Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers

Front Cover
The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Discouraging Software Piracy Using Software Aging
1
New Iterative Geometric Methods for Robust Perceptual Image Hashing
13
On Crafty Pirates and Foxy Tracers
22
Efficient State Updates for Key Management
40
Collusion Secure qary Fingerprinting for Perceptual Content
57
Privacy Engineering for Digital Rights Management Systems
76
Secure Open Systems for Protecting Privacy and Digital Services
106
MPEG4 IPMP Extensions
126
Protecting Software Code by Guards
160
How to Manage Persistent State in DRM Systems
176
A Cryptanalysis of the HighBandwidth Digital Content Protection System
192
Implications of Digital Rights Management for Online Music A Business Perspective
201
From Copyright to Information Law Implications of Digital Rights Management
213
Taking the Copy Out of Copyright
233
Author Index
245
Copyright

Dynamic SelfChecking Techniques for Improved Tamper Resistance
141

Other editions - View all

Common terms and phrases