Co-located with ACM CCS 2008
Program | |
8:00 – 8:50 | Breakfast |
8:50 – 9:00 | Opening remarks |
Keynote Talk I
Chair: Greg Heileman |
|
9:00 – 9:50 | The role of identifiers in information access Robert Kahn |
Session 1: Traitor Tracing
Chair: Rei Safavi-Naini |
|
9:50 – 10:15 | Adaptive traitor tracing for anonymous attack Hongxia Jin, Jeffery Lotspiech, and Nimrod Megiddo |
10:15 – 10:40 | Public-key traitor tracing from efficient decoding and
unbounded enrollment Aggelos Kiayias and Moti Yung |
10:40 – 11:00 | Morning break |
Session 2: Models for
Rights and Interoperability
Chair: Ton Kalker |
|
11:00 – 11:25 | A four-layer model for security of Digital Rights
Management Eric Diehl |
11:25 – 11:50 | A formal conceptual model for rights Pramod Jamkhedkar and Gregory Heileman |
11:50 – 12:15 | Design rules for interoperable domains —
Controlling content dilution and content sharing (slides) Gwenael Doerr and Ton Kalker |
12:30 – 14:00 | Lunch |
Keynote Talk II
Chair: Marc Joye |
|
14:00 – 14:50 | Content identification (slides) Yacov Yacobi |
Session 3: Applications
Chair: Hongxia Jin |
|
14:50 – 15:15 | RSA-TBOS signcryption with proxy re-encryption Varad Kirtane and Chandrasekaran Pandurangan |
15:15 – 15:40 | A decision theoretic framework for analyzing hash-based
content identification systems Avinash Varna, Ashwin Swaminathan, and Min Wu |
15:40 – 16:00 | Afternoon break |
Session 4: Implementation
and Legislation
Chair: Aggelos Kiayias |
|
16:00 – 16:25 | Assessing privacy criteria for DRM using EU privacy
legislation Anja Becker, Alapan Arnab, and Mercè Serra |
16:25 – 16:50 | Enforcing DRM policies across applications Srijith Nair, Gabriela Gheorghe, Bruno Crispo, and Andrew Tanenbaum |
Panel Discussion
Moderator: Greg Heileman |
|
17:00 – 18:00 | The future of Digital Rights Management Panelists: L. Jean Camp, Peter Eckersley, Ton Kalker, and Moti Yung |