CALL FOR PROPOSALS
Second Workshop on Digital Rights Management Impact on Consumer Communications
January 2006, Las Vegas Convention Center, Las Vegas, NV, USA
Held in conjunction with CCNC 2006 and the Consumer Electronics Show (CES)
Consumers and consumer electronics are increasingly using the Internet for distribution of digital goods, including digital versions of books, articles, music, and images. The ease with which digital goods can be copied and redistributed makes the Internet well suited for unauthorized copying, modification and redistribution. The rapid adoption of new technologies such as high-bandwidth connections, wireless networks, and peer-to-peer networks is accelerating this process.
This one-day workshop on Digital Rights Management Impact on Consumer Communications addresses problems faced by rights holders (who seek to protect their intellectual property rights) and by end consumers (who seek to protect their privacy and to preserve access they now enjoy in traditional media under).
Digital Rights Management (DRM) systems are intended to protect the rights of content owners in scenarios in which the participants have conflicting goals and are not fully trusted. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel security mechanisms can enable new business models and applications. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting.
The workshop will contain some invited presentations and presentations accepted by open submission. The format will be a series of presentations held in a panel/forum type of environment to encourage interaction and discussion of topics and issues.
The workshop seeks workshop proposal submissions (consisting of a paper) on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems on topics including, but not limited to, those shown below:
- DRM protocols
- architectures for DRM systems
- business models for online content distribution
- copyright-law issues, including but not limited to fair use
- digital policy management
- information ownership
- privacy and anonymity
- risk management
- robust identification of digital content
- security issues, including but not limited to authorization, encryption, tamper resistance, and watermarking
- threat and vulnerability assessment
- usability aspects of DRM systems
- web services
- CAPEX, OPEX, TCO examples/ estimations/models
- computing environments and platforms for DRM (TCP - Trusted Computing Platform)
- Implementations and case studies
Guidelines for Submission
Interested participants should submit a paper (see Author Information Page for submission guidelines) describing their proposed topic. This paper should define the specific problem being addressed, describe the novelty of the solution to the problem and/or the issues surrounding the problem. The paper should be used as the basis for a 20-30 minute Workshop presentation. Accepted papers will be published in the conference proceedings.
- Submit an electronic copy of the paper in a .pdf or .ps format by selecting CCNC'06 at the EDAS paper submission site ( http://edas.info ).
- A separate cover sheet should show the title of the paper, the author(s) name(s) and affiliation(s), and the address (including e-mail, telephone, and fax) to which the correspondence should be sent.
- 15 July 2005 - Paper submission
- 1 September 2005 - Author Notification
- 7 October 2005 - Final Camera Ready Paper Submission Deadline
- 10 January 2006 - Workshop
- 1 October, 2005 - Author registration deadline
Madjid Merabti, Liverpool John Moores University
Proposed Technical Program Committee
- Leonardo Chiariglione, Digital Media Project
- Rajit Gadh, UCLA
- Lindsey Holman, Panasonic
- Deepa Kundur, Texas A&M University
- Wenjun Zeng, University of Missouri
- Marc Waldman, Manhattan College
- Heather Yu, Panasonic
- Bin Zhu, Microsoft Research Asia
- Madjid Merabti, Liverpool John Moores University
- Ning Zhang, Manchester University
- Ton Walker , HP Labs
- Jean-Henry Morin, University of Geneva
- Jeffrey A. Bloom, Sarnoff Corporation
- Ahmet M. Eskicioglu ( Brooklyn College
- Rajen Akalu ( Bell University Laboratories
- Stephanos Gritzalis, Agean University
- Jeffrey Bloom, USA
- Richard Owens, Switzerland
- Jordon Chong , Netherlands