Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols
The lack of control over the flow of personally identifiable data is becoming the most serious inhibitor for the digital economy, further strenghtening the need for standards, technologies and frameworks for secure and transparent data sharing methods. In this session we will move together through the existing building blocks for empowering the user to take full control over his data and create an image on how they fit together.
Extending the Power of Consent with User-Managed Access and OpenUMA
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.
Crossing The Chasm: Bridging The Divide Between Consumer Identity And Identity In The Enterprise
Consumer identity marches to the beat of a different drum. It does its own thing regardless of enterprise norms and expectations. So how do you solve a problem like consumer identity?
This session take an insightful look at the changing identity landscape and explores the widening gap between consumer and enterprise identity. It talks about the challenges we face as we try to bridge the gap between the carefully controlled enterprise and the complexity of consumers.