Workshop on Security and Privacy in Digital Rights Management 2001

November 5, 2001
The Doubletree Hotel
Philadelphia, Pennsylvania, USA

held as part of the
Eighth ACM Conference on Computer and Communications Security (CCS-8)

NEW: Preliminary program available now!

NEW: List of accepted papers available now!

NEW: Registration instructions available now!

Call For Papers

Increasingly the Internet is used for the distribution of digital goods, including digital versions of books, articles, music and images. The ease with which digital goods can be copied and redistributed make the Internet well suited for unauthorized copying, modification and redistribution. The rapid adoption of new technologies such as high bandwidth connections and peer-to-peer networks is accelerating this process.

This workshop will consider technical problems faced by rights holders (who seek to protect their intellectual property rights) and end consumers (who seek to protect their privacy and to preserve access they now enjoy in traditional media under existing copyright law).

Digital Rights Management (DRM) systems are supposed to serve mass markets, in which the participants have conflicting goals and cannot be fully trusted. This adversarial situation introduces interesting new twists on classical problems studied in cryptology and security research, such as key management and access control. Furthermore, novel business models and applications often require novel security mechanisms. Recent research has also proposed new primitives for DRM, such as hash functions that make it possible to identify content in an adversarial setting.

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of DRM, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. It is planned to publish accepted papers in  proceedings in the Springer Lecture Notes in Computer Science (LNCS) series.

Topics of interest include, but are not limited to, the following, as they relate to digital rights management:

access control mechanisms for digital rights 
anonymous publishing 
architectures for DRM systems 
auditing and piracy 
broadcast encryption and traitor tracing 
business models and their security requirements 
electronic commerce protocols 
encryption and authentication for multimedia data 
fair use 
key management in DRM systems 
payment mechanisms 
peer-to-peer networks 
portability of digital rights

privacy and anonymity 
privacy-preserving data mining 
risk management 
robust identification of digital content 
security for auctions and other emerging
          business models for digital goods
security models 
software tamper resistance 
tamper resistant hardware and consumer devices 
threat and vulnerability assessment 
trust management 
usability aspects of client software, consumer 
watermarking and fingerprinting for media and 


Invited Introductory Talk

On the design of systems for digital rights management
Stuart Haber, InterTrust STAR Lab

Program Chair

Tomas Sander, InterTrust STAR Lab

Program Committee

Eberhard Becker, University of Dortmund
Dan Boneh, Stanford University
Karlheinz Brandenburg, Fraunhofer Institute for Integrated Circuits IIS-A
Leonardo Chiariglione, CSELT
Drew Dean, SRI International
Joan Feigenbaum, Yale University
Edward Felten, Princeton University
Yair Frankel, eCash Technologies
Markus Jakobsson, RSA Laboratories
Paul Kocher, Cryptography Research
John Manferdelli, Microsoft Research
Kevin McCurley, IBM Research
Moni Naor, Weizmann Institute
Fabien Petitcolas, Microsoft Research
Pamela Samuelson, University of California, Berkeley
Hal Varian, University of California,  Berkeley
Moti Yung, CertCo

Important Dates

Paper submissions due

August 3, 2001

Acceptance notifications

September 7, 2001

DRM Workshop 

November 5, 2001

CCS Conference

November 6-8, 2001


Paper submissions   Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 18 pages excluding the bibliography and well-marked appendices (using 11-point font and reasonable margins), and at most 22 pages total. Committee members are not required to read the appendices and the paper should be intelligible without them. The paper should start with the title, names of authors and an abstract. The introduction should give some background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. It is planned to publish accepted papers in  proceedings in the Springer Lecture Notes in Computer Science (LNCS) series after the workshop.  During the workshop preproceedings will be made available. Final versions are not due until after the workshop, giving the authors the opportunity to revise their papers based on discussions during the meeting.

Submissions can be made in Postscript, PDF or MS Word format. To submit a paper, send a plain ASCII text email to the program chair (email: containing the title and abstract of the paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author.  To the same message, attach your submission (as a MIME attachment). Papers must be received by  August 3, 2001. Notification of acceptance or rejection will be sent to authors no later than September 7, 2001. Authors of accepted papers must guarantee that their paper will be presented at the workshop. Final versions (due after the workshop) need to comply with the instructions for authors  made available by Springer.

Contact info program chair
Tomas Sander
InterTrust STAR Lab
4750 Patrick Henry Drive
Santa Clara, CA 95054, USA
phone: +1-408-855 0242
fax:  +1-408-855 0136

Further information

Maintained by Tomas Sander (