Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1655048acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
DRM '09: Proceedings of the nineth ACM workshop on Digital rights management
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '09: 16th ACM Conference on Computer and Communications Security 2009 Chicago Illinois USA 9 November 2009
ISBN:
978-1-60558-779-0
Published:
09 November 2009
Sponsors:
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

This volume contains the papers presented at the ninth annual ACM Workshop on Digital Rights Management (DRM), sponsored by the ACM SIGSAC and held in conjunction with the 16th ACM Conference on Computer Computer and Communications Security (CSS). The daylong workshop consisted of informal discussions, peer-reviewed technical talks describing recent research contributions, invited talks that delved into policy issues related to DRM, along with a panel session that included experts in the field from both industry and academia.

As in the past, the workshop provided an international forum that serves as an interdisciplinary bridge between areas that can be applied to DRM, including: cryptography, software and computer systems design, trusted computing, information and signal processing, intellectual property law, policy-making, as well as business analysis and economics. In addition, this year we were privileged to have three invited talks from different cross-sections of the DRM realm. The first of these was provided by a speaker with in-depth experience related to high-value content, namely, Scott Watson, senior Vice President of the Walter Disney company and Chief Technology Officer of Disney Imagineering Research and Development. The next invited talk was given by Randal Picker of the University of Chicago School of Law, who is an expert on laws related to intellectual property and regulated industries. Finally, an invited talk was also given by Edward Felten, Professor and Director of the Center for Information Technology Policy at Princeton University, who is a longstanding proponent of informed public discussion of digital technologies.

Skip Table Of Content Section
SESSION: Cryptographic techniques and formal models
research-article
On the security of a public-key traitor tracing scheme with sublinear ciphertext size

Traitor tracing refers to a class of encryption schemes that can be used to deter key-leakage. They apply to a setting that involves many receivers, each one receiving a fingerprinted decryption key. If a set of malicious receivers (also known as ...

research-article
A simple construction for public-key encryption with revocable anonymity: the honest-sender case

This paper presents a generic and simple transformation that adds traceability to an anonymous encryption scheme. We focus on the case of honest senders, which finds applications in many real-life scenarios. Advantageously, our transformation can be ...

research-article
On the operational semantics of rights expression languages

We propose an operational model for formalising and enforcing rights expression languages based on the concept of a rights expression compiler. Our compiler transforms an XML-based rights expression into a programme for a virtual machine. This approach ...

SESSION: Experience
research-article
An implementation experience of domain management in marlin

Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased content as they can no longer freely access the content at any place using ...

research-article
Broadcast encryption versus public key cryptography in content protection systems

Broadcast encryption and public-key cryptography are two competing key management schemes. Both are in use today, although public key is much more pervasive (pervasive in the number of systems, not necessarily in the number of devices). In certain ...

SESSION: Software protection
research-article
Obfuscating straight line arithmetic programs

Program Obfuscation that renders any given program essentially equivalent to a black box, while desirable, is impossible [4] in the general polynomial time adversary models. It is natural to search for positive results under restricted programs (e.g., ...

research-article
A semi-dynamic multiple watermarking schemefor java applications

Software protection and security has been a more and more important issue. In order to prevent software from unauthorized use and modification, a great many techniques have been proposed and developed. In this paper, we address this issue through a ...

SESSION: Architecture
research-article
Efficient license validation in MPML DRM architecture

Multiparty multilevel DRM architecture (MPML-DRM-A) involves multiple parties such as owner, multiple levels of distributors and consumers. The owner issues redistribution licenses to its distributors, who in turn generate and issue variations of these ...

research-article
Videosurveillance and privacy: covering the two sides of the mirror with DRM

Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacrifice a part of their privacy by accepting to be surveilled by others. The ...

Contributors
  • Carnegie Mellon University
  • Samsung Research America
  • The University of New Mexico
  1. Proceedings of the nineth ACM workshop on Digital rights management
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations