4th IEEE International Workshop on Digital Rights
Management Impact on Consumer
Consumers and consumer electronics are increasingly using the Internet for distribution of digital goods, including digital versions of books, articles, music, and images. The ease with which digital goods can be copied and redistributed makes the Internet well suited for unauthorized copying, modification and redistribution. The rapid adoption of new technologies such as high-bandwidth connections, wireless networks, and peer-to-peer networks is accelerating this process.
This one-day workshop on Digital Rights Management Impact on Consumer Communications addresses problems faced by rights holders who seek to protect their intellectual property rights and by end consumers who seek to protect their privacy and to preserve access they now enjoy in traditional media under.
Digital Rights Management (DRM) systems are intended to protect the rights of content owners in scenarios in which the participants have conflicting goals and are not fully trusted. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel security mechanisms can enable new business models and applications. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting.
The workshop will contain some invited presentations and presentations accepted by open submission. The format will be a series of presentations held in a panel/forum type of environment to encourage interaction and discussion of topics and issues.
The workshop seeks workshop proposal submissions (consisting of a paper) on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems on topics including, but not limited to, those shown below:
architectures for DRM systems
business models for online content distribution
copyright-law issues, including but not limited to fair use
digital policy management
privacy and anonymity
robust identification of digital content
security issues, including but not limited to authorization, encryption, tamper resistance, and watermarking
threat and vulnerability assessment
usability aspects of DRM systems
implementations and case studies
Guidelines for Submission
Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. Paper length should not exceed five-page technical paper manuscript. Please see the Author Information page for submission guidelines in the CCNC website. The paper should be used as the basis for a 20 - 30 minute workshop presentation.
Papers should be submitted in a .pdf or .ps format by selecting CCNC'08 on the EDAS
paper submission website and then selecting the workshop submission link.
A separate cover sheet should show the title of the paper, the author(s) name(s) and affiliation(s), and the address (including e-mail, telephone, and fax) to which the correspondence should be sent.
All accepted papers will be published in the conference proceedings
At least one author of accepted papers is required to register at the full registration rate.
Paper Submission: 5 Sept 2007
Author Notification: 14 Sept 2007
Camera-ready Copy: 10 Oct 2007
Author Registration Deadline: 10 Oct 2007
Workshop date: 12 Jan 2008
Dr. Xin Wang, Xin.Wang@Contentguard.com, ContentGuard, Inc., USA
Dr. David Llewellyn-Jones, D.Llewellyn-Jones@ljmu.ac.uk John Moores University, UK
Technical Programme Committee
Mo Adda (University of Portsmouth, UK)
Bill Buchanan (Napier University, UK)
Leonardo Chiariglione ( Digital Media Project, IT)
Jaime Delgado (Universitat Pompeu Fabra, Spain)
Diehl Eric (Thomson, FR)
Steven Furnell (Plymouth University, UK)
Rajit Gadh (UCLA, USA)
Stefanos Gritzalis (University of the Aegean, GRE)
Antonius Kalker (Hewlett-Packard, USA)
Mario Kolberg (University of Stirling, UK)
Athanassios Manikas (Imperial College London, UK)
Madjid Merabti (Liverpool John Moores University, UK)
Des McLernon (The University of Leeds, UK)
Mohamed Ould-Khaoua (University of Glasgow, UK)
Colin Perkins (University of Glasgow, UK)
Marc Waldman (Manhattan College, USA)
Heather Yu (Huawei Technologies, USA)
Wenjun Zeng (Univ. of Missouri, Columbia, USA)
Ning Zhang (University of Manchester, USA)
Bin Zhu (Microsoft Research, China)