AUSTRALASIAN INFORMATION SECURITY WORKSHOP 2005 DIGITAL RIGHTS MANAGEMENT Call for Papers The Internet has been increasingly used for the distribution of digital goods, including digital music, video, images and books. The ease of copying and re-distribution of digital goods make this content vulnerable to unauthorised copying, modification and re-distribution. New technologies such as broadband and peer-to-peer communication have exacerbated the situation. The workshop will consider all aspects of Digital Rights Management (DRM) faced by rights holders who want to protect their intellectual property rights and end consumers who seek to protect their privacy and to preserve access they now enjoy in traditional media under existing copyright law). The workshop seeks submissions from academia and industry presenting novel research on theoretical and practical aspects of DRM, as well as experimental studie and fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. It is planned to publish accepted papers in the Conferences in Research and Practice in Information Technology series. Key Areas --------- Topics include but are not limited to: * Anonymous publishing * Architectures for DRM systems * Auditing * Business models for on-line content distribution * Content sharing and mobility * Copyright law issues * Digital policy management * Privacy and anonymity * Risk management * Robust identification of digital content * Security issues (including, but not limited to, authorisation, encryption, tamper resistance and watermarking) * Standards activities in DRM * Threat and vulnerability assessment * Usability aspects of DRM systems * Web services Programme Committee Co-Chairs ----------------------------- * R. Safavi-Naini, Univ. of Wollongong, Australia * P. Montague, Motorola Australia Software Centre, Australia Programme Committee ------------------- * C. Boyd, Qld Univ. of Technology, Australia * E. Dawson, Qld Univ of Technology, Australia * R. H. Deng, Singapore Management Univ. * M. Jackson, RMIT, Australia * T. Messerges, Motorola Labs * A. McCullagh, QUT, Australia * P. Ogunbona, Univ. of Wollongong, Australia * M. Ozols, DSTO, Australia * N. Sheppard, Univ. of Wollongong, Australia * C. Steketee, U of South Australia, Australia * C. Thomborson, University of Auckland, NZ * G. Quirchmayr, Univ of Vienna, Austria * V. Varadharajan, Macquarie Uni, Australia * J. Warden, Personal Comm Sector, Motorola, US * H. Wang, Macquarie Uni, Australia ACSW 2005 Organising Committee Co-Chairs ----------------------------------------- * M. Hannaford, University of Newcastle, Australia * F. Henskens, University of Newcastle, Australia Key dates --------- Submission of abstracts: 31 Aug, 2004 Submission of full papers: 3 Sep, 2004 Notification of acceptance: 15 Oct, 2004 Camera-ready copy due: 12 Nov, 2004 Author registration: 12 Nov, 2004 ACSW 2005 and workshop: 31 Jan, 2005 - 3 Feb, 2005 ACSW 2005 --------- AISW is part of Australasian Computer Science Week 2005, to be held at the University of Newcastle from 31 January to 3 February, 2005. ACSW 2005 also includes: * 28th Australasian Computer Science Conference (ACSC2005) * 16th Australasian Database Conference (ADC2005) * 6th Australasian User Interface Conference (AUIC2005) * Computing: the Australasian Theory Symposium (CATS2005) * 10th Asia-Pacific Computer System Architecture Conference (ACSAC2005) * 7th Australasian Computing Education Conference (ACE2005) * 2nd Asia-Pacific Conference on Conceptual Modelling (APCCM2005) Registration for any of these conferences will enable delegates to attend sessions in any ACSW conference and workshop. Registration for AISW alone (one day) will also be available. The proceedings for each conference / workshop will be made available through the CRPIT website. The ACSW web site is at http://www.cs.newcastle.edu.au/~acsw05. Submission Guidelines --------------------- Submissions should conform to the submission guidelines below and be emailed as an attachment (PDF, PostScript or Microsoft Word acceptable) to firstname.lastname@example.org. The covering email should indicate the name and details of the primary contact author. Confirmation will be sent once the file has been successfully received. Papers describing original contributions up to 10 pages in length are invited. Papers should conform to the formatting instructions for the series Conferences in Research and Practice in Information Technology (available at http://crpit.com/). Both research papers and papers describing practical experiences and security implementations are welcome. Each paper will be double refereed. Papers will be judged on originality, significance, correctness and clarity. The contribution of the paper should be clearly explained in both general and technical terms. Submission of a paper includes a commitment that, should the paper be accepted, at least one author will attend the workshop to present the work. Publication ----------- Proceedings will also be published in revised form through the Australian Computer Society in its Conferences in Research and Practice in Information Technology series. At least one author must register for the workshop to ensure publication of the paper.