Registration
Registration is 386 Euro (2895 DKK). The registration system is open!
Program July 7, 2022
9:15 Welcome
9:30 Keynote 1: Jon Shamah:
Member-State Personal Data Interchange - Two Different EU Approaches to Citizen-Centric Transfers
10:30 Break
11:00 OAuth
- Nikos Fotiou, Evgenia Faltaka, Vasilis Kalos, Anna Kefala, Iakovos
Pittaras, Vasilios Siris and
George Polyzos
Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0 - Takashi Norimatsu, Yuichi Nakamura and Toshihiro Yamauchi
Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak
12:00 Lunch Break
13:00 Corporate
- K. Valerie Carl, Timothy Markus Christian Zilcher and
Oliver Hinz
Corporate Digital Responsibility and the current Corporate Social Responsibility standard: An analysis of applicability -
Nicolas Fähnrich and Heiko Roßnagel
Online tool for matching company demands with IT-security offerings
14:00 Break
14:30 eIDAS
- Steffen Schwalm, Daria Albrecht and Ignacio
Alamillo
eIDAS 2.0: Challenges, perspectives and proposals to avoid contradictions between eIDAS 2.0 and SSI -
Hermann Strack , Sebastian Karius , Marlies Gollnick , Meiko Lips , Sandro Wefel , Robert Altschaffel
Preservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDAS - Paul Bastian, Carsten Stöcker and Steffen Schwalm
Combination of x509 and DID/VC for inheritance properties of trust in digital identities
16:00 End of the formal part for today
19:00 Social Dinner
Program July 8, 2022
10:00 Keynote 2:
Alessandro Bruni:
A brief history of standardization of EDHOC, authenticated key exchange for IoT
11:00 Break
11:30 SSI
-
Isaac Henderson Johnson Jeyakumar, David W Chadwick and Michael
Kubach
A novel approach to establish trust in verifiable credential issuers in Self-Sovereign Identity ecosystems using TRAIN -
Michael Kuperberg and Robin Klemens
Integration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A Survey
12:30 Lunch Break
13:30 Risk
-
Sebastian Kurowski and Christian H. Schunck
Risk variance: Towards a definition of varying outcomes of IT security risk assessment -
Nicolas Fähnrich, Matthias Winterstetter and Michael Kubach
A user-centric approach to IT-security risk analysis for an identity management solution
14:30 Break
15:00 Hacking
-
Lothar Fritsch, Marie Mecaliff, Kathinka Wik Opdal, Mathias
Rundgreen and Toril Sachse
Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks -
Andrea Horch, Christian H. Schunck and Christopher Ruff
Adversary Tactics and Techniques specific to Cryptocurrency Scams
16:00 End of OID'22