W3C CCG - MCP-I: Model Context Protocol - Identity
- Past
- Confirmed
Alex Keisner and Dylan Hobb are presenting on MCP-I: Model Context Protocol - Identity.
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Daylight Time
Alex Keisner and Dylan Hobb are presenting on MCP-I: Model Context Protocol - Identity.
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Daylight Time
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Daylight Time
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Daylight Time
Wayne Chang presenting on State-Endorsed Digital Identity (SEDI)
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Daylight Time
– Eastern Daylight Time
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Standard Time
Cole Davis presenting on DIDs and VCs in Music Rights Management.
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Standard Time
Stephen Curran presenting on did:webvh and DID Attested Resources.
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Standard Time
Simone Onofri, Zahra Ebadi Ansaroudi, Amir Sharif leading a session around threat modeling for digital credentials with LINDDUN.
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Standard Time
Scott Jones on Client-side Biometric Authentication and Identity Verification.
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Standard Time
You've Got the Wrong Use Case
Alan H. Karp
SitePassword
Abstract (provided by Perplexity.ai)
This talk argues that many identity and access management (IAM) failures come from starting with the wrong use cases and ignoring the hazards that emerge as systems grow more complex. Drawing on three decades of experience—from early large‑scale access control deployments to work with the US Navy and modern systems like AWS Cedar and Solid—it shows how designs focused on simple ACL-style scenarios bake in vulnerabilities, complexity, and usability problems.
Using a progression of concrete use cases, the talk surfaces hazards such as excess authority, weak delegation, missing responsibility tracking, awkward conditional policies, and transitive access issues, then demonstrates how authorization‑centric models and capability-style approaches address them more naturally than traditional authentication‑centric IAM. Attendees will leave with a sharper vocabulary for IAM “use case hazards” and a set of design principles for building systems that handle delegation, composition, and accountability without bolting on fixes after the fact.
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Standard Time
Drummond Reed presenting First Person AI Agents and the First Person Network Cooperative
Meeting Link: https://meet.google.com/dzc-yjfq-tyf
– Eastern Standard Time
– Eastern Standard Time
– Eastern Standard Time