Security and Privacy in Digital Rights Management

ACM CCS-8 Workshop DRM 2001 Philadelphia, PA, USA, November 5, 2001 Revised Papers

  • Tomas Sander
Conference proceedings DRM 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2320)

Table of contents

  1. Front Matter
    Pages I-X
  2. Renewability

    1. Markus Jakobsson, Michael K. Reiter
      Pages 1-12
  3. Fuzzy Hashing

    1. M. Kıvanç Mıhçak, Ramarathnam Venkatesan
      Pages 13-21
  4. Cryptographic Techniques, Fingerprinting

    1. Aggelos Kiayias, Moti Yung
      Pages 22-39
    2. Reihaneh Safavi-Naini, Yejing Wang
      Pages 57-75
  5. Privacy, Architectures

    1. Joan Feigenbaum, Michael J. Freedman, Tomas Sander, Adam Shostack
      Pages 76-105
    2. David Kravitz, Kim-Ee Yeoh, Nicol So
      Pages 106-125
    3. James King, Panos Kudumakis
      Pages 126-140
  6. Software Tamper Resistance

    1. Bill Horne, Lesley Matheson, Casey Sheehan, Robert E. Tarjan
      Pages 141-159
    2. Hoi Chang, Mikhail J. Atallah
      Pages 160-175
    3. William Shapiro, Radek Vingralek
      Pages 176-191
  7. Cryptanalysis

    1. Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Song, David Wagner
      Pages 192-200
  8. Economics, Legal Aspects

  9. Back Matter
    Pages 245-245

About these proceedings


The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.


DRM anonymity copyright data security digital rights management digital rights management systems fingerprinting image hashing intelectual property protection privacy security software aging software protection watermarking

Editors and affiliations

  • Tomas Sander
    • 1
  1. 1.InterTrust STAR Lab. - New JerseyPrincetonUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43677-5
  • Online ISBN 978-3-540-47870-6
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment