Policy-Induced Computer Science Problems? Background for NYU Public Design Workshop Fred B. Schneider Department of Computer Science Cornell University.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

Intellectual Property Image: William J. Wynn.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
Burnett IT Legal Services March 2004 BRITISH COMPUTER SOCIETY NORTH LONDON BRANCH LEGAL ISSUES OF DIGITAL RIGHTS MANAGEMENT Rachel.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
COMP 381.  Ownership and property  Rights of ownership: Blackstonian Bundle Exclude anyone from the property Use it as sees fit Receive income from.
Property in Cyberspace 1.What is “Intellectual Property”?Intellectual Property Intellectual Property Is: Intangible creative work—not necessarily the physical.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
Rootkits: Sneaky, Stealthy Toolboxes
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
CPSC156: The Internet Co-Evolution of Technology and Society Lecture 7: February 6, 2007 More about browsers (ack.: L. Cranor); Introduction to Digital.
Intellectual Property OBE 118 Fall 2004 Professor McKinsey Some property, very valuable property, exists only in our minds, in our imagination. It is intangible.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
C opyright Protection and Digital Rights Management 1.
E-Commerce: Regulatory, Ethical, and Social Environments
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Surveys of Media Access and Consumer Attitudes on Copyright Mike Palmedo & Jimmy Koo March 2011 Photo (cc) Irish Typepad (bit.ly/huMnIf)
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 11: October 16, 2003 Introduction to Digital Copyright and Online Content Distribution.
Teaching Strategies that Work: Copyright, Fair Use and Digital Learning Renee Hobbs Workshop for the Association of College and Research Libraries April.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Blueberry Software IT Security Audit Results. Results: Good.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Intellectual Property and Copyright Ethics Atif Imran Toor Computer Science with Artificial Intelligence Profile
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Evaluating New Copy-Prevention Techniques For Audio CDs John A. Halderman 2002 ACM Workshop on Digital Rights Management (DRM 2002) Available at
Illegal downloading Allison LEROY Clara MANSUY Nabila MENSOURI Jérôme MIHOUBI.
Legal Issues Legal issues include copyright / intellectual property infringements, libel / defamation, disability discrimination and data protection. Any.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
Evaluating New Copy-Protection Techniques for Audio CDs J. A. Halderman, 2002 ACM Workshop on Digital Rights Management (DRM 2002). Available at
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Information Design Trends Unit Seven: Information Privacy & Protection Lecture 1: Intellectual Property and Content Protection.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Security and Ethics Safeguards and Codes of Conduct.
A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Social, Legal, and Ethical Issues for Computing Technology
A Gift of Fire Third edition Sara Baase
Using a Computer Network
Legal aspects of copying audiovisual work onto portable media devices
E-Commerce: Regulatory, Ethical, and Social Environments
By Jake Schmitt, Seth Raleigh, Neil McLain
Digital Rights Management (DRM)
Intellectual Property Rights
Property in Cyberspace
What is Information Security?
Fun Stuff: Digital Media
Presentation transcript:

Policy-Induced Computer Science Problems? Background for NYU Public Design Workshop Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York U.S.A.

1 Recent Research Example What security policies enforceable by monitoring? yAlice may read file HW3SolnSet. yAlice may read file HW3SolnSet only after submitting file HW3Soln. –Mathematical characterization possible. yAccess control: YES yInformation flow: NO –It suggests new implementation techniques. yImplement complete mediation Old approach: OS provided reference monitors New approach: in-lining checks into target

2 Policy-Driven Science: Electronic IP Protection Proposal: Require tamper-proof hardware on every digital device. Security community: Bad idea (but anything less would enable encrypted content to be freely copied). RIAA sues KaZaa et al: Asserts p2p system implementors could build systems that prevent illegal copying of music files. Currently p2p systems enable copyright infringement. Scientific Question: What can be achieved without adding hardware to existing systems? At what cost?

3 Policy-Driven Science: “Secure” Systems TCPA Proposal: Hardware + software that prevents policy from being circumvented on a PC. (Policy itself is left unspecified). yProtects against viruses and other malware. yEnables new business (e.g., pay per view for IP). yProbably blocks “fair-use” copying. Scientific Question: Must any scheme strong enough for IP copy protection also limit “fair use” copying.

4 Policy-Driven Science: Summary l Technological revolutions redefine legal and economic realities. l Two activities might sensibly follow: –Changes to laws (and perhaps to society’s underlying values). –Understanding whether change in laws and/or in values is really needed. Can technology adjust? yIntellectual Property (copyright) yPrivacy (anonymity) yJurisdiction