posted by user: zachary || 7105 views || tracked by 18 users: [display]

HealthSec 2012 : 3rd USENIX Workshop on Health Security and Privacy


When Aug 6, 2012 - Aug 7, 2012
Where Bellevue, WA
Submission Deadline Apr 10, 2012
Notification Due May 22, 2012
Final Version Due Jun 25, 2012
Categories    healthcare   security   privacy

Call For Papers

Workshop Organizers

Program Co-Chairs
Carl Gunter, University of Illinois at Urbana-Champaign
Zachary Peterson, Naval Postgraduate School

Program Committee
Elisa Bertino, Purdue University
Anupam Datta, Carnegie Mellon University
Matthew Green, Johns Hopkins University
Insup Lee, University of Pennsylvania
Ruby Lee, Princeton University
Bradley Malin, Vanderbilt University
Helen Nissenbaum, New York University
Nathanael Paul, University of Tennessee and Oak Ridge National Laboratory
Raj Rajagopalan, HP
Elaine Shi, University of California, Berkeley, and Xerox PARC
Jacob Sorber, Dartmouth College
XiaoFeng Wang, Indiana University at Bloomington

There is a rapidly moving trend, fueled by both the public and the private sector, toward electronic healthcare systems and devices. These new systems show great potential to improve the administration of healthcare and, ultimately, patient health. However, due to a host of technical shortfalls and a complicated regulatory environment, threats to patient safety, privacy, and security loom large. The focus of this workshop will be on the development of new techniques and policies to ensure the privacy and security of next-generation healthcare systems and devices.

HealthSec is intended as a forum for lively discussion of aggressively innovative and potentially disruptive ideas on all aspects of medical and health security and privacy. We strongly encourage cross-disciplinary interactions between fields, including, but not limited to, technology, medicine, and policy.

For the first time, the HealthSec Program Committee is soliciting previously unpublished, full-length technical papers that concern privacy and security threats, models, architectures, and protections for health information technologies. We will also select shorter position papers that show potential to stimulate or catalyze further research and explore new directions—surprising results and thought-provoking ideas will be strongly favored. Lastly, we hope to repeat last year's lively rump session, open to anyone with work in progress or preliminary results.

We plan to expand this year's workshop to two days, allowing for more time to discuss a wider array of thought-provoking ideas and topics. The format of the workshop will be short presentations by the authors of position papers and longer presentations by authors with full-length papers. Paper presentation will be augmented by break-out discussion groups, expert panels, and a keynote address. The papers will be published on the USENIX Web site.

Workshop topics are solicited in all areas relating to healthcare information security and privacy, including:
- Access control and consent management systems
- Techniques for analyzing and securing audit logs
- Architectures for large-scale health information systems and health information exchange
- Medical devices and body area networks
- Mobile devices and their use with health and fitness devices
- Home and assisted living monitoring systems
- Threat models: formal descriptions and analysis
- Privacy enhancing technologies such as de-identification and differential privacy for electronic health records generally or specific types of data such as images or genomic data
- Usability and human factors
- Regulatory and policy issues
- Authentication and identification techniques
- Cryptographic protocols

Submitted full-length papers must be no longer than ten (10) 8.5" x 11" pages. Submitted position papers should be no longer than two (2) 8.5" x 11" pages. All papers should be typeset in two-column format in 10 point type on 12 point (single-spaced) leading, with a text block no more than 6.5" wide by 9" deep. Submissions are single-blind; authors should include their names and affiliations as part of their submissions. Submissions must be in PDF format and must be submitted via the Web submission form, which will be available here soon.
Papers accompanied by nondisclosure agreement forms will not be considered. Submission of work containing plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits this practice and may take action against authors who have committed it. See the USENIX Conference Submissions Policy for details. Questions? Contact your program co-chairs,, or the USENIX office,

All papers will be available online to registered attendees before the workshop. If your accepted paper should not be published prior to the event, please notify The papers will be available online to everyone beginning on the first day of the workshop, August 6, 2012.

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
NDSS 2019   Network and Distributed System Security Symposium
CODASPY 2019   ACM Conference on Data and Application Security and Privacy
USENIX ATC 2018   USENIX Annual Technical Conference
WCMC-IoT 2018   WCMC journal, Special issue on Security, Privacy, and Trust on Internet of Things
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
IJMPICT 2018   International Journal of Managing Public Sector Information and Communication Technologies
SPIoT 2018   The 7th International Symposium on Security and Privacy on Internet of Things
USENIX-Security 2018   27th USENIX Security Symposium