posted by user: tell || 1959 views || tracked by 7 users: [display]

SPeh-JMS 2016 : Topical Collection on Security and Privacy in e-healthcare -- Journal of Medical Systems


When N/A
Where N/A
Submission Deadline Jun 30, 2016
Notification Due Aug 15, 2016
Final Version Due Oct 15, 2016
Categories    security   privacy   information system   health

Call For Papers

Topical Collection on “Security and Privacy in e-healthcare”

The e-healthcare system has recently been considered one of the major advancements in healthcare industry. For example, a personally controlled electronic health record (PCEHR) system is proposed by the Australian government to build the healthcare system more agile, secure, and sustainable. Although existing e-health systems claim that the patients can only access their electronic records, healthcare professionals and system/database operators may happen to access the patients’ electronic health record information. The conventional methods for preserving the privacy of healthcare systems entirely trust the system operators. Therefore, the health related information is vulnerable to be exploited by even the authorized personnel in an immoral/unethical way. Furthermore, issues such as the absolute number of healthcare records, their sensitive nature, flexible access, and efficient user revocation have remained the most vital challenges towards fine-grained, cryptographically enforced data access control.

On the other hand, the rapid growth and enormous adoption of e- healthcare systems have transformed Web to a platform for communication and social interaction. Although e-healthcare systems have been designed and developed with a goal of sharing information, many users struggle to appropriately manage and share their information via existing information systems. Most existing e-health systems define privacy either as private/ public dichotomy or in terms of a “network of friends” relationship; in which, all friends are treated equal and all relationships are mutual. These systems fail to support the privacy expectations that non-technical users bring from their real life experiences.

From a scientific and technological point of view, there are several challenges that need to be addressed to make e-healthcare systems an enabling means to address security and privacy issues.

This special issue of Journal of Medical Systems solicits state-of-the-art research results and surveys in secure and privacy-preserving e- healthcare system. The issue will invite submissions on all aspect of e- healthcare systems in the context of privacy. Of special interests are implementations that demonstrate novel applications addressing privacy- preserving features/functionalities in e-healthcare systems.

Subject Coverage:

Suitable topics include but are not limited to the following:

* Authentication in e-healthcare system
* Privacy-preservinge-referralsystem
* Security in Medi-cloud
* Data Protection in Medi-cloud
* Implementation of secure e-healthcare
* Cryptographic techniques in e-healthcare
* Fine-grained Access Control in e-healthcare system

Deadlines and Guidelines:

Papers must be written in English and describe original research which is not published nor currently under review by other journals or conferences. Author guidelines for preparation of manuscript can be found at:

To submit, please go to and
choose the Article Type "SI: Security and Privacy in e-healthcare”
All submissions will be reviewed according to the journal peer-review policy.

Important Dates:

* Manuscript submission deadline: June 30, 2016
* Notification of Acceptance/Revision/Rejection: August 15, 2016
* Revised Paper Submission: August 30, 2016
* Final Decision Notification: September 30, 2016
* Final Paper Submission: October 15, 2016

Guest Editors:

Debiao He, Wuhan University, China,
Joseph K. Liu, Monash University, Australia,
Neeraj Kumar, Thapar University, India,
Wei Wu, Fujian Normal University, China,

Debiao He received the Ph.D. degree in applied mathematics from the School of Mathematics and Statistics, Wuhan University, Wuhan, China, in 2009. He is currently an Associate Professor with the State Key Laboratory of Software Engineering, School of Computer Science, Wuhan University. He has authored over 50 research papers in refereed international conferences and journals. His work has been cited more than 1200 times at Google Scholar (H-Index: 20). His main research interests include applied cryptography and information security. He is also an Associate Editor of the Journal of Medical Systems.

Joseph K. Liu received the Ph.D. degree in information engineering from the Chinese University of Hong Kong in 2004, specializing in cyber security, protocols for securing wireless networks, privacy, authentication, and provable security. He is now a senior lecturer at Faculty of Information Technology, Monash University, Australia. His current technical focus is particularly cyber security in the cloud computing paradigm, smart city, big data, lightweight security, and privacy enhanced technology. He has published more than 90 referred journal and conference papers and received the Best Paper Award from ESORICS 2014 and ESORICS 2015. He has served as the program chair of ProvSec 2007, 2014, ACISP 2016 and as the program committee of more than 40 international conferences.

Neeraj Kumar received the Ph.D. degree in Computer Science and Egnineering (CSE) from Shri Mata Vaishno Devi University, Katra (J & K), India. He was a Postdoctoral Research Fellow in Coventry University, Coventry, U.K. He is working as an Associate Professor in the Department of Computer Science and Engineering, Thapar University, Patiala (Pb.), India. He has published more than 100 scholarly research papers in leading journals and conferences from IEEE, Elsevier, Springer, and John Wiley. Some of his research findings are published in top-cited journals such as IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Industrial Electronics, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Consumer Electronics, IEEE Network, IEEE Communications, IEEE Wireless Communications, IEEE Internet of Things Journal, IEEE Systems Journal, Future Generation Computer Systems, Journal of Networks and Computer Applications, and Computer Communications. He has guided many research scholars leading to Ph.D. and M.E./M.Tech. His research is supported by funding from Tata Consultancy Services (TCS) and University Grant Commission (UGC). He is a member of various professional bodies. He has research collaborations with many universities across the globe. He has edited more than 6 special issues of various journals of repute.

Wei Wu received her Ph.D. degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia, in 2011. She is currently an Associate Professor with the Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, China. Her research
focus is on public key cryptography and its applications. She has published more than 40 papers in refereed international journals and conferences.

Related Resources

AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ACISP 2017   Australasian Conference on Information Security and Privacy
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IJISS 2016   International Journal of Information Security Science (IJISS)
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IJMSA 2016   International Journal of Modelling, Simulation and Applications
Springer QUX: QoE Management 2017   Springer Quality and User Experience Journal: Topical Collection on Managing QoE of Future Networks and Applications
SeMoCloud 2017   The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations