Workshop to be held at CES in the Las Vegas Convention Center (LVCC).
Consumers and consumer electronics are increasingly using the Internet for distribution of digital goods, including digital versions of books, articles, music, and images. The ease with which digital goods can be copied and redistributed make the Internet well suited for unauthorized copying, modification and redistribution. The rapid adoption of new technologies such as high-bandwidth connections, wireless networks, and peer-to-peer networks is accelerating this process.
This half-day workshop on Digital Rights Management Impact on Consumer Communications addresses problems faced by rights holders (who seek to protect their intellectual property rights) and by end consumers (who seek to protect their privacy and to preserve access they now enjoy in traditional media under).
Digital Rights Management (DRM) systems are intended to protect the rights of content owners in scenarios in which the participants have conflicting goals and are not fully trusted. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel security mechanisms can enable new business models and applications. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting.
The workshop will contain some invited presentations and presentations accepted by open submission. The format will be a series of presentations held in a panel/forum type of environment to encourage interaction and discussion of topics and issues.
The workshop seeks workshop proposal submissions (consisting of an extended abstract) on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems on topics including, but not limited to, those shown below.:
- DRM protocols
- architectures for DRM systems
- business models for online content distribution
- copyright-law issues, including but not limited to fair use
- digital policy management
- information ownership
- privacy and anonymity
- risk management
- robust identification of digital content
- security issues, including but not limited to authorization, encryption, tamper resistance, and watermarking
- threat and vulnerability assessment
- usability aspects of DRM systems
- web services
- CAPEX, OPEX, TCO examples/ estimations/models
Guidelines for Submission
Interested participants should submit a one-page extended abstract describing their proposed topic. This abstract should define the specific problem being addressed, describe the novelty of the solution to the problem and/or the issues surrounding the problem. The abstract should be used as the basis for a 20-30 minute presentation that will be a part of the workshop. Copies of the presentations will be assembled in a book and will also be made available online. There will be no full paper submission and publication.
1. Submit an electronic copy of the paper in a .pdf or .ps format through the EDAS paper submission site http://edas.info by selecting CCNC'05.
2. A separate cover sheet should show the title of the paper, the author(s) name(s) and affiliation(s), and the address (including e-mail, telephone, and fax) to which the correspondence should be sent.
30 September 2004 - Abstract submission
31 October 2004 - Author Notification
30 November 2004 - Copy of Presentation due
6 January 2005 - Workshop
Wenjun Zeng, University of Missouri
Technical Program Committee:
Leonardo Chiariglione, Digital Media Project
Rajit Gadh, UCLA
Lindsey Holman, Panasonic
Deepa Kundur, Texas A&M University
Madjid Merabti, University of Liverpool
Marc Waldman, Manhattan College
Heather Yu, Panasonic
Bin Zhu, Microsoft Research Asia
For more information contact Wenjun Zeng, University of Missouri-Columbia - zengw [at] missouri.edu