Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Time

Monday, May 16  
Room 1015 (30 ppl)  

Monday, May 16
Room 1008 (14-16 ppl)

Monday, May 16
Room 6009 (14-16 ppl)

Monday, May 16
Room 1019 (14-16 ppl)

8:00-9:00

Registration & Breakfast (Foyer outside Room 1008) 

Registration & Breakfast (Foyer outside Room 1008)

Registration & Breakfast (Foyer outside Room 1008) 

Registration & Breakfast (Foyer outside Room 1008)

9:00-10:00

Line A: Opening Session - 1008 
- 1. Kantara update (30 mins)
- 2. Fraunhofer FOKUS initiatives overview:
Jens Fromm, Head of Research Group Electronic Identity (30 mins)  

Line A: Opening Session - 1008  
- 1. Kantara update (30 mins)
- 2. Fraunhofer FOKUS initiatives overview: 
Jens Fromm, Head of Research Group Electronic Identity (30 mins)

Line A: Opening Session - 1008  
- 1. Kantara update (30 mins)
- 2. Fraunhofer FOKUS initiatives overview: 
Jens Fromm, Head of Research Group Electronic Identity (30 mins)

Line A: Opening Session - 1008  
- 1. Kantara update (30 mins)
- 2. Fraunhofer FOKUS initiatives overview: 
Jens Fromm, Head of Research Group Electronic Identity (30 mins)

10:00-10:15

Break (Foyer outside Room 1008)

Break (Foyer outside Room 1008)

Break (Foyer outside Room 1008)

Break (Foyer outside Room 1008)    

10:15-12:00

Open  

Line B
Trust Framework Meta Model
- Scope "Infrastructure vs. business level trust relationships", "Identity vs. non-identity related trust relationships"
- Objectives
- Top-down approach Analysis and comparison: Structuring by actors, trust relationships, "domains"
- Bottom-up approach Model, tooling, presentation, 

Line A
Board of Trustees
- Events Planning Review
- Target Events and Marketing

Line C
UMA WG demo - presented by Alam Mohammad, Fraunhofer SIT 

  • UMA concept
  • Implementation of main three steps of the UMA protocol:
    Step 1. User registers Host at AM
    Step 2. Requester gets access token from AM
    Step 3. Requester wields access token at Host to gain access
  • Presentation on how the group implemented resource registration and scope registration

12:00-1:00

Lunch (Foyer outside Room 1008)

Lunch (Foyer outside Room 1008)

Lunch (Foyer outside Room 1008)

Lunch (Foyer outside Room 1008)

1:00-3:00

Open

Line B  
Business Cases for Trusted Federations DG  
- Review of the Implemented Trust Frameworks - discuss how satisfactory results are, how to improve and go further

Line A 
Board of Trustees  
- Marketing Strategy Session

Open 2:00-3:00: Private TelCo WG

3:00-3:15

Break (Foyer outside Room 1008)

Break (Foyer outside Room 1008) 

Break (Foyer outside Room 1008) 

Break (Foyer outside Room 1008)

3:15-5:00

Open  

Line C
Assurance & Certification WGs Convergence - sync pt. 1