06.05.2015 11:00-12:00

European Identity & Cloud Conference 2015
Combined Session


Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols

More panelists to be announced

The lack of control over the flow of personally identifiable data is becoming the most serious inhibitor for the digital economy, further strenghtening the need for standards, technologies and frameworks for secure and transparent data sharing methods. In this session we will move together through the existing building blocks for empowering the user to take full control over his data and create an image on how they fit together.

Extending the Power of Consent with User-Managed Access and OpenUMA

Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.

Crossing The Chasm: Bridging The Divide Between Consumer Identity And Identity In The Enterprise

Consumer identity marches to the beat of a different drum. It does its own thing regardless of enterprise norms and expectations. So how do you solve a problem like consumer identity?

This session take an insightful look at the changing identity landscape and explores the widening gap between consumer and enterprise identity. It talks about the challenges we face as we try to bridge the gap between the carefully controlled enterprise and the complexity of consumers.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.