Narrow your search

Library

KU Leuven (1)

ULB (1)

ULiège (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2002 (1)

Listing 1 - 1 of 1
Sort by
Security and privacy in digital rights management : ACM CCS-8 workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001 : revised papers
Authors: ---
ISBN: 3540478701 3540436774 Year: 2002 Publisher: Berlin, Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.

Keywords

Computer security --- Privacy, Right of --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Management information systems. --- Computer engineering. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Engineering. --- Legal Aspects of Computing. --- Management of Computing and Information Systems. --- Computers and Society. --- Computers --- Information Systems. --- Cryptology. --- Informatics --- Science --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Law and legislation --- Protection --- Security measures --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Design and construction --- Communication systems

Listing 1 - 1 of 1
Sort by