[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: RE: [ciq] Re: FW: [members] Identity Management 2009 | Call for
Presentations Now Open MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Thanks very much David. Colin, is it also possible to give some slides on t= he use of ciq for identity management work in NZ govt? This may also add va= lue. Thanks Regards, Ram -original message- Subject: RE: [ciq] Re: FW: [members] Identity Management 2009 | Call for Presentations Now Open From: "David RR Webber (XML)" <david@drrw.info> Date: 23/06/2009 20:13 Ram, I've just spotted this is in my backyard. =C2=A0I'll submit something for t= he July 10th when I get back to DC next week. I can provide both DHS perspectives and Elections management examples - hop= efully enough to have a session accepted. Would make sense for us to do something as a TC - to increase chances of se= lection. =C2=A0I'll draft some slides and topic outline for review next wee= k.=C2=A0 =C2=A0 Thanks, DW -------- Original Message -------- Subject: [ciq] Re: FW: [members] Identity Management 2009 | Call for Presentations Now Open From: Ram Kumar <kumar.sydney@gmail.com> Date: Sat, June 20, 2009 3:01 am To: fulton.wilcox@coltsnecksolutions.com Cc: ciq@lists.oasis-open.org 100% agreed Fulton. People always take for granted that name. address and o= ther party characteristics are given! If anyone from CIQ TC who live in USA= is willing to present on CIQ and identity management, please have a go. Ho= w about you Colin given that NZ Govt. has implemented CIQ and the identity = standard? =20 Regards, Ram On Sat, Jun 20, 2009 at 2:32 AM, Fulton Wilcox <fulton.wilcox@coltsnecksolu= tions.com> wrote: =20 =20 Ram, =20 =C2=A0 =20 One of the chronic weaknesses of "identity management" is that people pay a= lot of attention to fingerprints and tokens, etc. but not to standardizing= the party identity and relationship information on which "identity' depend= s. My reaction to the OASIS call for presentations is that there should be = a ciq presentation. =20 =C2=A0 =20 Your thoughts? =20 =C2=A0 =20 =C2=A0 =20 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Fulton Wilcox =20 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Colts neck Solutions LL= C =20 =C2=A0 =20 =C2=A0 =20 =C2=A0 =20 =20 =20 From: Jane Harnad [mailto:jane.harnad@oasis-open.org]=20 Sent: Friday, June 19, 2009 10:40 AM To: members@lists.oasis-open.org Subject: [members] Identity Management 2009 | Call for Presentations Now O= pen =20 =20 =C2=A0 http://events.oasis-open.org/home/forum/2009=20 OASIS is pleased to announce that NIST will be hosting this year=E2=80=99s = event at their Gaithersburg, MD facility! =20 =C2=A0 =20 Proposal Deadline:=C2=A0 10 July 2009 =20 =C2=A0 =20 ABOUT THE CONFERENCE =20 Barack Obama has directed the U.S. National Security Council and Homeland S= ecurity Council "to defend our information and communications infrastructur= e, strengthen public/private partnerships, invest in cutting edge research = and development and to begin a national campaign to promote cyber-security = awareness and digital literacy." The U.S. federal government aims to accomp= lish all of this while becoming increasingly open and transparent.=20 =20 =C2=A0 =20 President Obama also vowed not to dictate security standards to private com= panies and not to monitor private sector networks or Internet traffic, prom= ising to "preserve and protect personal privacy and civil liberties."=20 =20 =C2=A0 =20 How do we balance open access, transparency and accountability with securit= y and privacy?=20 =20 =C2=A0 =20 As national and international governments endeavor to manage citizen's iden= tities while providing open, transparent and trusted services, the challeng= es of managing identities and access to information on such huge scales req= uire careful planning, a strong policy focus, and attention to standards an= d interoperability.=20 =20 =C2=A0 =20 Identity Management 2009 will provide users who are evaluating or looking t= o deploy such security infrastructures with an opportunity to explore the s= tate of the art in security services, standards and products. It will also = provide users with an opportunity to present and share their use cases, req= uirements and (initial) experience with other users and with some of the le= ading experts in this field. =20 OASIS invites proposals for presentations and panel sessions related to th= e security challenges in managing identities and access to information on l= arge scales.=20 Potential topics include, but are not limited to: Information Cards/OpenID/SAML. How can these standards enable more secure= access to sensitive and personal information across government agencies an= d with third party-sites supporting government operations? Social Media. Wh= at are the security risks to agencies that plan to use and support these ne= w, publicly available, previously unimaginable technologies and services?= =C2=A0 How to share information about security incidents and best practice.= Authentication. Can federated digital identity web platforms completely el= iminate the need for multiple usernames and accounts for different agency p= ortals? Smart Cards. Many national economic stimulus systems and applicati= ons will require multi-factor authentication including smart cards =E2=80= =93 how are government agencies using this technology? Citizen Privacy. Wha= t privacy protections are possible in federated systems? Citizen Trust. Ca= n citizens really be trusted to manage their own identity attributes? Clou= d Computing. How do we balance its benefits while managing identity risks?= =C2=A0 How can cloud computing become a trusted platform for data storage?= =20 Key Management.=C2=A0 Large public/private enterprises consume/create enorm= ous amounts of encrypted keys. What is the future of key discovery, mainten= ance and interoperability? For complete submission guidelines and to subm= it a proposal, please go to the event website:=C2=A0 > Event Website:=C2= =A0 http://events.oasis-open.org/home/forum/2009 > Online Submission Form:= =C2=A0 https://www.oasis-open.org/apps/2009_Security_Forum_CFP/register_con= tact.php=20 Key Dates to Remember: Proposals due by =E2=80=93 10 July 2009 Notifications will be sent by =E2= =80=93 31 July 2009 Conference Dates =E2=80=93 28 & 29 September 2009 =20 =C2=A0 =20 =20 =20 =20
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]