Program
 
8:00 – 8:50 Breakfast
8:50 – 9:00 Opening remarks
 
Keynote Talk I
Chair: Greg Heileman
9:00 – 9:50 The role of identifiers in information access
Robert Kahn
 
Session 1: Traitor Tracing
Chair: Rei Safavi-Naini
9:50 – 10:15 Adaptive traitor tracing for anonymous attack
Hongxia Jin, Jeffery Lotspiech, and Nimrod Megiddo
10:15 – 10:40 Public-key traitor tracing from efficient decoding and unbounded enrollment
Aggelos Kiayias and Moti Yung
 
10:40 – 11:00 Morning break
 
 
Session 2: Models for Rights and Interoperability
Chair: Ton Kalker
11:00 – 11:25 A four-layer model for security of Digital Rights Management
Eric Diehl
11:25 – 11:50 A formal conceptual model for rights
Pramod Jamkhedkar and Gregory Heileman
11:50 – 12:15 Design rules for interoperable domains — Controlling content dilution and content sharing (slides)
Gwenael Doerr and Ton Kalker
 
12:30 – 14:00 Lunch
 
 
Keynote Talk II
Chair: Marc Joye
14:00 – 14:50 Content identification (slides)
Yacov Yacobi
 
Session 3: Applications
Chair: Hongxia Jin
14:50 – 15:15 RSA-TBOS signcryption with proxy re-encryption
Varad Kirtane and Chandrasekaran Pandurangan
15:15 – 15:40 A decision theoretic framework for analyzing hash-based content identification systems
Avinash Varna, Ashwin Swaminathan, and Min Wu
 
15:40 – 16:00 Afternoon break
 
 
Session 4: Implementation and Legislation
Chair: Aggelos Kiayias
16:00 – 16:25 Assessing privacy criteria for DRM using EU privacy legislation
Anja Becker, Alapan Arnab, and Mercè Serra
16:25 – 16:50 Enforcing DRM policies across applications
Srijith Nair, Gabriela Gheorghe, Bruno Crispo, and Andrew Tanenbaum
 
 
Panel Discussion
Moderator: Greg Heileman
17:00 – 18:00 The future of Digital Rights Management
Panelists: L. Jean Camp, Peter Eckersley, Ton Kalker, and Moti Yung
www.000webhost.com