November 18, 2002
The Wyndham City Center Washington DC, USA
Held in conjunction with the Ninth ACM Conference on Computer and Communications Security (CCS-9)
Increasingly the Internet is used for the distribution of digital goods, including digital versions of books, articles, music, and images. The ease with which digital goods can be copied and redistributed make the Internet well suited for unauthorized copying, modification and redistribution. The rapid adoption of new technologies such as high-bandwidth connections and peer-to-peer networks is accelerating this process.
The ACM Workshop on Digital Rights Management addresses technical problems faced by rights holders (who seek to protect their intellectual property rights) and by end consumers (who seek to protect their privacy and to preserve access they now enjoy in traditional media under existing copyright law).
Digital Rights Management (DRM) systems are supposed to serve mass markets, in which the participants have conflicting goals and cannot be fully trusted. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel business models and applications often require novel security mechanisms. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems. We strongly encourage submissions from other communities, such as law and business, that present these communities' perspectives on technological issues. Accepted papers will be published in a volume in the Springer Lecture Notes in Computer Science (LNCS) series.
In additional, we encourage submissions in the area of Digital Policy Management (DPM). DPM is an emerging technical discipline that deals with the design, analysis, implementation, deployment, and use of efficient and secure technology for automated processing of general information goods (not just entertainment content!) according to programmable rules and policies. Scenarios in which DPM is needed include companies' handling of consumer information according to enterprise-wide privacy policies, distributed policy and trust management for Web services, and policy support for supply-chain management in B2B ecommerce.
The 2002 Workshop is the second in what we hope will be a yearly forum for papers on all technical, business, and legal aspects of DRM and DPM. The first workshop in the series was held in Philadelphia in November of 2001, in conjunction with the eighth ACM CCS conference. The success of this first workshop, particularly with respect to the truly interdisciplinary nature of the participants and the inclusion of papers that successfully integrated technical, business, and legal issues, is our main reason for organizing the 2002 workshop and tentatively planning to make ACM DRM a yearly event. For more information about the program of the 2001 workshop, see http://www.star-lab.com/sander/spdrm
Topics of interest include, but are not limited to, the following, as they relate to DRM:
Invited talk: Brian LaMacchia, Microsoft.
Program Chair: Joan Feigenbaum, Yale University