Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001 Philadelphia, PA, USA, November 5, 2001 Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.

Author(s): Markus Jakobsson, Michael K. Reiter (auth.), Tomas Sander (eds.)
Series: Lecture Notes in Computer Science 2320
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002

Language: English
Pages: 250
Tags: Data Encryption; Legal Aspects of Computing; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Operating Systems

Discouraging Software Piracy Using Software Aging....Pages 1-12
New Iterative Geometric Methods for Robust Perceptual Image Hashing....Pages 13-21
On Crafty Pirates and Foxy Tracers....Pages 22-39
Efficient State Updates for Key Management....Pages 40-56
Collusion Secure q -ary Fingerprinting for Perceptual Content....Pages 57-75
Privacy Engineering for Digital Rights Management Systems....Pages 76-105
Secure Open Systems for Protecting Privacy and Digital Services....Pages 106-125
MPEG-4 IPMP Extensions....Pages 126-140
Dynamic Self-Checking Techniques for Improved Tamper Resistance....Pages 141-159
Protecting Software Code by Guards....Pages 160-175
How to Manage Persistent State in DRM Systems....Pages 176-191
A Cryptanalysis of the High-Bandwidth Digital Content Protection System....Pages 192-200
Implications of Digital Rights Management for Online Music – A Business Perspective....Pages 201-212
From Copyright to Information Law – Implications of Digital Rights Management....Pages 213-232
Taking the Copy Out of Copyright....Pages 233-244