also demo concrete tools that are available today.
Most DID Resolution implementations envision an architecture where a common base component invokes a set of “drivers” or “plugins” or “modules” to implement method-specific functionality, e.g. see the DIF Universal Resolver, Digital Bazaar’s did-client, or the uPort JavaScript DID Resolver. We envision such “DID Resolver” tools to become as central to SSI infrastructure as DNS is for the web today.
SSI: The Trillion Dollar Business OpportunitySSIMeetup
https://ssimeetup.org/ssi-trillion-dollar-business-opportunity-webinar-34/
This webinar, based on a panel of the same name held at Seattle Devcon in July 2019, will feature four experts from different areas of the digital identity industry explaining why they believe Self-Sovereign Identity (SSI) is one of the most significant applications of blockchain technology to enable all kind of new business model for the digital economy.
Panelists will include Chris Spanton, Principal Architect—Blockchain at T-Mobile; Vaughan Emery, CEO of Datafi Labs; and Drummond Reed, Chief Trust Officer at Evernym and a Trustee of the Sovrin Foundation.
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
http://ssimeetup.org/identity-privacy-past-present-digital-brenda-k-leong-webinar-12/
Brenda K. Leong, Senior Counsel & Director of Strategy of the Future of Privacy Forum, will talk about Identity and Privacy. The problem of whether private citizens should be required to have government-issued documentation (verifying their personal identity in order to access goods and services, seek employment, travel, or obtain government benefits), long predates the current discussions related to digital identity systems, the use of biometrics, or platforms like blockchain. But whether past or present, these challenges are all based on the question of how to balance government efficiencies and national security against protections for individual freedoms and liberty.
Underlying this conversation is the concept of privacy. Is it a fundamental right? What does it mean? Who gets to decide which conveniences are worth the tradeoffs they require? Are the protections for personal data offered by policy and law sufficient, or should technical and security protections be required? Are some systems simply too high-risk to implement regardless of perceived benefits? To answer those questions, it’s important to understand the technologies at work – biometrics such as fingerprints and facial recognition offer greater reliability, security and certainty, but raise fears of “permanent” breach if the personal data is compromised. These systems offer accessibility at scale that can be updated throughout a lifetime in a way that password-based accounts cannot equal. But fair access to all, protections of personal data, and most importantly, legal, policy, and technical protections against discrimination and abuse are critical to ensuring these and related technologies are not simply used to restrict personal freedom, or target groups and other populations. Brenda covers how these and other aspects of the modern concept of “digital identity” are being approached in different ways, and what some of the benefits and risks are for the future.
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
I created this Windows DNA report file I have tried my best to clarify all relevant details of the topics that should be included in the report. Although I initially tried to outline this topic, my efforts and my unconditional commitment to common business ended in success. I sincerely thank those who support me in coaching this topic, thank you for giving me strength, trust in me, and most importantly, every time I want, there will be a hint of this topic. Priyanka Vijay Jadhav "Windows DNA" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43690.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-architecture/43690/windows-dna/priyanka-vijay-jadhav
Control of Communication and Energy Networks Final Project - Service Function...Biagio Botticelli
Final Project of the Control of Communication and Energy Networks course of the Master Degree in Engineering in Computer Science at University of Rome "La Sapienza".
The technical report introduce the concepts of Service Function Chaining (SFC) and Network Function Virtualization (NFV) analyzing an approach to merge the two technologies.
Privacy has quickly risen to the top of the list, predominantly driven by Zoom’s rise in popularity as their user base has grown as the world entered lockdown.
Their 90 day push for increased security on their platform has highlighted how digital services can adopt blockchain technology to facilitate end-to-end encryption.
This coincides with WeChat’s (Tencent Holdings) announcement that they will be investing nearly $70 Billion in fintech development, including blockchain, to mirror Beijing’s call for new (digital) infrastructure.
Regardless of investments in digital infrastructure, in response to a rise in demand, applied blockchain continues to find its place in large consumer facing products.
The Italian government has demonstrated its faith in blockchain technology, through a $16.2 million investment to combat counterfeit “Made in Italy” products. This project outlines the value blockchain can deliver to provide a secure ledger of intellectual property rights and the authentication of goods and raw materials through the supply chain.
Whilst this project deals in more tangible products, it demonstrates blockchain’s ability to protect the intellectual property of a brand.
And lastly, the World Economic Forum have produced a timely toolkit designed to help enterprise plan and deploy a blockchain solution. The toolkit has been created from lessons learned from over +40 global supply chain use cases –Giving readers an idea of how many use cases are already in play.
Independent of the source of data, the integration of event streams into an Enterprise Architecture gets more and more important in the world of sensors, social media streams and Internet of Things. Events have to be accepted quickly and reliably, they have to be distributed and analyzed, often with many consumers or systems interested in all or part of the events. Dependent on the size and quantity of such events, this can quickly be in the range of Big Data. How can we efficiently collect and transmit these events? How can we make sure that we can always report over historical events? How can these new events be integrated into traditional infrastructure and application landscape?
Starting with a product and technology neutral reference architecture, we will then present different solutions using Open Source frameworks and the Oracle Stack both for on premises as well as the cloud.
I Know What Youll Do Next Summer - The Skills You Will Be Learning as a Domi...Grégory Engels
HTML5, CSS3, OpenSocial, OAuth, this are all new technologies that will be in the tool box of each Domino Developer. HTML5 was mentioned in every second slide during the App-Dev Keynote at the 2010 Lotusphere in Orlando. Reason enough to look at the buzzwords and start gathering experiences with this upcoming new technologies today.
We also will take a closer look at what was announced as “Project Vulcan”
Backgrounded on Rococo Software including three product areas:
- Java/Bluetooth and JSR82
- Bluetooth in the Browser with BONDI / WAC / JIL
- Social Proximity Framework : LocalSocial
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
60 minute lecture to Harvard GSD Exec. Edu Leading Organizations course. February 5th. Boston. MA.
Trends in technology. Smart Cities. Impact on business, infrastructure, and real estate. What it takes to manage this change. Our role and participation in the journey of City transformation.
Independent of the source of data, the integration of event streams into an Enterprise Architecture gets more and more important in the world of sensors, social media streams and Internet of Things. Events have to be accepted quickly and reliably, they have to be distributed and analysed, often with many consumers or systems interested in all or part of the events. Dependent on the size and quantity of such events, this can quickly be in the range of Big Data. How can we efficiently collect and transmit these events? How can we make sure that we can always report over historical events? How can these new events be integrated into traditional infrastructure and application landscape?
Starting with a product and technology neutral reference architecture, we will then present different solutions using Open Source frameworks and the Oracle Stack both for on premises as well as the cloud.
Open Source Software Development by TLV PartnersRoy Leiser
Our insights about Open Source software development. Trends, leading brands and practices, success stories, important Exists, Pros and Cons and much more.
Similar to Higgins active clients and personal data stores v2 (20)
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Higgins active clients and personal data stores v2
1. Higgins, Active Clients, & Personal Data Stores Paul Trevithick http://project-higgins.org September 2010 v2
2. “On the Internet, nobody knows you’re a dog” 2 Copyright (c) 2010 Paul Trevithick
3. Why is this? 3 Copyright (c) 2010 Paul Trevithick
4. Our user agents don’t know us Silo A Silo B Silo C Browser Browser Browser 4 Copyright (c) 2010 Paul Trevithick
5. Silo A Silo B Silo C Browser Browser Browser We all experience the result Type, type, type. Click, click, click. Endless form filling as we populate each silo with descriptions of ourselves 5 Copyright (c) 2010 Paul Trevithick
6. Implications Personal information is spread across all these silos No way to control my digital footprint Information about me (esp. my social graph) isn’t portable My personal data is no longer mine (from a rights POV) No way to move verified attributes from A to B Privacy concerns (e.g. tracking cookies, correlatable identifiers) 6 Copyright (c) 2010 Paul Trevithick
7. Missing: an agent of the user What goes here? Something that: Centralizes control (by me) over my data whereever it lives Supports my multiple identities and attribute authorities Moves data (preferences, affiliations, ids, healthcare records, etc.) between the silos and between people Allows me to control who has access to my data 7 Copyright (c) 2010 Paul Trevithick
8. Enter the active client Portability: profile & social networking attributes are made portable by Information Cards Any kind of information: your preferences, friends, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id, etc., can be on a card. Cards are managed in a local active client “wallet” (aka Selector) such as Microsoft CardSpace™, Higgins, Azigo™, etc. running on your desktop or mobile device and integrated with your browser 8 Copyright (c) 2010 Paul Trevithick
9. Information Cards and first generation active clients 2007: Microsoft CardSpace (built into Windows 7 & Vista) 2008: Higgins and OpenInfocard open source projects 2008: June: Information Card Foundation founded 2009: OASIS IMI Standard 9 Copyright (c) 2010 Paul Trevithick
10. Higgins history Began in 2003 in affiliation with Harvard’s Berkman Center Moved to the Eclipse Foundation in 2004 IBM, Novell, and others contributed developers during 2005-2008 Google and Oracle began contributing in 2007 Higgins 1.0 was released in 2008 Higgins code is part of commercial products from Novell, IBM, Google, Serena, Azigo, and others Higgins 1.1 (Adobe AIR & iPhone) Q4 2010 http://higgins-project.org 10 Copyright (c) 2010 Paul Trevithick
11. Higgins goals User-centered design Shift control to the user over their own digital identity Enhance privacy and security Provide a simple, consistent, card-based user experience Active client-based architecture Data integration Integrate user’s profiles & social networks across data silos and apps Develop a common data model Distributed cross-silo linking of data Extensible architecture based on frameworks & plugins Designed for interoperability Cross-protocol (Infocard, OpenID, SAML, un/pw…) Authentication-technology agnostic Cross-platform (Windows, Mac, Linux, Mobile…) Open source, community-based project Business model friendly EPL license 11 Copyright (c) 2010 Paul Trevithick
12. Timeline Information Card Foundation Launched June 2008 Higgins 1.1 Q4 2010 Higgins 1.0 Feb 2008 CardSpace™Jan 2007 2004 2005 2006 2007 2008 2009 2010 12 Copyright (c) 2010 Paul Trevithick
23. Card-based login benefits Per-site passwords are eliminated Anti-phishing protection Site declares what claims (attributes) it needs or desires User reviews and consents to all release Privacy enhancing minimal disclosure 16 Copyright (c) 2010 Paul Trevithick
24. Platform support for Infocard Windows Microsoft CardSpace™, Higgins AIR, OpenInfocard (Firefox) Mac Novell DigitalMe™, Higgins AIR, OpenInfocard (Firefox) iPhone Higgins Browsers Firefox: Higgins, OpenInfocard IE: CardSpace, Higgins Chrome: Higgins (1.1) Safari: Higgins (1.1) 17 Copyright (c) 2010 Paul Trevithick
27. Infocard actors P R Identity Provider (Card Issuer) Relying Party (Card Accepter) B Browser S Selector (Active Cient) User 20 Copyright (c) 2010 Paul Trevithick
28. Personal card data flow P R B S Personal Card 21 Copyright (c) 2010 Paul Trevithick
29. Managed card data flow P R points to security token service B S has Managed Card 22 Copyright (c) 2010 Paul Trevithick
30. Infocard: the good news Infocard IMI protocol is an OASIS specification First gen clients/selectors are available for multiple desktop and mobile platforms and for IE, Firefox, Safari and Chrome Major firms have stood up card issuing sites (Equifax, Acxiom, PayPal, etc.) Infocards adopted as part of the US eGov “ICAM” program Infocard and OpenID foundations worked together to found the OpenIdentityExhange.org and have been instrumental in putting forward the notion of Trust frameworks. Trust frameworks are a key part of the forthcoming US government NSTIC strategy 23 Copyright (c) 2010 Paul Trevithick
31. Infocard: a work in progress There remain great hopes for the emergence of medium-scale “lighthouse” relying party websites (e.g. agencies of the US Federal government) that will demonstrate the business value of infocards and drive understanding and adoption Information Card Foundation is structurally transforming itself to better support its mission in the next phase We’ve learned from our first generation products There’s room for improvement in the UX, the implementations, and working more collaboratively with other identity technologies These learnings are driving the next generation… 24 Copyright (c) 2010 Paul Trevithick
33. Higgins 2.0 UX: A less “in your face” UI WRT privacy & security. Rely more on trust frameworks. Faster, smoother browser add-on UX for download and installation Brokered authentication: Reduce per-IdP (per-card) passwords/challenges Adopt a cross-protocol “better with” strategy Embrace and add value to OpenID, SAML, WebID?, userid-passwords? Track MozillaLabs work on Account Manager Harmonize UX with UX from OpenID, Facebook Connect, etc. (See Kantara ULX WG), and also with “cloud-based identity selection agents” New desktop architecture: browser add-on + OS service + “dashboard” UI iPhone and (hopefully) Android implementations Personal Data Store Blinded data store (using Nigori technology) Interoperability from Persona data model 2.0 Relationship cards: build continuous bi-directional connection App-cards: Javascript-bearing cards; active client as a platform 26 Copyright (c) 2010 Paul Trevithick
34. Interests Searches Purchases Passwords Addresses Payment cards Location Social graph Active client as “digital me” 27 Copyright (c) 2010 Paul Trevithick
35. Even tighter (and lower latency) integration with browsers & apps Browser or Appr Browser or App Browser Form fill Data capture Active Client 28 Copyright (c) 2010 Paul Trevithick
36. General purpose Personal Data Store sync & backup; not just a “card roaming” service Browser or App App Active Client Active Client PDS Blinded data 29 Copyright (c) 2010 Paul Trevithick
38. Persona Data Model 2.0 A vocabulary of attributes to describe a person Card metaphor Profiles (e.g. “what amazon knows about you”) Reusable personas/roles (e.g. “work”, “anonymous”) RDF/OWL based. Builds on existing vocabularies: FOAF vCARD geoLocation SKOS http://wiki.eclipse.org/Persona_Data_Model_2.0 31 Copyright (c) 2010 Paul Trevithick
39. PDS API XDI Read/write attributes using OASIS XDI messages RESTful-ish: GET, ADD, MOD, DEL messages tunneled within POST OAuth Authentication/Authorization ActivityStreams (end of 2010) Atom feed to indicate “data update” events PubSubHubBub (end of 2010) Allows client apps to proactively receive notification of “data update” events in the ActivityStream SPARQL/Update (Q2 2011) Proposed alternative to XDI 32 Copyright (c) 2010 Paul Trevithick
40. Relationship-cards What they are Attributes can be “by reference” instead of just “by value” Card conveys a “UDI” (Linked Data or XRI) URI reference UDIs assume dynamic discovery (XRDS or Linked Data 303) Benefits Continuous data feed is established (vs. static one shot) Read/Write (vs. read only, unidirectional) 33 Copyright (c) 2010 Paul Trevithick
41. Javascript bearing app-cards Cards link to a Javascript program Javascript can be injected into the browser to perform Supports client-side mashups, aka “web augmentation”, aka browser overlays Supports Kynetx.com KNS service 34 Copyright (c) 2010 Paul Trevithick
43. Active client as platform Javascript from an app-card can be injected into browser can call Client API Browser Mobile or Desktop App Javascript from an app-cards can be injected into Dashboard can provide “admin UI” via PDS Cient API Dashboard (UI) Native call to Client API PDS Client API PDS Client Web apps can access PDS via XDI or SPARQL + ActivityStreams + PSHB PDS 36 Copyright (c) 2010 Paul Trevithick
44. PDS and active clients: related work User-centric identity (2005) Letting people control their own identities, identifiers. OpenID, Infocard, WebID, OAuth 2.0 Data Portability.org (2007) A “borderless experience” VRM (Vendor Relationship Management) (2008) Shifting more control to the customer Mozilla Labs: (2009) Identity in the browser: Weave; Account Manager Federated Social Networks (2010) Distributed Facebook (e.g. Diaspora & many others) David Siegel: Pull: “Personal Data Locker” (2010) World Economic Forum (2010): Personal Data Management Initiative 37 Copyright (c) 2010 Paul Trevithick
56. Personal r-card: first time flow Personal Data Agent/Store (in the cloud) A R P Set of Claims & Ptr B S Personal R-Card 49 Copyright (c) 2010 Paul Trevithick
57. Personal r-card steady state A Continuous connection (RDF, XDI, etc.) R P B S 50 Copyright (c) 2010 Paul Trevithick
58. Managed r-card initial flow A R P Set of Claims & Ptr B S has Managed R-Card 51 Copyright (c) 2010 Paul Trevithick
59. Managed r-card steady state Kantara UMA Authorization Manager A control control control Continuous connection R P B S has Managed R-Card 52 Copyright (c) 2010 Paul Trevithick
61. Active client API getExAttributes (string rp, string audience, Attribute attributes, Where where, function responseCallback) rp: string identifier of the "next hop" attribute data sink. It is expressed in as detailed a form as possible. audience: string. Must match either the agent or the rp parameter value or be nil. If not nil, then indicates whether to encrypt tokens for the agent or the rp. attributes: set of (attribute, optional, authorities) tuples where: attribute is a URI indicating the attribute type optional is a boolean (if true then this attribute is desired but not required) authorities is a list of domains that are considered by the caller as authoritative WRT this attribute and thus must be used as the source of the attribute, if this list is nil then self asserted values are acceptable. If authority == dev (where dev is the developer of app-card) then only the "host" card of that app will be allowed as the source of attributes. where: is a set of (attribute, value-expression) tuples where: attribute: is the attribute URI value-expression: regex expression responseCallback: Represents event listener (name of the JS function). If the value of 'onready' is an empty string, then browser extension executes an synchronous query, otherwise extension does an asynchronous query. The result will be passed as a parameter to the function responseCallback 54 Copyright (c) 2010 Paul Trevithick