•  TYPE: Track   DATES: April 18 – April 19, 2012

Conference Tracks

EIC Round Tables add a new dimension to the agenda: deep dives into some of the most important topics, high interaction, small groups.


Roundtable: Consumer Identity


Consumer Identity Systems – Trends

Date: Wednesday, April 18, 2012 Time: 10:30-12:30

Consumer Identity Systems – Trends
Consumer expectations of their online experience is becoming ever more sophisticated. Whilst the negative aspects of online privacy is becoming understood and questioned. These tenets are impacting the design and development of consumer identity systems. Can our current offerings, such as SAML, OpenID Connect and Information Cards, provide the type of identity system that will perform to the needs of an increasingly sophisticated audience in terms of user control, privacy and security?

A Review of the Status of key Internet Identity Protocols OpenID Connect, OAuth 2.0 and Account Chooser
Description: A high level overview of the protocol, and an explanation of why major technology companies have standardized on it including Google, Microsoft, Facebook, Yahoo, etc. We will also discuss how the functionality of the OpenID v2 protocol has been reimplemented on top of OAuth to create OpenID Connect. The session will also discuss the security problems of websites that run their own password based login systems.

Barn-Rasing At Internet Scale: Trust Framework Development for Open Identity
In April 2011, the US Department of Commerce released its National Strategy for Trusted Identities in Cyberspace (NSTIC) calling for a public-private partnership to create a secure commercial, social, and civic identity ecosystem. The Open Identity Exchange (OIX) has taken the lead in constructing both the rules and tools for the rapid, internet-scale creation of such an ecosystem: the Trust Framework.

Personal Data: Life Management Platforms


Getting Personal: How can Each of us Live in a World of Corporate Silos — While also Building a World that Transcends them?!

Date: Wednesday, April 18, 2012 Time: 14:00-15:00

Getting Personal: How can Each of us Live in a World of Corporate Silos — While also Building a World that Transcends them?!

Giving Individuals Control and Knowledge of their Personal Information held by Others – What are the Consequences?

Trust Frameworks – Internet Identity – Life Management Platforms
This roundtable will examine the role of socially-verified trust networks in the emergence of Internet identity and the personal data ecosystem.

The GINI-SA Project of the EU
GINI-SA is a Support Action for the EC which aims to analyse how a Personalized Identity Management (PIM) ecosystem in which individuals can manage their own digital identities and control the exchange of their identity information. Under the GINI vision, individuals would manage their identities by means of an Individual Digital Identity (‘INDI’). An INDI can be described as a self-generated and self-managed digital identity, which is verifiable against one or more…


Date: Wednesday, April 18, 2012 Time: 17:00-18:00




Digital Enlightenment Forum


Anonymous Credentials in Practice

Date: Thursday, April 19, 2012 Time: 10:30-12:30

Anonymous Credentials in Practice
Anonymous credentials allow users to reveal certain properties (like their age, nationality, subscriptions) about themselves, without revealing their full name. Such credentials have obvious privacy advantages. For increased security and improved user experience, such credentials are ideally implemented on a smart card. Until recently, however, the complex cryptography involved has made this impossible. In this talk I will discuss recent results that show that efficient implementations of…

What ABC4Trust can do for Privacy in eID
The need for privacy-respecting use of unique identifiers in emerging European eID cards has been underlined by many. The emerging privacy-ABCs (Attribute-based Credentials) technologies have significant potential in this area. One of the goals of the European Project ABC4Trust is to provide a common unified architecture for privacy-ABCs that is independent of the specific technologies existing today (e.g. Idemix, U-Prove) and support the federation and interoperability between them. In this…

Privacy Protection: Architecture does not compromise, but application often will – what can be done?
The presentation will highlight that TAS3 as an architecture, with pair-wise pseudonymous design throughout, will not mandate as a technical requirement for operation any privacy compromise. However, we are fully aware that users may supply voluntarily to applications (sometimes the apps even have need to know) privacy compromising information. This motivates the legal/audit/accountability (trustworthiness) aspect of TAS3. Given that PII is going to be given to apps by users, there has to…

STORK: Technical Solution and Data Protection Considerations
The STORK Large Scale Pilot brought eighteen EU and EEA Member States together to implement an interoperability solution on top of their national eID initiatives. The solution has been tested between in 2010 and 2011 in six cross-border pilots. The presentation will describe the technical solution and will discuss lessons learned from its deployment in production systems. Particular attention will be given to privacy aspects. The presentation will describe what privacy measures have been…

eID Management in Australasia – What are the Paths taken und what may the Future hold?
SAML, the OASIS WS* and PKI are all familiar tools for privacy (and security) respecting eID Management. This short presentation will trace the technology paths taken in varous initiatives in Australasia, and what the future may hold

Minimal Disclosure: Achieving lift-off

Roundtable: Mobile Privacy and Security


Privacy in the age of BYOD and Enterprise Mobility

Date: Thursday, April 19, 2012 Time: 14:00-16:00

Privacy in the age of BYOD and Enterprise Mobility
BYOD, or Bring Your Own Device, is a trend which means that corporate IT may no longer control what devices employees use to connect to corporate applications. In this new environment, employees use iPads and smartphones for work, expecting to use enterprise applications anytime and anywhere. This presents significant challenges, including the fact that devices may not interface directly with corporate identity management systems. In this track, we examine the implications of BYOD on the…

Mobile data Security and Privacy
Physical security of mobile devices is poor. It is good practice to enforce stronger data security and privacy policies for data bound to mobile clients, and have mandatory remote wipe functionalities. How can you implement tiered data security / privacy policies that are mobile aware? For example, when a REST API is being called by a web app from an internal IP, enforce minimum restrictions, where as if the caller is an iPhone application, enforce maximum restrictions.

Securing the Mobile API Ecosystem
Many organizations are deploying APIs, using REST and JSON, to enable mobile application developers to create apps using their APIs. In this way, an organisation can quickly create an ecosystem of developers creating apps for their services. However, how can these APIs be secured? How is usage controlled? This session focuses on API Management in the age of mobile.

Bridging from Mobile to on-Premise

Date: Thursday, April 19, 2012 Time: 16:30-17:30

Bridging from Mobile to on-Premise
Organisations are under pressure to deliver applications to mobile devices. However, many of the applications to be deployed to mobile clients currently reside behind the firewall. How can this gap be bridged? In this track, the question of mobile-enablement of on-premises applications is addressed.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.