CALL FOR PAPERS WORKSHOP ON SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT 2001 November 5, 2001 Philadelphia, Pennsylvania, USA held as part of the Eighth ACM Conference on Computer and Communications Security (CCS-8) Workshop web site: http://www.star-lab.com/sander/spdrm/ Increasingly the Internet is used for the distribution of digital goods, including digital versions of books, articles, music and images. The ease with which digital goods can be copied and redistributed make the Internet well suited for unauthorized copying, modification and redistribution. The rapid adoption of new technologies such as high bandwidth connections and peer-to-peer networks is accelerating this process. This workshop will consider technical problems faced by rights holders (who seek to protect their intellectual property rights) and end consumers (who seek to protect their privacy and to preserve access they now enjoy in traditional media under existing copyright law). Digital Rights Management (DRM) systems are supposed to serve mass markets, in which the participants have conflicting goals and cannot be fully trusted. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel business models and applications often require novel security mechanisms. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. It is planned to publish accepted papers in proceedings in the Springer Lecture Notes in Computer Science (LNCS) series. Topics of interest include, but are not limited to, the following, as they relate to digital rights management: access control mechanisms for digital rights anonymous publishing architectures for DRM systems auditing and piracy broadcast encryption and traitor tracing business models and their security requirements electronic commerce protocols encryption and authentication for multimedia data fair use key management in DRM systems payment mechanisms peer-to-peer networks portability of digital rights privacy and anonymity privacy-preserving data mining risk management robust identification of digital content security for auctions and other emerging business models for digital goods security models software tamper resistance tamper resistant hardware and consumer devices threat and vulnerability assessment trust management usability aspects of client software, consumer devices watermarking and fingerprinting for media and software IMPORTANT DATES Submission deadline August 3, 2001 Acceptance notification September 7, 2001 PROGRAM CHAIR Tomas Sander, InterTrust STAR Lab sander@intertrust.com, +1-408-855 0242 PROGRAM COMMITTEE Eberhard Becker, University of Dortmund Dan Boneh, Stanford University Karlheinz Brandenburg, Fraunhofer Institute for Integrated Circuits Leonardo Chiariglione, CSELT Drew Dean, Xerox PARC Joan Feigenbaum, Yale University Edward Felten, Princeton University Yair Frankel, eCash Technologies Markus Jakobsson, Bell Labs Paul Kocher, Cryptography Research John Manferdelli, Microsoft Research Kevin McCurley, IBM Research Moni Naor, Weizmann Institute Fabien Petitcolas, Microsoft Research Pamela Samuelson, University of California, Berkeley Hal Varian, University of California, Berkeley Moti Yung, CertCo PAPER SUBMISSIONS Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 18 pages excluding the bibliography and well-marked appendices (using 11-point font and reasonable margins), and at most 22 pages total. Committee members are not required to read the appendices and the paper should be intelligible without them. The paper should start with the title, names of authors and an abstract. The introduction should give some background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. It is planned to publish accepted papers in proceedings in the Springer Lecture Notes in Computer Science (LNCS) series after the workshop. During the workshop preproceedings will be made available. Final versions are not due until after the workshop, giving the authors the opportunity to revise their papers based on discussions during the meeting. Submissions can be made in Postscript, PDF or MS Word format. To submit a paper, send a plain ASCII text email to the program chair (email: sander@intertrust.com) containing the title and abstract of the paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author. To the same message, attach your submission (as a MIME attachment). Papers must be received by August 3, 2001. Notification of acceptance or rejection will be sent to authors no later than September 7, 2001. Authors of accepted papers must guarantee that their paper will be presented at the workshop. Final versions (due after the workshop) need to comply with the instructions for authors made available by Springer. Source: http://lists.w3.org/Archives/Public/www-drm/2001Jun/0001.html