posted by user: zachary || 8833 views || tracked by 18 users: [display]

HealthSec 2012 : 3rd USENIX Workshop on Health Security and Privacy


When Aug 6, 2012 - Aug 7, 2012
Where Bellevue, WA
Submission Deadline Apr 10, 2012
Notification Due May 22, 2012
Final Version Due Jun 25, 2012
Categories    healthcare   security   privacy

Call For Papers

Workshop Organizers

Program Co-Chairs
Carl Gunter, University of Illinois at Urbana-Champaign
Zachary Peterson, Naval Postgraduate School

Program Committee
Elisa Bertino, Purdue University
Anupam Datta, Carnegie Mellon University
Matthew Green, Johns Hopkins University
Insup Lee, University of Pennsylvania
Ruby Lee, Princeton University
Bradley Malin, Vanderbilt University
Helen Nissenbaum, New York University
Nathanael Paul, University of Tennessee and Oak Ridge National Laboratory
Raj Rajagopalan, HP
Elaine Shi, University of California, Berkeley, and Xerox PARC
Jacob Sorber, Dartmouth College
XiaoFeng Wang, Indiana University at Bloomington

There is a rapidly moving trend, fueled by both the public and the private sector, toward electronic healthcare systems and devices. These new systems show great potential to improve the administration of healthcare and, ultimately, patient health. However, due to a host of technical shortfalls and a complicated regulatory environment, threats to patient safety, privacy, and security loom large. The focus of this workshop will be on the development of new techniques and policies to ensure the privacy and security of next-generation healthcare systems and devices.

HealthSec is intended as a forum for lively discussion of aggressively innovative and potentially disruptive ideas on all aspects of medical and health security and privacy. We strongly encourage cross-disciplinary interactions between fields, including, but not limited to, technology, medicine, and policy.

For the first time, the HealthSec Program Committee is soliciting previously unpublished, full-length technical papers that concern privacy and security threats, models, architectures, and protections for health information technologies. We will also select shorter position papers that show potential to stimulate or catalyze further research and explore new directions—surprising results and thought-provoking ideas will be strongly favored. Lastly, we hope to repeat last year's lively rump session, open to anyone with work in progress or preliminary results.

We plan to expand this year's workshop to two days, allowing for more time to discuss a wider array of thought-provoking ideas and topics. The format of the workshop will be short presentations by the authors of position papers and longer presentations by authors with full-length papers. Paper presentation will be augmented by break-out discussion groups, expert panels, and a keynote address. The papers will be published on the USENIX Web site.

Workshop topics are solicited in all areas relating to healthcare information security and privacy, including:
- Access control and consent management systems
- Techniques for analyzing and securing audit logs
- Architectures for large-scale health information systems and health information exchange
- Medical devices and body area networks
- Mobile devices and their use with health and fitness devices
- Home and assisted living monitoring systems
- Threat models: formal descriptions and analysis
- Privacy enhancing technologies such as de-identification and differential privacy for electronic health records generally or specific types of data such as images or genomic data
- Usability and human factors
- Regulatory and policy issues
- Authentication and identification techniques
- Cryptographic protocols

Submitted full-length papers must be no longer than ten (10) 8.5" x 11" pages. Submitted position papers should be no longer than two (2) 8.5" x 11" pages. All papers should be typeset in two-column format in 10 point type on 12 point (single-spaced) leading, with a text block no more than 6.5" wide by 9" deep. Submissions are single-blind; authors should include their names and affiliations as part of their submissions. Submissions must be in PDF format and must be submitted via the Web submission form, which will be available here soon.
Papers accompanied by nondisclosure agreement forms will not be considered. Submission of work containing plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits this practice and may take action against authors who have committed it. See the USENIX Conference Submissions Policy for details. Questions? Contact your program co-chairs,, or the USENIX office,

All papers will be available online to registered attendees before the workshop. If your accepted paper should not be published prior to the event, please notify The papers will be available online to everyone beginning on the first day of the workshop, August 6, 2012.

Related Resources

CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
USENIX ATC 2022   2022 USENIX Annual Technical Conference
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
TrustCom 2022   The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
IEEE Edge_AI Conn_Health 2022   The IEEE GLOBECOM 2022 Workshop on the Edge-AI and IoT for Connected Health