首页> 外文会议>ACM workshop on Digital rights management >Public-key traitor tracing from efficient decoding and unbounded enrollment
【24h】

Public-key traitor tracing from efficient decoding and unbounded enrollment

机译:从有效的解码和无限注册的公钥追踪追踪

获取原文

摘要

For as long as creative materials have been produced, the owners of those materials have sought to protect their rights over them. Indeed, approximately 500 years ago, Miguel de Cervantes had to deal with impostors seeking to publish sequels to the first part of his wildly popular Don Quixote. In the present day, the same problems exist, further exacerbated by the ongoing "digital revolution". The field of digital rights management (DRM) has formed around those seeking to deal with the modern instantiation of these problems. This volume, the eighth in a series associated with the ACM DRM Workshops, contains research contributions by those at the forefront of the field. >The 8th ACM Workshop on Digital Rights Management -- ACM-DRM'08, held in conjunction with the 15th ACM Conference on Computer and Communications Security (CCS), consisted of the talks and discussions associated with each of the papers contained in this volume, two invited talks, and a panel discussion involving participants with widely different views on the future direction of DRM. One of the invited talks was given by Internet pioneer Robert Kahn, and considered naming infrastructures associated with past and emerging DRM systems, while the other was given by cryptographer Yacov Yacobi, and considered content identification as well as the problem of counterfeiting software and content. During the panel discussion, recognized experts in the field considered the past development of DRM, with its many false starts, and the likely direction considered of future DRM usages. The panel included representatives from industry involved with the deployment of commercial DRM systems, as well as representatives from academia that have wrestled with the difficult policy and consumer rights issues connected with the field.
机译:只要生产创意材料,这些材料的所有者就试图保护他们对他们的权利。事实上,大约500年前,Miguel de Cervantes必须处理寻求向他疯狂流行的第一部分发表续集的冒名顶替者唐吉诃德。在现在,存在同样的问题,通过持续的“数字革命”进一步加剧。数字权利管理领域(DRM)已经形成了那些寻求处理这些问题的现代实例化的人。此卷,与ACM DRM研讨会相关联的第八次,包含了该领域最前沿的研究贡献。 >数字版权管理的第8 ACM研讨会 - ACM-DRM与第15届计算机和通信安全性(CCS)联合举行的“08 ”由与本卷中包含的每篇论文相关联的会谈和讨论组成,两个邀请会谈,以及涉及参与者对DRM的未来方向广泛不同观点的小组讨论。其中一个受邀谈判由互联网先驱罗伯特卡恩提供,并考虑了与过去和新兴的DRM系统相关的命名基础设施,而另一个由密码·雅各布Yacobi提供,并考虑内容识别以及假冒软件和内容的问题。在小组讨论期间,该领域的认可专家认为DRM的过去发展,其许多错误开始,并且可能导致未来的DRM使用。该小组包括与部署商业DRM系统的行业的代表,以及学术界的代表,这些代表已经与与该领域相关的困难的政策和消费者权利问题搏斗。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号