[IETF-IDRM] Fwd: [IDRM] CfP, Workshop on Security and Privacy in Digital
Rights Manageme nt 2001 (fwd)
Thomas Hardjono
thardjono@mediaone.net
Sat, 19 May 2001 23:51:11 -0400
>Date: Fri, 23 Mar 2001 11:37:19 -0500 (EST)
>From: Judie Mulholland <judiemul@kc-inc.net>
>Subject: [IDRM] CfP, Workshop on Security and Privacy in Digital Rights
> Manageme nt 2001 (fwd)
>To: ietf-idrm@lists.elistx.com, www-drm@w3.org
>List-Owner: <mailto:ietf-idrm-help@lists.elistx.com>
>List-Post: <mailto:ietf-idrm@lists.elistx.com>
>List-Subscribe: <mailto:ietf-idrm-request@lists.elistx.com?body=subscribe>
>List-Unsubscribe: <mailto:ietf-idrm-request@lists.elistx.com?body=unsubscribe>
>List-Archive: <http://lists.elistx.com/archives/ietf-idrm>
>List-Help: <http://lists.elistx.com/doc/email-manage.html>,
> <mailto:ietf-idrm-request@lists.elistx.com?body=help>
>
>fyi/j
>
>ps
>
>sorry for the cross-posting.
>
>
>--- begin forwarded text
>
>
>From: Tomas Sander <sander@intertrust.com>
>Subject: CfP, Workshop on Security and Privacy in Digital Rights Manageme
> nt 2001
>Date: Mon, 19 Mar 2001 17:03:19 -0800
>
>
> CALL FOR PAPERS
>
> WORKSHOP ON SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT 2001
>
> November 5, 2001
> Philadelphia, Pennsylvania, USA
>
> held as part of the Eighth ACM Conference on Computer and
> Communications Security (CCS-8)
>
> Workshop web site: http://www.star-lab.com/sander/spdrm/
>
>
>Increasingly the Internet is used for the distribution of digital
>goods, including digital versions of books, articles, music and
>images. The ease with which digital goods can be copied and
>redistributed make the Internet well suited for unauthorized copying,
>modification and redistribution. The rapid adoption of new
>technologies such as high bandwidth connections and peer-to-peer
>networks is accelerating this process.
>
>This workshop will consider technical problems faced by rights holders
>(who seek to protect their intellectual property rights) and end
>consumers (who seek to protect their privacy and to preserve access
>they now enjoy in traditional media under existing copyright law).
>
>Digital Rights Management (DRM) systems are supposed to serve mass
>markets, in which the participants have conflicting goals and cannot
>be fully trusted. This adversarial situation introduces interesting
>new twists on classical problems studied in cryptology and security
>research, such as key management and access control. Furthermore,
>novel business models and applications often require novel security
>mechanisms. Recent research has also proposed new primitives for DRM,
>such as hash functions that make it possible to identify content in an
>adversarial setting.
>
>The workshop seeks submissions from academia and industry presenting
>novel research on all theoretical and practical aspects of DRM, as
>well as experimental studies of fielded systems. We encourage
>submissions from other communities such as law and business that
>present these communities' perspectives on technological issues. It is
>planned to publish accepted papers in proceedings in the Springer
>Lecture Notes in Computer Science (LNCS) series.
>
>Topics of interest include, but are not limited to, the following, as
>they relate to digital rights management:
>
> access control mechanisms for digital rights
> anonymous publishing
> architectures for DRM systems
> auditing and piracy
> broadcast encryption and traitor tracing
> business models and their security requirements
> electronic commerce protocols
> encryption and authentication for multimedia data
> fair use
> key management in DRM systems
> payment mechanisms
> peer-to-peer networks
> portability of digital rights
> privacy and anonymity
> privacy-preserving data mining
> risk management
> robust identification of digital content
> security for auctions and other emerging business models for
> digital goods
> security models
> software tamper resistance
> tamper resistant hardware and consumer devices
> threat and vulnerability assessment
> trust management
> usability aspects of client software, consumer devices
> watermarking and fingerprinting for media and software
>
>
> IMPORTANT DATES
>
>Submission deadline August 3, 2001
>Acceptance notification September 7, 2001
>
>
>
> PROGRAM CHAIR
>
>Tomas Sander, InterTrust STAR Lab
>sander@intertrust.com, +1-408-855 0242
>
>
>
> PROGRAM COMMITTEE
>
>Eberhard Becker, University of Dortmund
>Dan Boneh, Stanford University
>Karlheinz Brandenburg, Fraunhofer Institute for Integrated Circuits
>Leonardo Chiariglione, CSELT
>Drew Dean, Xerox PARC
>Joan Feigenbaum, Yale University
>Edward Felten, Princeton University
>Yair Frankel, eCash Technologies
>Markus Jakobsson, Bell Labs
>Paul Kocher, Cryptography Research
>John Manferdelli, Microsoft Research
>Kevin McCurley, IBM Research
>Moni Naor, Weizmann Institute
>Fabien Petitcolas, Microsoft Research
>Pamela Samuelson, University of California, Berkeley
>Hal Varian, University of California, Berkeley
>Moti Yung, CertCo
>
>
>
> PAPER SUBMISSIONS
>
>Submitted papers must not substantially overlap with papers that have
>been published or that are simultaneously submitted to a journal or a
>conference with proceedings. Papers should be at most 18 pages
>excluding the bibliography and well-marked appendices (using 11-point
>font and reasonable margins), and at most 22 pages total. Committee
>members are not required to read the appendices and the paper should
>be intelligible without them. The paper should start with the title,
>names of authors and an abstract. The introduction should give some
>background and summarize the contributions of the paper at a level
>appropriate for a non-specialist reader. It is planned to publish
>accepted papers in proceedings in the Springer Lecture Notes in
>Computer Science (LNCS) series after the workshop. During the
>workshop preproceedings will be made available. Final versions are not
>due until after the workshop, giving the authors the opportunity to
>revise their papers based on discussions during the meeting.
>
>Submissions can be made in Postscript, PDF or MS Word format. To
>submit a paper, send a plain ASCII text email to the program chair
>(email: sander@intertrust.com) containing the title and abstract of
>the paper, the authors' names, email and postal addresses, phone and
>fax numbers, and identification of the contact author. To the same
>message, attach your submission (as a MIME attachment). Papers must be
>received by August 3, 2001. Notification of acceptance or rejection
>will be sent to authors no later than September 7, 2001. Authors of
>accepted papers must guarantee that their paper will be presented at
>the workshop. Final versions (due after the workshop) need to comply
>with the instructions for authors made available by Springer.
>
>
>
>
>
>--- end forwarded text
>
>
>--
>-----------------
>R. A. Hettinga <mailto: rah@ibuc.com>
>The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
>For help on using this list (especially unsubscribing), send a message to
>"dcsb-request@reservoir.com" with one line of text: "help".