000 05059nam a22006855i 4500
001 978-3-540-47870-6
003 DE-He213
005 20240423132505.0
007 cr nn 008mamaa
008 121227s2002 gw | s |||| 0|eng d
020 _a9783540478706
_9978-3-540-47870-6
024 7 _a10.1007/3-540-47870-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity and Privacy in Digital Rights Management
_h[electronic resource] :
_bACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers /
_cedited by Tomas Sander.
250 _a1st ed. 2002.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2002.
300 _aX, 250 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2320
505 0 _aRenewability -- Discouraging Software Piracy Using Software Aging -- Fuzzy Hashing -- New Iterative Geometric Methods for Robust Perceptual Image Hashing -- Cryptographic Techniques, Fingerprinting -- On Crafty Pirates and Foxy Tracers -- Efficient State Updates for Key Management -- Collusion Secure q-ary Fingerprinting for Perceptual Content -- Privacy, Architectures -- Privacy Engineering for Digital Rights Management Systems -- Secure Open Systems for Protecting Privacy and Digital Services -- MPEG-4 IPMP Extensions -- Software Tamper Resistance -- Dynamic Self-Checking Techniques for Improved Tamper Resistance -- Protecting Software Code by Guards -- How to Manage Persistent State in DRM Systems -- Cryptanalysis -- A Cryptanalysis of the High-Bandwidth Digital Content Protection System -- Economics, Legal Aspects -- Implications of Digital Rights Management for Online Music – A Business Perspective -- From Copyright to Information Law – Implications of Digital Rights Management -- Taking the Copy Out of Copyright.
520 _aThe ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.
650 0 _aData protection.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aComputers
_xLaw and legislation.
650 0 _aInformation technology
_xLaw and legislation.
650 0 _aElectronic data processing
_xManagement.
650 0 _aComputers and civilization.
650 1 4 _aData and Information Security.
650 2 4 _aCryptology.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aLegal Aspects of Computing.
650 2 4 _aIT Operations.
650 2 4 _aComputers and Society.
700 1 _aSander, Tomas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540436775
776 0 8 _iPrinted edition:
_z9783540829805
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2320
856 4 0 _uhttps://doi.org/10.1007/3-540-47870-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188332
_d188332