2003 ACM Workshop on Digital Rights Management
Snapshot date: 2003-09-24. From http://www.acm.org/sigs/sigsac/ccs/CCS2003/drm.html.
DRM 2003 Washington DC October 27, 2003
2003 ACM Workshop on Digital Rights Management October 27, 2003 The Wyndham City Center Washington DC, USA Held in conjunction with the Tenth ACM Conference on Computer and Communications Security (CCS-10)
Workshop Program
Increasingly the Internet is used for the distribution of digital goods, including digital versions of books, articles, music, and images. The Internet facilitates rapid distribution of digital goods (either legally or illegally), as well as enabling new business models for publishers.
The ACM Workshop on Digital Rights Management addresses technical problems faced by copyright owners (who seek to protect their rights) and by end users (who seek to protect their privacy and to preserve their rights of access to works they have purchased).
Digital Rights Management (DRM) systems are supposed to serve mass markets, in which the participants have conflicting goals and do not fully trust each other. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel business models and applications often require novel security mechanisms. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems. We strongly encourage submissions from other communities, such as law and business, that present these communities' perspectives on technological issues.
In additional, we encourage submissions in the area of Digital Policy Management (DPM). DPM is an emerging technical discipline that deals with the design, analysis, implementation, deployment, and use of efficient and secure technology for automated processing of information according to programmable rules and policies. Scenarios in which DPM is needed include companies' handling of consumer information according to enterprise-wide privacy policies, distributed policy and trust management for Web services, and policy support for supply-chain management in B2B ecommerce.
The 2003 Workshop is the third instance of what has become a yearly forum for papers on all technical, business, and legal aspects of DRM and DPM. The first workshop in the series was held in Philadelphia in November of 2001, in conjunction with the eighth ACM CCS conference; the second was held in Washington, DC in November 2002, in conjunction with the CCS-9. The success of these two workshops, particularly with respect to the truly interdisciplinary nature of the participants and the inclusion of papers that successfully integrated technical, business, and legal issues, is our main reason for organizing the 2003 workshop and planning to make ACM DRM a yearly event. For more information about the program of the 2001 workshop, see http://leonardo.telecomitalialab.com/conferences/drm2001.htm; for the 2002 workshop see http://crypto.stanford.edu/DRM2002.
Topics of interest include, but are not limited to, the following, as they relate to DRM:
anonymous publishing architectures for DRM systems auditing business models for online content distribution copyright-law issues, including but not limited to fair use digital policy management privacy and anonymity risk management robust identification of digital content security issues, including but not limited to authorization, encryption, tamper resistance, and watermarking threat and vulnerability assessment usability aspects of DRM systems web services
General Co-Chairs:
Joan Feigenbaum, Yale University (USA) Tomas Sanders, HP Labs (USA) Program Chair: Moti Yung, Columbia University (USA) Program Committee: Stefan Bechtold, U. of Tuebingen (Germany) Jean Camp, Harvard U. (USA) Barbara Fox, Microsoft Research (USA) Matt Franklin, U.C. Davis, (USA) Hideki Imai, U. of Tokyo (Japan) Markus Jakobsson, RSA Labs. (USA) Ton Kalker, Philips Research and T.U. Eindhoven (The Netherlands) Aggelos Kiayias, U. of Connecticut (USA) Jeff Lotspiech, IBM Research (USA) Catherine Meadows, NRL (USA) Deirdre Mulligan, U.C. Berkeley (USA) Paul van Oorschot, Carleton U. (Canada) Benny Pinkas, HP Labs. (USA) Rei Safavi-Naini, U. of Wollongong (Australia) Ahmad-Reza Sadeghi, Ruhr-U. Bochum (Germany) Barbara Simons, Consultant and USACM (USA) Jessica Staddon, PARC (USA)
Important Dates:
Paper submissions due: July 20, 2003 (Extended) Acceptance notifications: August 10, 2003 Camera-read papers due: September 1, 2003 DRM Workshop: October 27, 2003
Submission instructions Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 15 pages excluding the bibliography and well-marked appendices, using at least 11-point font and reasonable margins. Committee members are not required to read the appendices, and thus submissions should be intelligible without them. Each submission should start with the title, abstract, and names and contact information of authors . The introduction should give background and summarize the contributions of the paper at a level appropriate for a non-specialist reader.
The papers accepted for presentation at the workshop will be published by the ACM in a conference proceedings volume. Submissions will be handled electronically. To submit a paper visit our submission server: https://www.cosic.esat.kuleuven.ac.be/websubmission/drm2003/
PROGRAM
Monday October 27, 2003 9:00am-9:15 Opening Remarks Moti Yung, Program Chair (Columbia University)
Session 1: DRM Experience Chair: TBA 9:15am-9:40 Analysis of Security Vulnerabilities in the Movie Production and Distribution Process S. Byers,L. Cranor, E. Cronin, D. Kormann, P. McDaniel (AT&T Labs- Research) 9:40am-10:05 Protecting Digital Archives at the Greek Orthodox Archdiocese of America. B. Pruno, H. Goldsein, G. Heileman, M. Heileman, T. Nicolakis, C. Pizano, M. Webb (Center for Digital Imaging, University of New Mexico, Elisar Software, Greek Orthodox Archdiocese of America) 10:05am-10:30 Digital Rights management in a 3G Mobile Phone and Beyond. T.S. Messerges, E.A. Dabbish (Motorola Labs)
10:30am-11:00 Morning Break
Session 2: Invited Talk Chair: Moti Yung 11:00am-11:50 The IP War - apocalypse or freedom revolution? Invited Speaker: Tsvi Gal, CIO, Warner Music Group (an AOL/Time Warner Company)
11:50am-12:15 Discussion
12:15pm-1:30 Lunch Break
Session 3: Supporting Cryptographic Technology Chair: TBA 1:30pm-1:55 Breaking and Repairing Optimistic Fair Exchange from PODC 2003 Y. Dodis, L. Reyzin (NYU and Boston U.) 1:55pm-2:20 Broadcast Encryption with Short Keys and Transmissions N. Attrapadung, K. Kobara, H. Imai (University of Tokyo) 2:20pm-2:55 New Traitor Tracing Schemes Using Bilinear Map V.D. To, R. Safavi-Naini, F. Zhang (University of Wollongong) 2:45pm-3:00 Break
Session 4: Copyright and Access-Rights Chair: TBA 3:00pm-3:25 How DRM-Based Content Delivery Systems Disrupt Expectations of "Personal Use." D. Mulligan, J. Han, A. J. Burstein (U.C. Berkeley) 3:25pm-3:50 Experiences with the Enforcement of Access Rights Extracted from ODRL-based Digital Contracts. S. Guth, G. Neumann, M. Strembeck, (Vienna University of Economics and B.A.) 3:50pm-4:15 Content and Expression-Based Copy Recognition for Intellectual Property Protection. O. Uzuner, R. Davis (MIT) 4:15pm-4:45 Break
Session 5: Watermarking Chair: TBA 4:45pm-5:10 Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks A. Adelsbach, S. Katzenbeisser, H. Veith (Universitat des Saarlands, Vienna University of Technology) 5:10pm-5:35 The Effects of Invisible Watermarking on Satellite Image Classification. G. Heileman, Y. Yang (University on New Mexico)
Session 6: Software and Systems Chair: TBA 5:35pm-6:00 Constructing a Virtual Primary Key for Fingerprinting Relational Data. , Y. Li, V. Swarup, S. Jajodia (George Mason University and Mitre Corp.) 6:00pm-6:25 Obfuscation of Design Intent in Object-Oriented Applications M. Sosonkin, G. Naumovich, N. Memon (Polytechnic University, NY)
6:25pm End of Workshop