𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Security and Privacy in Digital Rights Management Volume 2320 || Protecting Software Code by Guards

✍ Scribed by Sander, Tomas


Book ID
115460118
Publisher
Springer Berlin Heidelberg
Year
2002
Tongue
German
Weight
563 KB
Edition
2002
Category
Article
ISBN
3540436774

No coin nor oath required. For personal study only.

✦ Synopsis


The Acm Workshop On Security And Privacy In Digital Rights Management Is The ?rst Scienti?c Workshop With Refereed Proceedings Devoted Solely To This Topic. The Workshop Was Held In Conjunction With The Eighth Acm Conference On Computer And Communications Security (ccs-8) In Philadelphia, Usa On November 5, 2001. Digital Rights Management Technology Is Meant To Provide End-to-end So- Tions For The Digital Distribution Of Electronic Goods. Sound Security And Privacy Features Are Among The Key Requirements For Such Systems. Fifty Papers Were Submitted To The Workshop, Quite A Success For A ?rst-time Workshop. From These 50 Submissions, The Program Committee Selected 15 Papers For Presentation At The Workshop. They Cover A Broad Area Of Relevant Techniques, Including Cryptography, System Architecture, And Cryptanalysis Of Existing Drm Systems. Three Accepted Papers Are About Software Tamper Resistance, An Area About Which Few Scienti?c Articles Have Been Published Before. Another Paper Addresses Renewability Of Security Measures. Renewability Is Another Important Security Technique For Drm Systems, And I Hope We Will See More Publications About This In The Future. I Am Particularly Glad That Three Papers Cover Economic And Legal Aspects Of Digital Distribution Of Electronic Goods. Technical Security Measures Do Not Exist In A Vacuum And Their E?ectiveness Interacts In A Number Of Ways With The Environment For Legal Enforcement. Deploying Security And An- Piracy Measures Adequately Requires Furthermore A Good Understanding Of The Business Models That They Are Designed To Support. Discouraging Software Piracy Using Software Aging / Markus Jakobsson And Michael K. Reiter -- New Iterative Geometric Methods For Robust Perceptual Image Hashing / M. Kivanc Mihcak And Ramarathnam Venkatesan -- On Crafty Pirates And Foxy Tracers / Aggelos Kiayias And Moti Yung -- Efficient State Updates For Key Management / Benny Pinkas -- Collusion Secure Q-ary Fingerprinting For Perceptual Content / Raihaneh Safavi-naini And Yejing Wang -- Privacy Engineering For Digital Rights Management Systems / Joan Feigenbaum, Michael J. Freedman And Tomas Sander / [and Others] -- Secure Open Systems For Protecting Privacy And Digital Services / David Kravitz, Kim-ee Yeoh And Nicol So -- Mpeg-4 Ipmp Extensions / James King And Panos Kudumakis. Tomas Sander (ed.). Includes Bibliographical References And Index.


πŸ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Trus
✍ Katsikas, Sokratis; LΓ³pez, Javier; Pernul, GΓΌnther πŸ“‚ Article πŸ“… 2005 πŸ› Springer Berlin Heidelberg 🌐 English βš– 353 KB

Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunct