Registration

Registration is 386 Euro (2895 DKK). The registration system is open!

Program July 7, 2022

9:15 Welcome

9:30 Keynote 1: Jon Shamah:
Member-State Personal Data Interchange - Two Different EU Approaches to Citizen-Centric Transfers


10:30 Break

11:00 OAuth

  • Nikos Fotiou, Evgenia Faltaka, Vasilis Kalos, Anna Kefala, Iakovos Pittaras, Vasilios Siris and George Polyzos
    Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0
  • Takashi Norimatsu, Yuichi Nakamura and Toshihiro Yamauchi
    Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak

12:00 Lunch Break

13:00 Corporate

  • K. Valerie Carl, Timothy Markus Christian Zilcher and Oliver Hinz
    Corporate Digital Responsibility and the current Corporate Social Responsibility standard: An analysis of applicability
  • Nicolas Fähnrich and Heiko Roßnagel
    Online tool for matching company demands with IT-security offerings

14:00 Break

14:30 eIDAS

  • Steffen Schwalm, Daria Albrecht and Ignacio Alamillo
    eIDAS 2.0: Challenges, perspectives and proposals to avoid contradictions between eIDAS 2.0 and SSI
  • Hermann Strack , Sebastian Karius , Marlies Gollnick , Meiko Lips , Sandro Wefel , Robert Altschaffel
    Preservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDAS
  • Paul Bastian, Carsten Stöcker and Steffen Schwalm
    Combination of x509 and DID/VC for inheritance properties of trust in digital identities

16:00 End of the formal part for today

19:00 Social Dinner

Program July 8, 2022

10:00 Keynote 2: Alessandro Bruni:
A brief history of standardization of EDHOC, authenticated key exchange for IoT


11:00 Break

11:30 SSI

  • Isaac Henderson Johnson Jeyakumar, David W Chadwick and Michael Kubach
    A novel approach to establish trust in verifiable credential issuers in Self-Sovereign Identity ecosystems using TRAIN
  • Michael Kuperberg and Robin Klemens
    Integration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A Survey

12:30 Lunch Break

13:30 Risk

  • Sebastian Kurowski and Christian H. Schunck
    Risk variance: Towards a definition of varying outcomes of IT security risk assessment
  • Nicolas Fähnrich, Matthias Winterstetter and Michael Kubach
    A user-centric approach to IT-security risk analysis for an identity management solution

14:30 Break

15:00 Hacking

  • Lothar Fritsch, Marie Mecaliff, Kathinka Wik Opdal, Mathias Rundgreen and Toril Sachse
    Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks
  • Andrea Horch, Christian H. Schunck and Christopher Ruff
    Adversary Tactics and Techniques specific to Cryptocurrency Scams

16:00 End of OID'22