IDtrust 2010
9th Symposium on Identity and Trust on the Internet
Program


Notes

Transportation

There will be a shuttle bus leaving the Gaithersburg Holiday Inn at 8:00 a.m. Tuesday and Wednesday morning to travel to NIST. The shuttle will return to the hotel at the end of the sessions on Tuesday and Wednesday. There will not be a shuttle bus on Thursday - please car pool or use the hotel shuttle.

Wireless

802.11b Wireless access points will be available for at least SSH, IPSEC, HTTP, DNS, FTP, POP, IMAP, and SMTP connectivity.

Proceedings at ACM Digital Library

The proceedings are also available in the ACM International Conference Proceeding Series archive: Proceedings of the 9th Symposium on Identity and Trust on the Internet (ISBN:978-1-60558-895-7).

Blogging

Participants and observers are encouraged to use the tag "idtrust2010" when blogging and tweeting about the symposium.


Program

Tuesday, April 13, 2010 - Full Day

8:00 Bus Departs from Gaithersburg Holiday Inn for NIST

8:30 - 9:00 Registration and Continental Breakfast

9:00 - 9:10 Welcome and Opening Remarks

Program Chair: Carl Ellison, Independent (Slides: pptx )

9:10 - 10:00 Keynote Talk I

The Central Role of Identity Authentication in Immigration Reform
Bruce Morrison, Morrison Public Affairs Group

10:00 - 10:15 Break

10:15 - 11:40 Session 2: Technical Papers - Identity Providers and Federation

Session Chair: Peter Alterman, National Institutes of Health

Federated Login to TeraGrid
(Presentation slides: pptx pdf )

Jim Basney, National Center for Supercomputing Applications

Terry Fleury, National Center for Supercomputing Applications

Von Welch, National Center for Supercomputing Applications

An Identity Provider to manage Reliable Digital Identities for SOA and the Web
(Presentation slides: pdf )

Ivonne Thomas, Hasso-Plattner-Institute

Christoph Meinel, Hasso-Plattner-Institute

CardSpace-Liberty Integration for CardSpace Users
(Presentation slides: ppt )

Haitham Al-Sinani, Royal Holloway, University of London

Waleed Alrodhan, Royal Holloway, University of London

Chris Mitchell, Royal Holloway, University of London

11:40 - 12:00 Break

12:00 - 1:00 Session 3: Technical Papers - Policy Conflict Resolution

Session Chair: David Chadwick, University of Kent

An Attribute-based Authorization Policy Framework with Dynamic Conflict Resolution
(Presentation slides: ppt )

Apurva Mohan, Georgia Tech

Douglas Blough, Georgia Tech

Computational Techniques for Increasing PKI Policy Comprehension by Human Analysts
(Presentation slides: ppt )

Gabriel Weaver, Dartmouth College

Sean Smith, Dartmouth College

Scott Rea, Dartmouth College

1:00 - 2:00 Lunch

2:00 - 3:30 Session 4: Panel - Identity Proofing

Panel Moderator: Elaine Newton, National Institute of Standards and Technology

Darrell Williams, Department of Homeland Security

Jim McCabe, American National Standards Institute (ANSI) (Slides: ppt pdf )

Brian Zimmer, Coalition for a Secure Driver's License

3:30 - 4:00 Break

4:00 - 5:30 Session 5: Panel - Four Bridges Forum: How Federated Identity Trust Hubs Improve Identity Management

Panel Moderator: Peter Alterman, National Institutes of Health

Tim Pinegar, Federal PKI Architecture (Slides: pptx pdf )

Mollie Shields-Uehling, SAFE-BioPharma Association (Slides: ppt )

Scott Rea, HEBCA Operating Authority (Slides: ppt )

Jeff Nigriny, CertiPath (Slides: ppt )

5:30 Bus Departs for Gaithersburg Holiday Inn

6:00 Social Gathering and Dinner Buffet - Gaithersburg Holiday Inn


Wednesday, April 14, 2010 - Full Day

8:00 Bus Departs from Gaithersburg Holiday Inn for NIST

8:30 - 9:00 Registration and Continental Breakfast

9:00 - 9:50 Keynote Talk II

Internet Voting: Threat or Menace?
(Presentation slides: ppt pdf )
Jeremy Epstein, SRI International

9:50 - 10:10 Break

10:10 - 11:10 Session 7: Panel - End-to-End and Internet Voting

Panel Moderator: Neal McBurnett, Internet2

Poorvi Vora, George Washington University (Slides: ppt )

Jeremy Epstein, SRI International

11:10 - 11:40 Invited Talk - Using the DNS as a Trust Infrastructure with DNSSEC

Scott Rose, NIST (Slides: pptx )

11:40 - 12:00 Break

12:00 - 1:00 Session 8: Technical Papers - Privacy

Session Chair: Stephen Whitlock, Boeing

Efficient and Privacy-Preserving Enforcement of Attribute-Based Access Control
(Presentation slides: pdf )

Ning Shang, Purdue University

Federica Paci, University of Trento

Elisa Bertino, Purdue University

Privacy-Preserving DRM
(Presentation slides: ppt )

Radia Perlman, Intel Labs

Charlie Kaufman, Microsoft

Ray Perlner, NIST

1:00 - 2:00 Lunch

2:00 - 2:30 Session 9: Invited Talk - Hash Competition

Introduction: Carl Ellison, Independent

Bill Burr, National Institute of Standards and Technology (Slides: pdf ppt )

2:30 - 3:00 Session 10: Technical Papers - Biometrics

Session Chair: David Chadwick, University of Kent

Biometrics-Based Identifiers for Digital Identity Management
(Presentation slides: pdf )

Abhilasha Bhargav-Spantzel, Intel Corporation

Anna Squicciarini, Pennsylvania State University

Elisa Bertino, Purdue University

Xiangwei Kong, Dalian University of Technology

Weike Zhang, Dalian University of Technology

3:00 - 3:30 Break

3:30 - 4:00 Session 11: Invited Talk: Personal Identity Platforms

Bill MacGregor, National Institute of Standards and Technology (Slides: ppt )

4:00 - 5:30 Session 12: Panel - The Path to Citizen Identity Federation Worldwide: How Kantara Initiative Programs are enabling Citizen Identity Federation

Panel Moderator: Roger Martin, Kantara Initiative

Vikas Mahajan, AARP

Jim Zok, Computer Sciences Corporation

Elaine Newton, National Institute of Standards and Technology

Jack Leipold, Social Security Administration

Bill Young, Department of Internal Affairs

5:30 Bus Departs for Gaithersburg Holiday Inn

Dinner (on your own)


Thursday April 15, 2010 - Half Day

8:00 No Bus - please share rides to NIST

8:30 - 9:00 Registration and Continental Breakfast

9:00 - 10:00 Session 13: Technical Papers - Infrastructure

Session Chair: Peter Alterman, National Institutes of Health

Practical and Secure Trust Anchor Management and Usage
(Presentation slides: ppt pdf )

Carl Wallace, Cygnacom Solutions

Geoff Beier, Cygnacom Solutions

A Proposal for Collaborative Internet-scale trust infrastructures deployment: the Public Key System (PKS)
(Presentation slides: pdf )

Massimiliano Pala, Dartmouth College

10:00 - 10:30 Break

10:30 - 11:30 Session 14: Panel – Levels of Assurance for Attributes

Panel Moderator: Carl Ellison, Independent (Slides: pptx )

David Chadwick, University of Kent (Slides: ppt )

Ken Klingenstein, Internet2 (Slides: ppt )

Chris Louden, Protiviti (Slides: ppt )

Peter Alterman, National Institutes of Health (Slides: ppt )

11:30 - 12:15 Session 15: RUMP Session (Work in Progress)

Session Chair: Neal McBurnett, Internet2

Deployment Experience for the PKI Resource Query Protocol for Grids and FBPKI
(Presentation slides: odp pdf )
Massimiliano Pala, Dartmouth College

Preferred model for multiple federations: 'Interfederation' ala the Internet or 'Superposition of federations' ala credit card industry?
Bill MacGregor's question, NIST

12:15 - 12:30 Wrap up

See Also

This workshop is part of the IDtrust Symposium Series
Location
NIST
Gaithersburg, MD
Sponsors

National Institute of Standards and Technology

Internet2

OASIS IDtrust Member Section

Federal PKI Policy Authority

Important Dates
Papers due:
Dec 20, 2009
(Extended)
Notification to authors:
Jan 15, 2010
Panel proposals due:
Jan 24, 2010
Final papers due:
Feb 21, 2010
Registration deadline:
Apr 6, 2010
(Extended)
Symposium:
Apr 13-15, 2010