2003 ACM Workshop on Digital Rights Management

Snapshot date: 2003-09-24. From http://www.acm.org/sigs/sigsac/ccs/CCS2003/drm.html.



DRM 2003
Washington DC October 27, 2003
2003 ACM Workshop on Digital Rights Management
October 27, 2003
The Wyndham City Center Washington DC, USA
Held in conjunction with the Tenth ACM Conference on Computer and
Communications Security (CCS-10)
Workshop Program
Increasingly the Internet is used for the distribution of digital
goods, including digital versions of books, articles, music, and
images. The Internet facilitates rapid distribution of digital goods
(either legally or illegally), as well as enabling new business models
for publishers.
The ACM Workshop on Digital Rights Management addresses technical
problems faced by copyright owners (who seek to protect their rights)
and by end users (who seek to protect their privacy and to preserve
their rights of access to works they have purchased).
Digital Rights Management (DRM) systems are supposed to serve mass
markets, in which the participants have conflicting goals and do not
fully trust each other. This adversarial situation introduces
interesting new twists on classical problems studied in cryptology and
security research, such as key management and access control.
Furthermore, novel business models and applications often require
novel security mechanisms. Recent research has also proposed new
primitives for DRM, such as hash functions that make it possible to
identify content in an adversarial setting.
The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of DRM, as
well as experimental studies of fielded systems. We strongly encourage
submissions from other communities, such as law and business, that
present these communities' perspectives on technological issues.
In additional, we encourage submissions in the area of Digital Policy
Management (DPM). DPM is an emerging technical discipline that deals
with the design, analysis, implementation, deployment, and use of
efficient and secure technology for automated processing of
information according to programmable rules and policies. Scenarios in
which DPM is needed include companies' handling of consumer
information according to enterprise-wide privacy policies, distributed
policy and trust management for Web services, and policy support for
supply-chain management in B2B ecommerce.
The 2003 Workshop is the third instance of what has become a yearly
forum for papers on all technical, business, and legal aspects of DRM
and DPM. The first workshop in the series was held in Philadelphia in
November of 2001, in conjunction with the eighth ACM CCS conference;
the second was held in Washington, DC in November 2002, in conjunction
with the CCS-9. The success of these two workshops, particularly with
respect to the truly interdisciplinary nature of the participants and
the inclusion of papers that successfully integrated technical,
business, and legal issues, is our main reason for organizing the 2003
workshop and planning to make ACM DRM a yearly event. For more
information about the program of the 2001 workshop, see
http://leonardo.telecomitalialab.com/conferences/drm2001.htm; for the
2002 workshop see http://crypto.stanford.edu/DRM2002.
Topics of interest include, but are not limited to, the following, as
they relate to DRM:
anonymous publishing
architectures for DRM systems
auditing
business models for online content distribution
copyright-law issues, including but not limited to fair use
digital policy management
privacy and anonymity
risk management
robust identification of digital content
security issues, including but not limited to authorization,
encryption, tamper resistance, and watermarking
threat and vulnerability assessment
usability aspects of DRM systems
web services
General Co-Chairs:
Joan Feigenbaum, Yale University (USA)
Tomas Sanders, HP Labs (USA)
Program Chair:
Moti Yung, Columbia University (USA)
Program Committee:
Stefan Bechtold, U. of Tuebingen (Germany)
Jean Camp, Harvard U. (USA)
Barbara Fox, Microsoft Research (USA)
Matt Franklin, U.C. Davis, (USA)
Hideki Imai, U. of Tokyo (Japan)
Markus Jakobsson, RSA Labs. (USA)
Ton Kalker, Philips Research and T.U. Eindhoven (The Netherlands)
Aggelos Kiayias, U. of Connecticut (USA)
Jeff Lotspiech, IBM Research (USA)
Catherine Meadows, NRL (USA)
Deirdre Mulligan, U.C. Berkeley (USA)
Paul van Oorschot, Carleton U. (Canada)
Benny Pinkas, HP Labs. (USA)
Rei Safavi-Naini, U. of Wollongong (Australia)
Ahmad-Reza Sadeghi, Ruhr-U. Bochum (Germany)
Barbara Simons, Consultant and USACM (USA)
Jessica Staddon, PARC (USA)
Important Dates:
     Paper submissions due:  July 20, 2003 (Extended)
     Acceptance notifications: August 10, 2003
     Camera-read papers due:  September 1, 2003
     DRM Workshop: October 27, 2003
Submission instructions
Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 15 pages
excluding the bibliography and well-marked appendices, using at least
11-point font and reasonable margins. Committee members are not
required to read the appendices, and thus submissions should be
intelligible without them. Each submission should start with the
title, abstract, and names and contact information of authors . The
introduction should give background and summarize the contributions of
the paper at a level appropriate for a non-specialist reader.
The papers accepted for presentation at the workshop will be published
by the ACM in a conference proceedings volume.
Submissions will be handled electronically. To submit a paper visit
our submission server:
https://www.cosic.esat.kuleuven.ac.be/websubmission/drm2003/

PROGRAM
Monday October 27, 2003
  9:00am-9:15 Opening Remarks
Moti Yung, Program Chair (Columbia University)
  Session 1: DRM Experience Chair: TBA
  9:15am-9:40 Analysis of Security Vulnerabilities in the Movie
  Production and Distribution Process
S. Byers,L. Cranor, E. Cronin, D. Kormann, P. McDaniel (AT&T Labs-
Research)
  9:40am-10:05 Protecting Digital Archives at the Greek Orthodox
  Archdiocese of America. B. Pruno, H. Goldsein, G. Heileman, M.
  Heileman, T. Nicolakis, C. Pizano, M. Webb (Center for Digital
  Imaging, University of New Mexico, Elisar Software, Greek Orthodox
  Archdiocese of America)
  10:05am-10:30 Digital Rights management in a 3G Mobile Phone and
  Beyond.
T.S. Messerges, E.A. Dabbish (Motorola Labs)
  10:30am-11:00 Morning Break
  Session 2: Invited Talk Chair: Moti Yung
  11:00am-11:50 The IP War - apocalypse or freedom revolution?
Invited Speaker: Tsvi Gal, CIO, Warner Music Group (an AOL/Time Warner
Company)
  11:50am-12:15 Discussion
  12:15pm-1:30 Lunch Break
  Session 3: Supporting Cryptographic Technology  Chair: TBA
  1:30pm-1:55 Breaking and Repairing Optimistic Fair Exchange from
  PODC 2003
Y. Dodis, L. Reyzin (NYU and Boston U.)
  1:55pm-2:20 Broadcast Encryption with Short Keys and Transmissions
N. Attrapadung, K. Kobara, H. Imai (University of Tokyo)
  2:20pm-2:55 New Traitor Tracing Schemes Using Bilinear Map
V.D. To, R. Safavi-Naini, F. Zhang (University of Wollongong)
  2:45pm-3:00 Break
  Session 4: Copyright and Access-Rights Chair: TBA
  3:00pm-3:25 How DRM-Based Content Delivery Systems Disrupt
  Expectations of "Personal Use."
D. Mulligan, J. Han, A. J. Burstein (U.C. Berkeley)
  3:25pm-3:50 Experiences with the Enforcement of Access Rights
  Extracted from ODRL-based Digital Contracts.
S. Guth, G. Neumann, M. Strembeck, (Vienna University of Economics and
B.A.)
  3:50pm-4:15 Content and Expression-Based Copy Recognition for
  Intellectual Property Protection.
O. Uzuner, R. Davis (MIT)
  4:15pm-4:45 Break
  Session 5: Watermarking Chair: TBA
  4:45pm-5:10 Watermarking Schemes Provably Secure Against Copy and
  Ambiguity Attacks
A. Adelsbach, S. Katzenbeisser, H. Veith (Universitat des Saarlands,
Vienna University of Technology)
  5:10pm-5:35 The Effects of Invisible Watermarking on Satellite Image
  Classification.
G. Heileman, Y. Yang (University on New Mexico)
  Session 6: Software and Systems  Chair: TBA
  5:35pm-6:00 Constructing a Virtual Primary Key for Fingerprinting
  Relational Data. ,
Y. Li, V. Swarup, S. Jajodia (George Mason University and Mitre Corp.)
  6:00pm-6:25 Obfuscation of Design Intent in Object-Oriented
  Applications
M. Sosonkin, G. Naumovich, N. Memon (Polytechnic University, NY)
  6:25pm End of Workshop