Risk, Rewards and Repercussions, 29-30 September, Gaithersburg, MD

Call for Presentations


Identity Management 2009

"Transparent Government - Risks, Rewards and Repercussions"


How do we balance open access, transparency and accountability with security and privacy? As national and international governments endeavor to manage citizen's identities while providing open, transparent and trusted services, the challenges of managing identities and access to information on such huge scales require careful planning, a strong policy focus, and attention to standards and interoperability.

Identity Management 2009 will provide users who are evaluating or looking to deploy such security infrastructures with an opportunity to explore the state of the art in security services, standards and products. It will also provide users with an opportunity to present and share their use cases, requirements and (initial) experience with other users and with some of the leading experts in this field.

OASIS invites proposals for presentations and panel sessions related to the security challenges in managing identities and access to information on large scales.

Potential topics include, but are not limited to:

  • Information Cards/OpenID/SAML. How can these standards enable more secure access to sensitive and personal information across government agencies and with third party-sites supporting government operations?
  • Social Media. What are the security risks to agencies that plan to use and support these new, publicly available, previously unimaginable technologies and services?
  • Authentication. Can federated digital identity web platforms completely eliminate the need for multiple usernames and accounts for different agency portals?
  • Smart Cards. Many national economic stimulus systems and applications will require multi-factor authentication including smart cards – how are government agencies using this technology?
  • Citizen Privacy. What privacy protections are possible in federated systems?
  • Citizen Trust. Can citizens really be trusted to manage their own identity attributes?
  • Cloud Computing. How do we balance its benefits while managing identity risks?
  • Key Management.  Large public/private enterprises consume/create enormous amounts of encrypted keys. What is the future of key discovery, maintenance and interoperability?


  • To Submit a Proposal

    All proposals need to be submitted using the Call for Presentations Online Form.

    You will need the following information:

  • Full contact details (name, affiliation, email, phone, postal address) of the presenter
  • Full list of authors and/or additional presenters, if any
  • Brief biography (one paragraph) for each presenter/author
  • Short characterization of the presentation specifying which of the four submission areas it falls into
  • Abstract between 500 and 2000 words outlining the subject and title, and summarizing the key points of your presentation or panel discussion


All submissions will be acknowledged.