SlideShare a Scribd company logo
1 of 168
Download to read offline
Kaliya Young
Self-Sovereign Identity
Domains of Identity
+
@ Aug 29, 2018
This presentation includes
slides from the following
Community members:
* Drummond Reed
* Manu Sporny
* Timothy Ruff
* John Jordan & BC Team
Kaliya Young
Self-Sovereign Identity
Domains of Identity
+
@ Aug 29, 2018
1. The MyData ā€”> Identity Connection
2. How did I begin in Identity?
3. The Domains of Identity - My Masters Report
4. An Overview of Self-Sovereign Identity
5. Conclusion ā€”> Creating Alignment
begins with Identity
Identity is
socially constructed
& contextual
Who you see
yourself to be.
Who you preset
yourself to be.
How you are
seen.
Groups
Identity Contexts Are Social
with People Family
https://www.ļ¬‚ickr.com/photos/houseoļ¬‚im/409869608https://www.ļ¬‚ickr.com/photos/twiga_swala/2286910386/ https://www.ļ¬‚ickr.com/photos/genista/346236490/
Identity Contexts are also
Institutional Organizational
https://www.ļ¬‚ickr.com/photos/tomsaint/33022263665 https://www.ļ¬‚ickr.com/photos/usdagov/9583705941/
Increasingly Contexts
Involve Devices
https://www.ļ¬‚ickr.com/photos/medithit/41538066141
Key aspects of ā€œidentityā€ in these
contexts are the identiļ¬ers that
come with those contexts.
Sports Association Number
Identiļ¬ers of many types
Student Numbers
Customer Numbers
Airline Points numbers
Patient Numbers
Government ID Number
Passport
Names
In the Digital World we have
even more identiļ¬ers.
some we can pick..
ā€¦in someone elseā€™s name space
ORGYOU
Account
They can be your ā€œIdentity Providerā€
ORGIDPYOU
MYURL.COM
ā€¦but we really rent themā€¦
some identiļ¬ers we can pickā€¦
#ā€¦and we rent our
phone numbers
There are no digital identiļ¬ers
we really own.
Without control of our identiļ¬ers
we canā€™t have control
over our personal data.
How do we own our own digital
identiļ¬ers?
The quest for this is one I have
been on for 15 years
Global Ecology and
Information Technology
2000
The Link Tank
Building Identity and
Trust into the Next
Generation Internet
Underlying this report is the
assumption that every individual ought
to have the right to control his or
her own online identity. You should be
able to decide what information about
yourself is collected as part of your
digital profile, and of that
information, who has access to
different aspects of it.
Certainly, you should be able to read
the complete contents of your own
digital profile at any time. An online
identity should be maintained as a
capability that gives the user many
forms of control. Without flexible
access and control, trust in the
system of federated network identity
will be minimal.
A digital profile is not treated [by
corporations who host them] as the
formal extension of the person it
represents. But if this crucial data
about you is not owned by you, what
right do you have to manage its use?
A civil society approach to persistent
identity is a cornerstone of the
Augmented Social Network project.
Organizations would have identities
People would have identities
OPEN STANDARDS FOR IDENTIFIERS & DATA EXCHANGE
They would be able to connect on their own terms
Each being ļ¬rst class nodes on the network.
Building Identity and
Trust into the Next
Generation Internet
Internet Identity Workshop 2005
First I need to share the
Domains of Identity
Its Everyone,
Everywhere
https://www.ļ¬‚ickr.com/photos/nasamarshall/3945024874
Master of Science in
Identity Management
and Security
Identity and Security Class
Master of Science in
Identity Management
and Security
What are all the diļ¬€erent
places that PII ends
up in databases?
1. Me and My Identity
1. Me and My Identity
User-Centric Digital Identity
1. Me and My Identity
Indie Web Eļ¬€orts
1. Me and My Identity
Quantiļ¬ed Self Movement
1. Me and My Identity
Self-Sovereign Identity
1. Me and My Identity
MyData
1. Me and My Identity
Children
Elders
2. You and My Identity
Delegated Relationships
These are the source of data in the
interactions with the next 12 domains.
The Next 12 Domains
2
1 REGISTRATION
IDENTIFICATION
Government Registration
3. Government Registration
Government Transactions
2
1 IDENTIFICATION
SERVICES
4. Government Transactions
Civil Society
Health Care
Education Union Membership
Religious Institutions
Sports Teams
Civic Participation
Professional 

Associations
2
1 REGISTRATION
CREDENTIALS
Civil Society Registration
5. Civil Society Registration
Civil Society Transactions
CREDENTIALS
SERVICES
1
2
6. Civil Society Transaction
Commercial Registration
2
1
REGISTRATION
CREDENTIALS
7. Commercial Registration
Commercial Transactions
1
CREDENTIALS
GOODS & SERVICES
2
3
PAYMENT
8. Commercial Transaction
1
2
4
3
Employment Registration
APPLICATION
CREDENTIALS
ENROLLMENT
12. Employment Registration
1
2
3
Employment Transaction
WORK TRANSACTION
CREDENTIALS
13. Employment Transactions
Surveillance
1) Voluntary Known
Surveillance
1) Voluntary Known
2) Involuntary Known
Surveillance
Surveillance
1) Voluntary Known
2) Involuntary Known
3) Involuntary Unknown
Government Surveillance
9. Government Surveillance
Civial Society Surveillance
10. Civil Society Surveillance
Commercial Surveillance
11. Commercial Surveillance
Employment Surveillance
WORK
14. Employment Surveillance
1
15. Data Broker Industry
1
2
3
DATA
PUBLIC DATA
DIGITAL DOSSIERS
DA
T
A
DATA
4
6
5
5
DATA
16. Black Market
Surveillance
Sousveillance
Sousveillance
Surveillance
Sousveillance
Sousveillance
Self-Sovereign
Identity
Domains ofā€Ø
Identity
https://medium.com/evernym/the-three-models-of-digital-identity-relationships-ca0727cb5186
PEER
YOU
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
Agent/Hub
PEERYOU
Self-Sovereign Identity
Decentralized IDentiļ¬er - DID
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Method
Scheme
Method-Specific Identifier
Slide credit: Drummond Reed, Sovrin Foundation
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Slide credit: Drummond Reed, Sovrin Foundation
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
047d599d4521480d9e1919481b024f29d2693f2
72d19473dbef971d7d529f6e9
Privateā€Ø
Key
Public
Key
cc2cd0ffde594d278c2d9b432f4748506a7f9f2
5141e485eb84bc188382019b6
Slide credit: Drummond Reed, Sovrin Foundation
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
047d599d4521480d9e1919481b024f29d2693f2
72d19473dbef971d7d529f6e9
Privateā€Ø
Key
Public
Key
cc2cd0ffde594d278c2d9b432f4748506a7f9f2
5141e485eb84bc188382019b6
Slide credit: Drummond Reed, Sovrin Foundation
HELD IN A WALLET
{ ā€œKeyā€: ā€œValueā€ }
DID
Decentralized
Identifier
DID Document
JSON-LD document
describing the
entity identified by
the DID
Slide credit: Drummond Reed, Sovrin Foundation
1. DID (for self-description)
2. Set of public keys (for verification)
3. Set of auth protocols (for authentication)
4. Set of service endpoints (for interaction)
5. Timestamp (for audit history)
6. Signature (for integrity)
!88
The standard elements of a DID doc
Slide credit: Drummond Reed, Sovrin Foundation
Example DID Document (Part 1)
!89
{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"publicKey": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaSigningKey2018",
"owner": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn"
}],
"authentication": [{
"type": "RsaSignatureAuthentication2018",
"publicKey": "did:example:123456789abcdefghi#keys-1"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}],
Slide credit: Drummond Reed, Sovrin Foundation
Example DID Document (Part 2)
!90
"created": "2002-10-10T17:00:00Z",
"updated": "2016-10-17T02:41:00Z",
"signature": {
"type": "RsaSignature2016",
"created": "2016-02-08T16:02:20Z",
"creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1",
"signatureValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0
yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/
gi25s="
}
}
Slide credit: Drummond Reed, Sovrin Foundation
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
Agent/Hub
Shared Ledgers
BTCR IPFS
!92
Method DID prefix
Sovrin did:sov:
Bitcoin Reference did:btcr:
Ethereum uPort did:uport:
Blockstack did:stack:
Veres One did:v1:
IPFS did:ipld:
Active DID Method Specs
Slide credit: Drummond Reed, Sovrin Foundation
1. The syntax of the method-specific identifier
2. Any method-specific elements of a ā€Ø
DID document
3. The CRUD (Create, Read, Update, Delete)
operations on DIDs and DID documents for
the target system
!93
A DID Method spec definesā€¦
Slide credit: Drummond Reed, Sovrin Foundation
Building a Universal Resolver
WALLET
Agent/Hub
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
Agent/Hub
S
Identiļ¬er Owners
Edge Layer
Cloud Layer
Agent/HubAgent/Hub
WALLET WALLET
IPFS
BTCR
Secure Communication Channel with PKI
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
Agent/Hub
S
Identiļ¬er Owners
Edge Layer
Cloud Layer
Agent/HubAgent/Hub
WALLET WALLET
IPFS
BTCR
Secure Communication Channel with PKI
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Slide credit: Drummond Reed, Sovrin Foundation
Who cares about really long numbers?
Veriļ¬able Credentials
HOLDERHOLDER VERIFIERVERIFIER
When a credential is shown to a veriļ¬er with a
proof of ID, veriļ¬cation is highly fallible.
Fancy print gimmicks might make a credential seem
authentic but these are easy to forge these days.
How do you know its true?
Withoutā€¦
THE CENTRALIZED DATABASE
Veriļ¬cation systems
are overly complex ā€¦
PORTAL
and create
privacy problem.
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
Agent/Hub
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
A Verifiable Credential has a standard format.
110
Slide credit: Manu Sporny Veres One
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
ISSUER WALLET VERIFIER
No PII
ends up on the shared ledgers
WALLET
Agent/Hub
WALLET
Agent/Hub
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
3.GovernmentRegistration
WALLET
Agent/Hub
GovernmentTransactions
2
1
IDENTIFICATION
SERVICES
4.GovernmentTransactions
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
3.GovernmentRegistration
WALLET
Agent/Hub
GovernmentTransactions
2
1
IDENTIFICATION
SERVICES
4.GovernmentTransactions
2
1
REGIST
RATION
CRED
ENTIALS
CivilSociety
Registration
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
3.GovernmentRegistration
5.CivilSocietyRegistration
WALLET
Agent/Hub
GovernmentTransactions
2
1
IDENTIFICATION
SERVICES
4.GovernmentTransactions
CivilSocietyTransactions
CRED
ENTIALS
SERVICES1
2
6. Civil Society Transaction
2
1
REGIST
RATION
CRED
ENTIALS
CivilSociety
Registration
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
3.GovernmentRegistration
5.CivilSocietyRegistration
WALLET
Agent/Hub
GovernmentTransactions
2
1
IDENTIFICATION
SERVICES
4.GovernmentTransactions
CivilSocietyTransactions
CRED
ENTIALS
SERVICES1
2
6. Civil Society Transaction
2
1
REGIST
RATION
CRED
ENTIALS
CivilSociety
Registration
1
2
4
3
Employment Registration
APPLICATION
CREDENTIALS
ENROLLMENT
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
3.GovernmentRegistration
5.CivilSocietyRegistration
13.EmploymentRegistration
WALLET
Agent/Hub
GovernmentTransactions
2
1
IDENTIFICATION
SERVICES
4.GovernmentTransactions
CivilSocietyTransactions
CRED
ENTIALS
SERVICES1
2
6. Civil Society Transaction
1
2
3
Em
ploym
entTransaction
WORKTRANSAC
TION
CREDENTIA
LS
13. Employment Transactions
2
1
REGIST
RATION
CRED
ENTIALS
CivilSociety
Registration
1
2
4
3
Employment Registration
APPLICATION
CREDENTIALS
ENROLLMENT
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
3.GovernmentRegistration
5.CivilSocietyRegistration
13.EmploymentRegistration
WALLET
Agent/Hub
GovernmentTransactions
2
1
IDENTIFICATION
SERVICES
4.GovernmentTransactions
CivilSocietyTransactions
CRED
ENTIALS
SERVICES1
2
6. Civil Society Transaction
1
2
3
Em
ploym
entTransaction
WORKTRANSAC
TION
CREDENTIA
LS
13. Employment Transactions
2
1
REGIST
RATION
CRED
ENTIALS
CivilSociety
Registration
1
2
4
3
Employment Registration
APPLICATION
CREDENTIALS
ENROLLMENT
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
CommercialRegistration
2
1
REGISTRATION
CREDENTIA
LS
3.GovernmentRegistration
5.CivilSocietyRegistration
7.Com
m
ercialRegistration
13.EmploymentRegistration
WALLET
Agent/Hub
GovernmentTransactions
2
1
IDENTIFICATION
SERVICES
4.GovernmentTransactions
CivilSocietyTransactions
CRED
ENTIALS
SERVICES1
2
6. Civil Society Transaction
Commercial Transactions
1
CRE
D
ENTIALS
GOODS & SERVICE
S
2
3
PAYM
ENT
8.Com
m
ercialTransaction
1
2
3
Em
ploym
entTransaction
WORKTRANSAC
TION
CREDENTIA
LS
13. Employment Transactions
2
1
REGIST
RATION
CRED
ENTIALS
CivilSociety
Registration
1
2
4
3
Employment Registration
APPLICATION
CREDENTIALS
ENROLLMENT
2
1
REGISTRATION
IDENTIFICATION
GovernmentRegistration
CommercialRegistration
2
1
REGISTRATION
CREDENTIA
LS
3.GovernmentRegistration
5.CivilSocietyRegistration
7.Com
m
ercialRegistration
13.EmploymentRegistration
WALLET
Agent/Hub
ISSUER WALLET VERIFIER
Shared Ledger or other Immutable Data Store
Agent/Hub
PEERYOU
Individuals have their own Identities
What about the organizations?
Veriļ¬able Organizations Network
Paper documents are cumbersome as
proof of legal compliance and permission.
REGISTERED
PERATING
PERMIT QUALIFICATION
Certificate of
PERMIT
en
CONFIRMATION
LETTER
REGISTERED
PERATING
PERMIT QUALIFICATION
Certificate of
PERMIT
en
CONFIRMATION
LETTER
Letā€™s look at an example
PROVINCE
INCORPORATION
REGIONAL HEALTH
AUTHORITY
PERMIT
MUNICIPALITY
BUSINESS
LICENSE
Mary requires a variety of documents
in order to establish her bakery.
Some requirements are not obvious,
so sheā€™ll have to do her homework.
This journey involves
multiple sources ā€¦
PROVINCE
INCORPORATION
REGIONAL HEALTHAUTHORITY
PERMIT
MUNICIPALITY
BUSINESS
LICENSE
ā€¦ and modes of
service delivery.
STEP 12
All of this activity
is a major burden
for all involved.
What if ā€¦ businesses could provide veriļ¬able proofs
about qualiļ¬cations when transacting online?
Mary owns this proof-of status for her business
Certiļ¬cate
issued
Certiļ¬cate
shared
Certiļ¬cate
veriļ¬ed
The credential deļ¬nition is created and published
on the blockchain (ledger) by an issuer.
DEFINITIONDEFINITION LEDGERLEDGERISSUERISSUER
Open registry of
decentralized identiļ¬ers.
PERMIT
ISSUERS
HOLDER
VERIFIERS
We have a chicken-or-egg dilemma.
How do we kickstart one side of the market?
What can services plug into to get things rolling?
Welcome to
British Columbiaā€™s
veriļ¬able organizations.
search
TheOrgBook ļ¬lls that role and unlocks
the hidden value of BC Registries data.
Registration, permit, and license services
can plug into incorporated businesses.
Welcome to
British Columbiaā€™s
veriļ¬able organizations.
search
Digitally signed and sealed veriļ¬able claims
A global, open
blockchain
registry
MARY OLIVIERA
The new enrollment experience
is more convenient ā€¦
ā€¦ with a global, open
blockchain registry.
Mary can own her proof-of-status and
store them in her digital wallet ā€¦
ā€¦ which opens up more
service possibilities ā€¦
A decentralized veriļ¬able credential is carried by
the holder on a smart phone or other computing
device.
The phone does
a lot of the work
as the holderā€™s
agent.
Organizations now have identities
Organizations now have identities
People now have identities
Organizations now have identities
People now have identities
OPEN STANDARDS FOR IDENTIFIERS & DATA EXCHANGE
ssiscoop.com
Protocol is a language that regulates ļ¬‚ow,
directs netspace, codes relationships, and
connects life forms. It is etiquette for
autonomous agents. -Alexander Gallway, Protocol
We must make it right.
We must make it happen.
ā€¦but who is we?
ā€¦and how do we do it?
We isā€¦.
Decentralized 

Identity 

Foundation
We isā€¦.
ā€œeveryoneā€
We isā€¦.
We must Practice Systems Leadership
We must Practice Systems Leadership
Phase 1:

See the Larger System
Have an Ecosystem Map
Have an Ecosystem Map
^
upto date
We must Practice Systems Leadership
Phase 1:

See the Larger System
Phase 2:

Reļ¬‚ective and Generative
Conversation
EMPLOY Systems Leaders
Build Self-Organizing Capacity
We must
Hire good community ā€œmanagersā€catalysts
We must Practice Systems Leadership
Phase 1:

See the Larger System
Phase 2:

Reļ¬‚ective and Generative
Conversation
Phase 3:

Co-Create the Future
Coordinate development of
common building blocks:
Code, Infrastructure, Protocolsā€¦.
Ship Interoperable Products
Coordinate development of
common building blocks:
Code, Infrastructure, Protocolsā€¦.
Ship Interoperable Products
Work towards alignment,
not control.
Ask and listen ļ¬rst.
Write it down.
Put a stake in the ground.
Create real-time feedback loops.
What does it take to Build Alignment?
Remind each other what weā€™re doing and why.
Alignment is a process.
We must set our expectations
accordingly, and celebrate
each victory along the way.
We will make it right.
We will make it happen.
Together!
ssiscoop.com
Kaliya Young
identitywoman.net
Internet Identity Workshop

More Related Content

What's hot

Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
Ā 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
Ā 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized IdentityJim Flynn
Ā 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
Ā 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Kaliya "Identity Woman" Young
Ā 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
Ā 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
Ā 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFEvernym
Ā 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
Ā 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarEvernym
Ā 
Identity - Past Solutions & Current Blockchain Landscape
 Identity - Past Solutions & Current Blockchain Landscape Identity - Past Solutions & Current Blockchain Landscape
Identity - Past Solutions & Current Blockchain Landscapeaatkin1971
Ā 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityEvernym
Ā 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
Ā 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
Ā 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
Ā 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
Ā 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsEvernym
Ā 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
Ā 

What's hot (20)

Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Ā 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
Ā 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
Ā 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
Ā 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Ā 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
Ā 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
Ā 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
Ā 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Ā 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Ā 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Ā 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Ā 
Identity - Past Solutions & Current Blockchain Landscape
 Identity - Past Solutions & Current Blockchain Landscape Identity - Past Solutions & Current Blockchain Landscape
Identity - Past Solutions & Current Blockchain Landscape
Ā 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Ā 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Ā 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
Ā 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Ā 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
Ā 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
Ā 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Ā 

Similar to The Domains of Identity & Self-Sovereign Identity MyData 2018

Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
Ā 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
Ā 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008eComm2008
Ā 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationSteven Meister
Ā 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
Ā 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
Ā 
Openid
OpenidOpenid
OpenidJISC.AM
Ā 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
Ā 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
Ā 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
Ā 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
Ā 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
Ā 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
Ā 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfssuser264cc11
Ā 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfssuser00208b
Ā 
Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012gallowayandcollens
Ā 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
Ā 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product VisionCarina Ngai
Ā 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
Ā 

Similar to The Domains of Identity & Self-Sovereign Identity MyData 2018 (20)

Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
Ā 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
Ā 
Hope x talk
Hope x talkHope x talk
Hope x talk
Ā 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
Ā 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and Evaluation
Ā 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Ā 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Ā 
Openid
OpenidOpenid
Openid
Ā 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Ā 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Ā 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
Ā 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
Ā 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Ā 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
Ā 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
Ā 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Ā 
Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012
Ā 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
Ā 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
Ā 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
Ā 

More from Kaliya "Identity Woman" Young

My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.Kaliya "Identity Woman" Young
Ā 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemKaliya "Identity Woman" Young
Ā 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal DataKaliya "Identity Woman" Young
Ā 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopKaliya "Identity Woman" Young
Ā 
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...Kaliya "Identity Woman" Young
Ā 
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...Kaliya "Identity Woman" Young
Ā 

More from Kaliya "Identity Woman" Young (16)

Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
Ā 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
Ā 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
Ā 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
Ā 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
Ā 
Identification and social justice
Identification and social justiceIdentification and social justice
Identification and social justice
Ā 
ID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomenID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomen
Ā 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
Ā 
Iiw11introtalk
Iiw11introtalkIiw11introtalk
Iiw11introtalk
Ā 
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
Ā 
IIW-East Introduction to Identity Community
IIW-East Introduction to Identity CommunityIIW-East Introduction to Identity Community
IIW-East Introduction to Identity Community
Ā 
Us our Organizations and the Evolving Web v2
Us our Organizations and the Evolving Web  v2Us our Organizations and the Evolving Web  v2
Us our Organizations and the Evolving Web v2
Ā 
Personal Data Store Project
Personal Data Store ProjectPersonal Data Store Project
Personal Data Store Project
Ā 
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Ā 
OpenID 101
OpenID 101OpenID 101
OpenID 101
Ā 
OpenID 101
OpenID 101OpenID 101
OpenID 101
Ā 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
Ā 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
Ā 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
Ā 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
Ā 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vƔzquez
Ā 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
Ā 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
Ā 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
Ā 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
Ā 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Ā 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Ā 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Ā 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Ā 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Ā 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Ā 

The Domains of Identity & Self-Sovereign Identity MyData 2018