Main navigation | Main content
HOME » PROGRAMS/ACTIVITIES » Annual Thematic Program
Organizers:
Michael
Barnsley
Department of Mathematics &
Statistics
University of Melbourne
mbarnsley@aol.com
David Du
Department
of Computer Science
University of Minnesota
du@cs.umn.edu
IMA Public Lecture:
Bruce Schneier (Counterpane Internet Security)
Natural
Laws of Digital Content: the Folly of Copy Protection
on the Internet
Slides
(pdf) Audio MP3
24k (15.5mb)
64k (41mb) 128k (82mb)
Monday, February 12, 2001, 7:00 pm
2650 Moos Tower
The Internet offers unprecedented capabilities as a distribution channel for digital assets. Digital asset management over the internet today requires technologies for:
- asserting intellectual property rights;
- protecting intellectual
property;
- managing the intellectual
property value chain;
- efficient storage
and retrieval of digital assets;
- verifying the source
of the assets (authentication);
- secure distribution
of digital assets to end users;
- effective distribution
of digital assets to end users.
The goals of this workshop are to formulate and begin to solve these and related challenges. The workshop will bring together, in an intense mathematical environment, mathematical scientists, engineers and computer scientists, including software architects, who are involved theoretically or practically with designing and building digital asset management systems.
In more detail, the challenges are:
Asserting intellectual property rights - Because digital assets are easy to copy and redistribute, ownership information must be embedded into content in a way that can tolerate tampering, editing and other forms of modification. Digital watermarking of audio, images and video is a technology that addresses these problems.
Protecting intellectual property - Techniques for efficient encryption of digital content is one technique for ensuring that assets are available to the appropriate end users. Many advanced mathematical methods are using to encrypt digital assets.
Managing the intellectual property value chain - Authoring and distributing digital content, such as video and audio, are only two stages in the value chain. Rights negotiations are a time consuming and complex part of digital asset management. Software agents can be used to implement bargaining strategies and mathematical theory is currently being developed to automate bidding.
Efficient storage and retrieval of digital assets - Digital assets must be compressed, indexed, retrieved and uncompressed efficiently. These are often conflicting goals and new mathematical ideas are needed to index and retrieve compressed content. Efficient translation between formats is an important issue.
Verifying the source of the assets (authentication) - Digital signatures, public key encryption and digital steganography can be used to authenticate the origin of digital content.
Secure distribution of digital assets to end users - Digital assets must be securely delivered to end users, requiring session oriented crypographic techniques and session keys for efficient encoding and decoding.
Efficient distribution of digital assets to end users - The owners of digital assets are typically not the owners or operators of the networks over which the content is distributed. In fact, the internet is a highly decentralized, international telecommunications infrastructure that is increasingly being targeted by criminals, hackers and terrorists. Mathematical models for distributed communication, management, monitoring and control of large networks will be discussed.
| Monday | Tuesday |
| MONDAY,
FEBRUARY 12 All talks are in Lind Hall 409 unless otherwise noted. |
||
|---|---|---|
| 8:30 am | Coffee and Registration |
Lind Hall 400 |
| 9:10 am | Willard Miller, Fred Dulles | Welcome and Introduction |
| 9:30 am | George
Cybenko Dartmouth College |
Workshop Introduction and Plans |
| 10:00 am | Hal
R. Varian University of California-Berkeley |
Buying, Renting, and Sharing Information Goods Slides (pdf) |
| 11:00 am | Break | Lind Hall 400 |
| 11:30 am-12:30 pm | Sharon
Flank eMotion, Inc. |
|
| 2:00 pm | James
P. Hughes Storage Technology Corporation |
The Secure Distribution of Information in a Corporate Environment Slides (pdf) |
| 3:00 pm | Break | Lind Hall 400 |
| 3:30-4:30 pm | C.
Lee Giles The Pennsylvania State University |
Web Search: The Role for Niche Search Engines |
| 4:30 pm | Discussion and wrapup | |
| 5:00-6:30 pm | Reception for Public Lecture | 400 Lind Hall |
|
7:00 pm
|
Paul
Garrett Public
Lecture: Bruce Schneier
Counterpane Internet Security |
Introduction of Bruce Schneier
Slides
(pdf) Audio |
| TUESDAY,
FEBRUARY 13 All talks are in Lind Hall 409 unless otherwise noted. |
||
| 8:45 am | Coffee | Lind Hall 400 |
| 9:00 am | Edward
J. Delp Purdue University |
Multimedia Security: Is there Hope in Securing our "Digital Future?" Slides (pdf) |
| 10:00 am | Avni
Rambhia e-Vue Inc. |
|
| 11:00 am | Break | Lind Hall 400 |
| 11:30 am-12:30 pm | Lyman
Hurd Iterated Systems, Inc. |
|
| 3:00 pm | Gerhard O. Michler Universität Gesamthochschule Essen |
A Prototype of a Combined Digital and Retrodigitized Searchable Mathematical Journal Talk pdf postscript |
| 4:00 pm | Discussion and wrapup | |
| WEDNESDAY,
FEBRUARY 14 All talks are in Lind Hall 409 unless otherwise noted. |
||
| 8:45am | Coffee | Lind Hall 400 |
| 9:00 am | Edward
J. Delp Purdue University |
|
| 10:00 am | George
Cybenko Dartmouth College |
Monitoring the Web: New Metrics and Measurements |
| 11:00 am | Break | Lind Hall 400 |
| 11:30 am-12:30 pm | H. Joel Trussell North Carolina State University |
|
| 2:00 pm | Michiel
van der Veen Philips Research Laboratories |
Secure Delivery of Entertainment Content |
| 3:00 pm | Break | Lind Hall 400 |
| 3:30 pm | Florian
Pestoni IBM Almaden Research Center |
|
| 4:30 pm | Discussion and wrapup | |
| THURSDAY,
FEBRUARY 15 All talks are in Lind Hall 409 unless otherwise noted. |
||
| 8:45 am | Coffee | Lind Hall 400 |
| 9:00 am | Dhiraj
Kacker Shutterfly |
|
| 10:00 am | Break | Lind Hall 400 |
| 10:30-11:30 am | Richard
E. Smith Secure Computer Corporation |
Modeling the Intellectual Property Value Chain Based on Computer Security Incidents |
| 12:00-1:00 pm | Michael
Barnsley University of Melbourne |
Constructing Dynamical System Representations for Stationary (Discrete Alphabet) Stochastic Processes, Lossless Fractal Compression and the Burrows-Wheeler Transform |
| 1:30 pm | Ahmed
Tewfik University of Minnesota |
Music In the Early Part of the 21st Century |
| 2:30--3:30 pm | Francisco
Javier Thayer MITRE Corporation |
Graphical, Algebraic and Probabilistic Models for Protocols Slides pdf postscript |
| 4:30 pm | Discussion and wrapup | |
| FRIDAY,
FEBRUARY 16 All talks are in Lind Hall 409 unless otherwise noted. |
||
| 8:45 am | Coffee | Lind Hall 400 |
| 9:00 am | Michael
Barnsley University of Melbourne |
Separation of Image Science, Subjectivity and Mathematics in the Storage, Retrieval and Indexing of Digital Real World Images |
| 10:00 am | Break | Vincent Hall 502 |
| 11:10 am | David
Du University of Minnesota |
Asset Management Aspects of End-to-End Video Streaming over the Internet |
| 12:10 pm | Discussion and wrapup | |
| Monday | Tuesday |
| Name | Department | Affiliation |
|---|---|---|
| Michael Barnsley | Mathematics & Statistics | University of Melbourne |
| Sankar Basu | IBM T.J. Watson Research Center | |
| John Baxter | Mathematics | University of Minnesota |
| Jamylle Carter | Institute for Mathematics and its Applications | |
| George Cybenko | Thayer Engineering | Dartmouth College |
| Edward Delp | Electrical Engineering | Purdue University |
| David Du | Computer Science | University of Minnesota |
| Fred Dulles | Institute for Mathematics & its Applications | |
| Sharon Flank | eMotion, Inc. | |
| Paul Garrett | Mathematics | University of Minnesota |
| Nathan Georgitis | Minnesota Public Radio | |
| C. Lee Giles | Information Sciences & Technology | The Pennsylvania State University |
| Bin Han | Institute for Mathematics and its Applications | |
| James P. Hughes | Storage Technology Corporation | |
| Lyman Hurd | MediaBin, Inc. | |
| Dhiraj Kacker | Shutterfly | |
| Mostafa Kaveh | Electrical & Computer Engineering | University of Minnesota |
| Brian Loe | Secure Computing | |
| Gerhard Michler | Institut für Experimentelle Mathematik | Universität Essen |
| Willard Miller | Institute for Mathematics & its Applications | |
| Peter Olver | Mathematics | University of Minnesota |
| Florian Pestoni | IBM Almaden Research Center | |
| Jianliang Qian | Institute for Mathematics and its Applications | |
| Avni Rambhia | Project Manager, Image & DRM | e-Vue, Inc. |
| Bruce Schneier | Counterpane Internet Security, Inc. | |
| Zafar Singhera | Research & Development | Sapient Corporation |
| Richard Smith | Advanced Technology Division | Secure Computing Corporation |
| Ahmed Tewfik | Electrical Engineering | University of Minnesota |
| Francisco Javier Thayer | MITRE Corporation | |
| Joel Trussell | Electrical and Computer Engineering | North Carolina State University |
| Michiel Van Der Veen | Philips Research Laboratories | |
| Hal Varian | Information Management & Systems | University of California Berkeley |
|
|
|
|
|