Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers - Lecture Notes in Computer Science 2320 (Paperback)
  • Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers - Lecture Notes in Computer Science 2320 (Paperback)
zoom

Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers - Lecture Notes in Computer Science 2320 (Paperback)

(editor)
£67.99
Paperback 250 Pages / Published: 26/04/2002
  • We can order this

Usually dispatched within 3 weeks

  • This item has been added to your basket
The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.

Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
ISBN: 9783540436775
Number of pages: 250
Weight: 830 g
Dimensions: 233 x 155 x 14 mm
Edition: 2002 ed.

You may also be interested in...

The Cyber Effect
Added to basket
£10.99
Paperback
Democracy Hacked
Added to basket
£16.99
Hardback
Surveillance Valley
Added to basket
£14.99
Paperback
The Art of Deception
Added to basket
Obfuscation
Added to basket
£12.99
Hardback
The Old Religion
Added to basket
£12.99
Hardback
DarkMarket
Added to basket
£10.99
Paperback
Hello World
Added to basket
£18.99
Hardback
Intercept
Added to basket
£8.99
Paperback
Social Engineering
Added to basket
Zero Trust Networks
Added to basket
£47.99
Paperback
Cybersecurity and Cyberwar
Added to basket
The Perfect Weapon
Added to basket

Reviews

Please sign in to write a review

Your review has been submitted successfully.