OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

emergency-adopt message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Fwd: [ciq] Re: FW: [members] Identity Management 2009 | Call forPresentations Now Open


Hi Everyone,

It looks to me like OASIS will have competing events at NIST 
cannibalizing each other's audiences. We need to rework this so that 
we don't have competing events. In fact, I think that events in the 
same week, unless they build on each other, produce less audience for 
both events. I don't know if anyone has done any studies on this, so 
I could be wrong, but in any case, we need to avoid this situation.

Cheers,
Rex

>Mailing-List: contact ciq-help@lists.oasis-open.org; run by ezmlm
>List-Post: <mailto:ciq@lists.oasis-open.org>
>List-Help: <mailto:ciq-help@lists.oasis-open.org>
>List-Unsubscribe: <mailto:ciq-unsubscribe@lists.oasis-open.org>
>List-Subscribe: <mailto:ciq-subscribe@lists.oasis-open.org>
>Delivered-To: mailing list ciq@lists.oasis-open.org
>DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
>         d=gmail.com; s=gamma;
>         h=domainkey-signature:mime-version:received:in-reply-to:references
>          :date:message-id:subject:from:to:cc:content-type;
>         bh=a7uuUUWz1u/drhmfubrAFiZxzgZwrSSUdGtLQlr4Pvw=;
>         b=QD5xPm+R+gpQxjO1jnc8HAAouyvzo9UzmkabNy0LMOG82yAyEOVrZBz2T6T9CJDRf5
>          j2hY3ZQVnV5I3Pg5tXT0r5Rpmh3whLSL/bDJAJ90bzCIs/LFM0lJFjrMkitN1FS9spNC
>          T11P67hUNxPLJFyIee28nKByKwZO6Tv/QmrC0=
>Date: Sat, 20 Jun 2009 17:01:33 +1000
>From: Ram Kumar <kumar.sydney@gmail.com>
>To: fulton.wilcox@coltsnecksolutions.com
>Cc: ciq@lists.oasis-open.org
>Subject: [ciq] Re: FW: [members] Identity Management 2009 | Call for 
>Presentations
>	Now Open
>X-Nonspam: Statistical 50%
>
>100% agreed Fulton. People always take for granted that name. 
>address and other party characteristics are given! If anyone from 
>CIQ TC who live in USA is willing to present on CIQ and identity 
>management, please have a go. How about you Colin given that NZ 
>Govt. has implemented CIQ and the identity standard?
>
>Regards,
>
>Ram
>
>On Sat, Jun 20, 2009 at 2:32 AM, Fulton Wilcox 
><<mailto:fulton.wilcox@coltsnecksolutions.com>fulton.wilcox@coltsnecksolutions.com> 
>wrote:
>
>Ram,
>
>One of the chronic weaknesses of "identity management" is that 
>people pay a lot of attention to fingerprints and tokens, etc. but 
>not to standardizing the party identity and relationship information 
>on which "identity' depends. My reaction to the OASIS call for 
>presentations is that there should be a ciq presentation.
>
>Your thoughts?
>
>Fulton Wilcox
>
>Colts neck Solutions LLC
>
>
>From: Jane Harnad 
>[mailto:<mailto:jane.harnad@oasis-open.org>jane.harnad@oasis-open.org]
>Sent: Friday, June 19, 2009 10:40 AM
>To: <mailto:members@lists.oasis-open.org>members@lists.oasis-open.org
>Subject: [members] Identity Management 2009 | Call for Presentations Now Open
>
>
><http://events.oasis-open.org/home/forum/2009>http://events.oasis-open.org/home/forum/2009
>
>OASIS is pleased to announce that NIST will be hosting this year's 
>event at their 
><http://www.nist.gov/public_affairs/maps/nistmaps.html>Gaithersburg, 
>MD facility!
>
>Proposal Deadline: 10 July 2009
>
>ABOUT THE CONFERENCE
>
>Barack Obama has directed the U.S. National Security Council and 
>Homeland Security Council "to defend our information and 
>communications infrastructure, strengthen public/private 
>partnerships, invest in cutting edge research and development and to 
>begin a national campaign to promote cyber-security awareness and 
>digital literacy." The U.S. federal government aims to accomplish 
>all of this while becoming increasingly open and transparent.
>
>President Obama also vowed not to dictate security standards to 
>private companies and not to monitor private sector networks or 
>Internet traffic, promising to "preserve and protect personal 
>privacy and civil liberties."
>
>How do we balance open access, transparency and accountability with 
>security and privacy?
>
>As national and international governments endeavor to manage 
>citizen's identities while providing open, transparent and trusted 
>services, the challenges of managing identities and access to 
>information on such huge scales require careful planning, a strong 
>policy focus, and attention to standards and interoperability.
>
>Identity Management 2009 will provide users who are evaluating or 
>looking to deploy such security infrastructures with an opportunity 
>to explore the state of the art in security services, standards and 
>products. It will also provide users with an opportunity to present 
>and share their use cases, requirements and (initial) experience 
>with other users and with some of the leading experts in this field.
>
>OASIS invites proposals for presentations and panel sessions related 
>to the security challenges in managing identities and access to 
>information on large scales.
>
>Potential topics include, but are not limited to:
>
>Information Cards/OpenID/SAML. How can these standards enable more 
>secure access to sensitive and personal information across 
>government agencies and with third party-sites supporting government 
>operations?
>Social Media. What are the security risks to agencies that plan to 
>use and support these new, publicly available, previously 
>unimaginable technologies and services? How to share information 
>about security incidents and best practice.
>Authentication. Can federated digital identity web platforms 
>completely eliminate the need for multiple usernames and accounts 
>for different agency portals?
>Smart Cards. Many national economic stimulus systems and 
>applications will require multi-factor authentication including 
>smart cards - how are government agencies using this technology?
>Citizen Privacy. What privacy protections are possible in federated systems?
>Citizen Trust. Can citizens really be trusted to manage their own 
>identity attributes?
>Cloud Computing. How do we balance its benefits while managing 
>identity risks? How can cloud computing become a trusted platform 
>for data storage?
>Key Management. Large public/private enterprises consume/create 
>enormous amounts of encrypted keys. What is the future of key 
>discovery, maintenance and interoperability?
>For complete submission guidelines and to submit a proposal, please 
>go to the event website:
>
>  > Event Website: 
><http://events.oasis-open.org/home/forum/2009>http://events.oasis-open.org/home/forum/2009
>
>  > Online Submission Form: 
><https://www.oasis-open.org/apps/2009_Security_Forum_CFP/register_contact.php>https://www.oasis-open.org/apps/2009_Security_Forum_CFP/register_contact.php
>
>Key Dates to Remember:
>
>Proposals due by - 10 July 2009
>Notifications will be sent by - 31 July 2009
>Conference Dates - 28 & 29 September 2009
>
>
>Content-Type: application/octet-stream; name="image001.jpg"
>Content-ID: <image001.jpg@01C9F0DA.0D6947B0>
>X-Attachment-Id: 0.1


-- 
Rex Brooks
President, CEO
Starbourne Communications Design
GeoAddress: 1361-A Addison
Berkeley, CA 94702
Tel: 510-898-0670


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]