posted by user: tell || 2128 views || tracked by 7 users: [display]

SPeh-JMS 2016 : Topical Collection on Security and Privacy in e-healthcare -- Journal of Medical Systems

FacebookTwitterLinkedInGoogle

Link: http://www.springer.com/public+health/journal/10916
 
When N/A
Where N/A
Submission Deadline Jun 30, 2016
Notification Due Aug 15, 2016
Final Version Due Oct 15, 2016
Categories    security   privacy   information system   health
 

Call For Papers

Topical Collection on “Security and Privacy in e-healthcare”

The e-healthcare system has recently been considered one of the major advancements in healthcare industry. For example, a personally controlled electronic health record (PCEHR) system is proposed by the Australian government to build the healthcare system more agile, secure, and sustainable. Although existing e-health systems claim that the patients can only access their electronic records, healthcare professionals and system/database operators may happen to access the patients’ electronic health record information. The conventional methods for preserving the privacy of healthcare systems entirely trust the system operators. Therefore, the health related information is vulnerable to be exploited by even the authorized personnel in an immoral/unethical way. Furthermore, issues such as the absolute number of healthcare records, their sensitive nature, flexible access, and efficient user revocation have remained the most vital challenges towards fine-grained, cryptographically enforced data access control.

On the other hand, the rapid growth and enormous adoption of e- healthcare systems have transformed Web to a platform for communication and social interaction. Although e-healthcare systems have been designed and developed with a goal of sharing information, many users struggle to appropriately manage and share their information via existing information systems. Most existing e-health systems define privacy either as private/ public dichotomy or in terms of a “network of friends” relationship; in which, all friends are treated equal and all relationships are mutual. These systems fail to support the privacy expectations that non-technical users bring from their real life experiences.

From a scientific and technological point of view, there are several challenges that need to be addressed to make e-healthcare systems an enabling means to address security and privacy issues.

This special issue of Journal of Medical Systems solicits state-of-the-art research results and surveys in secure and privacy-preserving e- healthcare system. The issue will invite submissions on all aspect of e- healthcare systems in the context of privacy. Of special interests are implementations that demonstrate novel applications addressing privacy- preserving features/functionalities in e-healthcare systems.

Subject Coverage:

Suitable topics include but are not limited to the following:

* Authentication in e-healthcare system
* Privacy-preservinge-referralsystem
* Security in Medi-cloud
* Data Protection in Medi-cloud
* Implementation of secure e-healthcare
* Cryptographic techniques in e-healthcare
* Fine-grained Access Control in e-healthcare system

Deadlines and Guidelines:

Papers must be written in English and describe original research which is not published nor currently under review by other journals or conferences. Author guidelines for preparation of manuscript can be found at:

http://www.springer.com/public+health/journal/10916

To submit, please go to http://www.editorialmanager.com/joms and
choose the Article Type "SI: Security and Privacy in e-healthcare”
All submissions will be reviewed according to the journal peer-review policy.

Important Dates:

* Manuscript submission deadline: June 30, 2016
* Notification of Acceptance/Revision/Rejection: August 15, 2016
* Revised Paper Submission: August 30, 2016
* Final Decision Notification: September 30, 2016
* Final Paper Submission: October 15, 2016

Guest Editors:

Debiao He, Wuhan University, China, hedebiao@whu.edu.cn
Joseph K. Liu, Monash University, Australia, joseph.liu@monash.edu
Neeraj Kumar, Thapar University, India, neeraj.kumar@thapar.edu
Wei Wu, Fujian Normal University, China, weiwu81@gmail.com

Debiao He received the Ph.D. degree in applied mathematics from the School of Mathematics and Statistics, Wuhan University, Wuhan, China, in 2009. He is currently an Associate Professor with the State Key Laboratory of Software Engineering, School of Computer Science, Wuhan University. He has authored over 50 research papers in refereed international conferences and journals. His work has been cited more than 1200 times at Google Scholar (H-Index: 20). His main research interests include applied cryptography and information security. He is also an Associate Editor of the Journal of Medical Systems.

Joseph K. Liu received the Ph.D. degree in information engineering from the Chinese University of Hong Kong in 2004, specializing in cyber security, protocols for securing wireless networks, privacy, authentication, and provable security. He is now a senior lecturer at Faculty of Information Technology, Monash University, Australia. His current technical focus is particularly cyber security in the cloud computing paradigm, smart city, big data, lightweight security, and privacy enhanced technology. He has published more than 90 referred journal and conference papers and received the Best Paper Award from ESORICS 2014 and ESORICS 2015. He has served as the program chair of ProvSec 2007, 2014, ACISP 2016 and as the program committee of more than 40 international conferences.

Neeraj Kumar received the Ph.D. degree in Computer Science and Egnineering (CSE) from Shri Mata Vaishno Devi University, Katra (J & K), India. He was a Postdoctoral Research Fellow in Coventry University, Coventry, U.K. He is working as an Associate Professor in the Department of Computer Science and Engineering, Thapar University, Patiala (Pb.), India. He has published more than 100 scholarly research papers in leading journals and conferences from IEEE, Elsevier, Springer, and John Wiley. Some of his research findings are published in top-cited journals such as IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Industrial Electronics, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Consumer Electronics, IEEE Network, IEEE Communications, IEEE Wireless Communications, IEEE Internet of Things Journal, IEEE Systems Journal, Future Generation Computer Systems, Journal of Networks and Computer Applications, and Computer Communications. He has guided many research scholars leading to Ph.D. and M.E./M.Tech. His research is supported by funding from Tata Consultancy Services (TCS) and University Grant Commission (UGC). He is a member of various professional bodies. He has research collaborations with many universities across the globe. He has edited more than 6 special issues of various journals of repute.

Wei Wu received her Ph.D. degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia, in 2011. She is currently an Associate Professor with the Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, China. Her research
focus is on public key cryptography and its applications. She has published more than 40 papers in refereed international journals and conferences.

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
AEIJ 2016   Advanced Energy: An International Journal
PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium
Springer QUX: QoE Management 2017   Springer Quality and User Experience Journal: Topical Collection on Managing QoE of Future Networks and Applications
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
SOUPS 2017   Symposium on Usable Privacy and Security
SPTM 2016   Fourth International Conference of Security, Privacy and Trust Management
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications