The document summarizes Kaliya's background and role in organizing workshops related to personal data and digital identity. Specifically:
- Kaliya is the co-founder and executive director of the Personal Data Ecosystem Consortium, and has organized workshops on internet identity and personal data.
- One such workshop was held in Birmingham, UK in November 2012 to discuss contexts of digital identity and personal data management.
- Kaliya is working to advance discussion and solutions around user-centric approaches to personal data and digital identity.
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
I presented to SDForum Tech Women's group about Identity and Personal Data. I presented and also got input from the women attending about how they understood their own identities and what they want to have happen with their personal data.
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
I presented to SDForum Tech Women's group about Identity and Personal Data. I presented and also got input from the women attending about how they understood their own identities and what they want to have happen with their personal data.
This talk was presented at the 2016 Cloud Identity Summit. It was in the Rise of the Identity-enabled Personal Information Economy Track. It puts forward 6 Diagrams to make Sense of the overall Personal Data Ecosystem including What is Personal Data? What Happens to Personal Data? What are Market Models and how is it regulated?
I presented this talk on September 23 to the Computer Science and Telecommunications Board of the National Academies in Washington DC. It has three parts
1) What is User Centric Digital Identity
2) What are the technologies that have been developed to date
3) Emerging work on developing a Personal Data Ecosystem.
This is the presentation I gave at the Grace Hopper Celebration for Women in Computing October 2015. It covers three main ethical market models that could support the emergence of a Personal Data Ecosystem centered on individuals and their personal clouds. The three models are Vendor Relationship Management, Infomediaries, and Data Aggregators. It highlights the need for Accountability Frameworks (also called Trust Frameworks) combinations of code and law/policy. This is contextualized in an overall Landscape picture where two other modes of governance also co-exist - Peer Governance and Identifier Governance.
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
This talk was presented at the 2016 Cloud Identity Summit. It was in the Rise of the Identity-enabled Personal Information Economy Track. It puts forward 6 Diagrams to make Sense of the overall Personal Data Ecosystem including What is Personal Data? What Happens to Personal Data? What are Market Models and how is it regulated?
I presented this talk on September 23 to the Computer Science and Telecommunications Board of the National Academies in Washington DC. It has three parts
1) What is User Centric Digital Identity
2) What are the technologies that have been developed to date
3) Emerging work on developing a Personal Data Ecosystem.
This is the presentation I gave at the Grace Hopper Celebration for Women in Computing October 2015. It covers three main ethical market models that could support the emergence of a Personal Data Ecosystem centered on individuals and their personal clouds. The three models are Vendor Relationship Management, Infomediaries, and Data Aggregators. It highlights the need for Accountability Frameworks (also called Trust Frameworks) combinations of code and law/policy. This is contextualized in an overall Landscape picture where two other modes of governance also co-exist - Peer Governance and Identifier Governance.
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.
11. Verified
? ü
Anonymous ü ü
ü ü
ü
Verified
ü
Documentation In Person Biometric
Verification Capture
12. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
13. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
14. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
15. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
Over 18 years Ms.Sue Donna
Woman Voter ? DOB = 1/21/1982
1823 6th Ave.
ü
CA Congressional
District 9 Alameda, CA
Verified
Anonymous
Attributes
16. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
ü
ü
Limited
Liability
Persona
17. Government Efforts
USA = NSITC & IDESG
We’ll see how it goes.
UK leveraging
OIX Framework Listing Service
18. Verified
? ü
Anonymous ü ü
ü ü
ü
Verified
ü
Documentation In Person Biometric
Verification Capture
19. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
ü
ü
Limited
Liability
Persona
20. Why Does this Matter?
http://cmykern.com/?p=1112
Individuals move across contexts.
Contexts the Individual does not want linked
(without their knowledge and consent).
21. Why James Chartrand
Wears Women’s Underpants
http://www.copyblogger.com/james-chartrand-underpants/
42. INDIVIDUAL
Roles/ Personal
Persone
Cloud
DATA
Shared &
Personal
Personal
Devices Context Data
Analytics
What if we collected our own data in our own dossiers?
43.
44. What kind of data your students/
readers generate in their lives
from what devices?
Group Brainstorm
45. Diagram is in the appendix of the latest WEF Rethinking Personal Data
46. INDIVIDUAL
Roles/ Personal
Persone
Cloud
DATA
Shared &
Personal
Personal
Devices Context Data
Analytics
52. Current UK education architecture is
‘organisation-centric’
National
State Pupil Db
secondary
school
o Complex data
flows Exam
Board
o Low data quality
University
o Expensive to Admissions
operate Service (UCAS) Learner
record
o User not in SLC service
control Student Loan
Company
o Privacy
destroying University(s)
HE
Stats
Agency
Employer
53. Future architecture could be
‘student-centric’ National
State Pupil Db
secondary
school
o Simpler Exam
Board
o Cheaper (?)
o Higher data
University
quality Admissions
Service (UCAS)
o User in control
of data flows SLC
Student Loan
o Privacy Company
enhancing
University(s)
HE
Stats
Agency
Employer
56. Authentication Characterising
Service Authorities
issue role certificates
Providers to SPs
Individuals
Service
Information Provider
Brokers compete Acquirers
to serve individuals compete to serve
supply of software and services
organisations
eXtensible Circle of Trust
-Visa-like body. Superset of UKAMF
58. Allfiled Solutions build
white label personal data
services for large
organisations or individuals
wishing to enter the space:
• Launched in 2007
• Rich, deep personal
data architecture
• Fully ‘identity enabled’
• Members of PDEC and
The Respect Network
• Several upcoming
launches in UK and
beyond
59.
60.
61. Personal Data Ecosystem Consortium
May 7-9
Internet Mountain View
Identity
Workshop February
Vienna
ID Unconference