November 18, 2002
The Wyndham City Center Washington DC, USA
Held in conjunction with the Ninth ACM Conference on Computer and Communications Security (CCS-9)
Increasingly the Internet is used for the distribution of digital goods, including digital versions of books, articles, music, and images. The ease with which digital goods can be copied and redistributed make the Internet well suited for unauthorized copying, modification and redistribution. The rapid adoption of new technologies such as high-bandwidth connections and peer-to-peer networks is accelerating this process.
The ACM Workshop on Digital Rights Management addresses technical problems faced by rights holders (who seek to protect their intellectual property rights) and by end consumers (who seek to protect their privacy and to preserve access they now enjoy in traditional media under existing copyright law).
Digital Rights Management (DRM) systems are supposed to serve mass markets, in which the participants have conflicting goals and cannot be fully trusted. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel business models and applications often require novel security mechanisms. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems. We strongly encourage submissions from other communities, such as law and business, that present these communities' perspectives on technological issues. Accepted papers will be published in a volume in the Springer Lecture Notes in Computer Science (LNCS) series.
In additional, we encourage submissions in the area of Digital Policy Management (DPM). DPM is an emerging technical discipline that deals with the design, analysis, implementation, deployment, and use of efficient and secure technology for automated processing of general information goods (not just entertainment content!) according to programmable rules and policies. Scenarios in which DPM is needed include companies' handling of consumer information according to enterprise-wide privacy policies, distributed policy and trust management for Web services, and policy support for supply-chain management in B2B ecommerce.
The 2002 Workshop is the second in what we hope will be a yearly forum for papers on all technical, business, and legal aspects of DRM and DPM. The first workshop in the series was held in Philadelphia in November of 2001, in conjunction with the eighth ACM CCS conference. The success of this first workshop, particularly with respect to the truly interdisciplinary nature of the participants and the inclusion of papers that successfully integrated technical, business, and legal issues, is our main reason for organizing the 2002 workshop and tentatively planning to make ACM DRM a yearly event. For more information about the program of the 2001 workshop, see http://www.star-lab.com/sander/spdrm
Topics of interest include, but are not limited to, the following, as they relate to DRM:
Invited talk: Brian LaMacchia, Microsoft.
Program Chair: Joan Feigenbaum, Yale University
|Paper submissions due:||August 1, 2002|
|Acceptance notifications:||September 15, 2002|
|Pre-proceedings papers due:||October 15, 2002|
|DRM Workshop:||November 18, 2002|
|CCS Conference:||November 17-21, 2002|
|Proceedings papers due:||December 18, 2002|
Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 15 pages excluding the bibliography and well-marked appendices, using at least 11-point font and reasonable margins. Committee members are not required to read the appendices, and thus submissions should be intelligible without them. Each submission should start with the title, abstract, and names and contact information of authors. The introduction should give background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. Accepted papers will be published in a proceedings in the Springer Lecture Notes in Computer Science (LNCS) series after the workshop. During the workshop, preproceedings will be made available. Preproceedings contributions will be due approximately one month before the workshop, and final versions approximately one month after; authors will have a chance to revise based on discussions at the workshop before submitting their final versions.
Electronic submissions are preferred; please use this submission form.
Paper submissions may be sent to the Program Chair:
Computer Science Dept.,
New Haven, CT 06520-8285, USA
Phone: +1 203 432 6432,
Fax: +1 203 432 0593
51 Prospect Street,
New Haven CT 06511, USA