Workshop Program

All sessions will be held in Grand IJ unless otherwise noted.

August 6, 2012

9:00 a.m.–9:15 a.m. Monday

Welcome

Program Co-Chairs: Carl Gunter, University of Illinois at Urbana-Champaign, and Zachary Peterson, Naval Postgraduate School

9:15 a.m.–10:15 a.m. Monday
10:15 a.m.–10:45 a.m. Monday

Break

Grand Ballroom Foyer

10:45 a.m.–Noon Monday

Privacy

Neuroimage Data Sets: Rethinking Privacy Policies

Nakeisha Schimke and John Hale, Institute of Bioinformatics and Computational Biology, University of Tulsa

Data sharing has been promoted as a significant step in neuroimaging-based research for over a decade, yet the vision for widespread sharing has not been realized. Despite the availability of tools for deidentifying data and a few standout examples of data sharing, privacy concerns over the treatment of neuroimages as full face images have not been resolved. Continuing to share data, in large undertakings or ad hoc collaborations, without resolving the issue serves neither the subjects nor the researchers.

Available Media

Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records

Xiaowei Li and Yuan Xue, Vanderbilt University

Patient portal, as the front-end of a huge amount of electronic medical records, is essential for ensuring the security and privacy of those medical records. However, development and deployment of patient portal is non-trivial, which may suffer from both common security issues of web-based applications and specific challenges regarding complex and dynamic policies in clinical environment. In this position paper, we select an open source EMR application OpenEMR and study its vulnerabilities. We propose a two-tier defense architecture for protecting web patient portal, which consists of three major components: BLOCK, SENTINEL and ORACLE. In particular, we abstract security policies specification and enforcement out of the implementation of patient portal, which allows for independent verification and configuration of security policies and checking, as well as transparent integration of new mechanisms.

Available Media

Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications

Ian M. Miers and Matthew Green, Johns Hopkins University; Christoph U. Lehmann, MD, Johns Hopkins University School of Medicine; Aviel D. Rubin, Johns Hopkins University

The growing role of mobile devices in previously face to face interactions presents new domains for cryptographic applications. At the same, time the increased role of digital systems raises new security and privacy issues. With some thirty thousand notifications sent, inSPOT.org’s electronic notification of exposure to sexually transmitted infections is one such concerning development. This paper explores those concerns, the features of an ideal service for both notification and certification, and outlines protocols for cryptographic solutions.

Available Media
Noon–1:30 p.m. Monday

Workshop Luncheon

Grand EFGH

1:30 p.m.–3:00 p.m. Monday
3:00 p.m.–3:30 p.m. Monday

Break

Grand Ballroom Foyer

3:30 p.m.–4:30 p.m. Monday

Biometrics

Who Wears Me? Bioimpedance as a Passive Biometric

Cory Cornelius, Jacob Sorber, Ronald Peterson, Joe Skinner, Ryan Halter, and David Kotz, Institute for Security, Technology, and Society, Dartmouth College

Mobile and wearable systems for monitoring health are becoming common. If such an mHealth system knows the identity of its wearer, the system can properly label and store data collected by the system. Existing recognition schemes for such mobile applications and pervasive devices are not particularly usable – they require active engagement with the person (e.g., the input of passwords), or they are too easy to fool (e.g., they depend on the presence of a device that is easily stolen or lost).

We present a wearable sensor to passively recognize people. Our sensor uses the unique electrical properties of a person’s body to recognize their identity. More specifically, the sensor uses bioimpedance – a measure of how the body’s tissues oppose a tiny applied alternating current – and learns how a person’s body uniquely responds to alternating current of different frequencies. In this paper we demonstrate the feasibility of our system by showing its effectiveness at accurately recognizing people in a household 90% of the time.

Available Media

Body Area Network Security: Robust Key Establishment Using Human Body Channel

Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, and Ting Fu, University of Illinois at Urbana-Champaign; Evelyn Y. L. Huang, University of Illinois at Chicago

In order for two sensors within a body area network to determine they are on the same body, e.g., for security purposes, extensive prior work considers the use of physiological values. We study the practicality of using body physiological values for securely exchanging messages for sharing keys. Due to its popularity in the literature, we use electrocardiography (ECG) signals, and show that cardiac physiology is incompatible with such schemes, due to the sensitivity to a node’s deployment location on the body and the outsiders’ capability to remotely sense the physiological value.

As a solution for key sharing, we inject an artificial voltage signal to build a communication channel secure against an outsider. By implementing our scheme on a dead mouse and analyzing the human body channel characteristic with empirical data, we demonstrate the practicality of our scheme for body area network applications.

Available Media
4:30 p.m.–5:30 p.m. Monday

Rump Session

We will host a rump session on the afternoon of Monday, August 6, 2012. This is intended as an informal session for short and engaging presentations on recent unpublished results, work in progress, or other topics of interest to the HealthSec attendees. To submit a rump session talk, email healthsec12rump@usenix.org by Monday, August 8, 2012, at 3:00 p.m. PDT.

August 7, 2012

9:00 a.m.–10:00 a.m. Tuesday

Keynote Address

Security Lessons Learned from HIPAA Enforcement

Speaker: Adam H. Greene, Davis Wright Tremaine LLP

The federal and state governments have investigated thousands of health care privacy and security cases, received tens of thousands of healthcare breach reports, audited dozens of health care entities, and entered into a few high-profile financial settlements. These enforcement efforts offer a wealth of knowledge on the threats facing the health care industry, the privacy and security issues that represent the largest legal risks, and how improvements can be made. This presentation will analyze past enforcement trends and offer analysis and lessons about ways health care providers and plans can improve the privacy and security of some of our most sensitive information.

The federal and state governments have investigated thousands of health care privacy and security cases, received tens of thousands of healthcare breach reports, audited dozens of health care entities, and entered into a few high-profile financial settlements. These enforcement efforts offer a wealth of knowledge on the threats facing the health care industry, the privacy and security issues that represent the largest legal risks, and how improvements can be made. This presentation will analyze past enforcement trends and offer analysis and lessons about ways health care providers and plans can improve the privacy and security of some of our most sensitive information.

Adam Greene is a partner in the Washington, D.C., office of Davis Wright Tremaine, where he primarily counsels health care providers and technology companies on compliance with the HIPAA privacy, security, and breach notification rules. Previously, Adam was a regulator at the U.S. Department of Health and Human Services, where he played a fundamental role in administering and enforcing the HIPAA rules. At HHS, Adam was responsible for determining how HIPAA rules apply to new and emerging health information technologies, and he was instrumental in the development of the current HIPAA enforcement process. Adam is the Chair of the HIMSS Cloud Security Workgroup and a member of the AHIMA Emerging Issues Practice Council.

Available Media
10:00 a.m.–10:30 a.m. Tuesday

Break

Grand Ballroom Foyer

10:30 a.m.–Noon Tuesday

System Design

Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure

Tobias Dehling and Ali Sunyaev, University of Cologne, Germany

Health information technology can have positive impacts on healthcare delivery and is utilised for various applications. Patient-centred services are a special kind of health information technology and are designed to cater to patients' needs. They manage personal medical information and utilise such information to offer personalised, advantageous services as well as information for patients. Due to the sensitivity of medical information and the gravity of possible consequences, if medical information falls into the wrong hands, patient-centred services need to employ security measures to ensure the privacy of patients. The German Nationwide Health Information Technology Infrastructure (HTI), which is currently being established, could serve as a fit and proper foundation for securely offering patient-centred services. In this paper, we illustrate the past developments and current status of the HTI introduction with a focus on security aspects related to patient-centred services. We depict how security features of the HTI can be applied to improve secure provision of patient-centred services. Furthermore, we present additional security measures that should be implemented by providers of patient-centred services.

Available Media

An Analysis of HIPAA Breach Data

Patrick Morrison and Laurie Williams, North Carolina State University

As software developers, we have a responsibility to protect our user’s data. When this data is protected health information (PHI), breaches can have serious financial and reputational consequences. The goal of this research is to analyze trends in breaches of PHI that point to software design guidelines that can prevent or lessen the impact of breaches. We examine the US Office of Civil Rights public data on HIPAA breach notifications and examine some of its implications for software system design We observe that a significant number of breaches involve the use of portable stores of unencrypted records and present software design strategies to address these breaches before they happen.

Available Media

Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems

Nathanael Paul, University of Tennessee, Oak Ridge National Laboratory; Tadayoshi Kohno, University of Washington

Portable implantable medical device systems are playing a larger role in modern health care. Increasing attention is now being given to the wireless control interface of these systems. Our position is that wireless security in portable implantable medical device systems is just a part of the overall system security, and increased attention is needed to address low-tech security issues.

Available Media
Noon–1:30 p.m. Tuesday

Workshop Luncheon

Grand EFGH

1:30 p.m.–3:15 p.m. Tuesday

Access Control

Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes

Xuan Hung Le and Dongwen Wang, University of Rochester Medical Center

We previously developed an enhanced Role-Based Access Control (RBAC) model to support information access management in the context of team collaboration and workflow. We report in this paper a generic system framework to implement the enhanced RBAC with three functional layers: (1) encoding of access control policies; (2) interpretation of the encoded policies; and (3) application of policies to specific cases and scenarios for information access management. Based on this system framework, we have successfully applied the enhanced RBAC model to the New York State HIV Clinical Education Initiative (CEI) for coordination of clinical education programs. An evaluation has shown that the enhanced RBAC can be effectively used for information access management in collaborative processes. Future work includes extension of this system framework to support the continuous development of the enhanced RBAC and deployment of it to other domain applications for clinical education, biomedical research, and patient care.

Available Media

Tragedy of Anticommons in Digital Right Management of Medical Records

Quanyan Zhu, Carl Gunter, and Tamer Başar, University of Illinois at Urbana-Champaign

The challenge of moving a decentralized, fragmented, paper-based healthcare system to an interconnected, automated, networked world is not merely technological. Digital right management (DRM) technologies can be leveraged as a tool to protect the privacy of electronic health records (EHRs) via encryption, access control, etc. However, the deployment of DRM technology needs to address special requirements for the healthcare system. One of the critical issues is that there is no clearly defined data ownership, and multiple parties own different pieces of a patient’s medical history. The fractured ownership of medical information among medical service providers and insurers has created the tragedy of anticommons for implementation of DRMs. In this work, we investigate DRM under multiple ownerships of medical data, and employ game-theoretic tools to study and understand the strategic behaviors of different owners in the healthcare system. Our approach aims to address the underutilization of EHR resources, and provides a theoretical basis for mechanism design of economic policies to improve social welfare and efficiency of the electronic healthcare system.

Available Media

On XACML’s Adequacy to Specify and to Enforce HIPAA

Omar Chowdhury, The University of Texas at San Antonio; Haining Chen, Purdue University;  Jianwei Niu, The University of Texas at San Antonio; Ninghui Li and Elisa Bertino, Purdue University

In the medical sphere, personal and medical information is collected, stored, and transmitted for various purposes, such as, continuity of care, rapid formulation of diagnoses, and billing. Many of these operations must comply with federal regulations like the Health Insurance Portability and Accountability Act (HIPAA). To this end, we need a specification language that can precisely capture the requirements of HIPAA. We also need an enforcement engine that can enforce the privacy policies specified in the language. In the current work, we evaluate eXtensible Access Control Markup Language (XACML) as a candidate specification language for HIPAA privacy rules. We evaluate XACML based on the set of features required to sufficiently express HIPAA, proposed by a prior work. We also discuss which of the features necessary for expressing HIPAA are missing in XACML. We then present high level designs of how to enhance XACML’s enforcement engine to support the missing features.

Available Media

Access Control Hygiene and the Empathy Gap in Medical IT

Yifei Wang, Sean Smith, and Andrew Gettinger, Dartmouth College

In theory, access control is a solved problem. In practice, large real-world enterprises still report trouble: de facto policy becomes unmanageable; users circumvent controls. These issues can be particularly critical in medical IT, such as emerging EMR and EHR, where access control errors can have serious repercussions. In this paper, we investigate how real-world EMR users think about access control when they are making policy decisions in the abstract–and when they are actually using the system in treatment scenarios. Mismatches suggest places (“empathy gaps”) where new policy tools may be needed.

Available Media
3:15 p.m.–3:45 p.m. Tuesday

Break

Grand Ballroom Foyer

3:45 p.m.–4:45 p.m. Tuesday

Audit

Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry

Jason King and Laurie Williams, North Carolina State University

Both health information technology (HIT) and the payment card industry (PCI) involve the exchange and management of sensitive, protected information. Compared to the PCI, HIT could consider protected health information (PHI) more sensitive than PCI cardholder data. If cardholder data is breached in the PCI, payment card companies may then remove fraudulent charges from the customer’s account and/or issue the customer a new payment card. However, once a person’s PHI has been breached, the PHI has been breached forever. Healthcare organizations cannot issue new health histories or new identities to affected individuals. Secure logging and auditing may deter users from performing unauthorized transactions with PHI since an irrefutable trace of the user’s activity is recorded. Logging and auditing also provides an accounting of PHI disclosures for assisting data breach investigations.

Secure logging and auditing is one mechanism EHR systems should implement to promote security, user accountability, and trust. The objective of this paper is to raise awareness of issues around electronic health record logging and auditing mechanisms through a comparison with the Payment Card Industry Data Security Standards. With the recent push to move all health records to electronic format, the healthcare industry needs to define better standards for secure logging and auditing in EHR systems.

Available Media

Enabling Robust Information Accountability in E-healthcare Systems

Daisuke Mashima and Mustaque Ahamad, Georgia Institute of Technology

In the United States, the transition from traditional paper-based healthcare records to electronic healthcare record (EHR) systems is being promoted aggressively. While EHR systems offer a number of benefits, they will introduce new security and privacy concerns. A significant fraction of such threats, at least in part, arise due to actions of insiders of healthcare organizations, either accidentally or intentionally. We believe information accountability, which allows us to securely identify how a health record reached a certain consumer and who was involved in its sharing or transfer, is a key to discourage such threats. In this work, we propose a patient-centric scheme to establish robust information accountability in electronic healthcare record sharing systems. We also present a prototype implementation and show that it does not impose unacceptable performance overhead.

Available Media

Accountings of Relationships

Joseph Lorenzo Hall, New York University; Benedicte Callan, University of Texas at Austin; Helen Nissenbaum, New York University

We propose an orthogonal artifact to the HIPAA Privacy Rule's Accounting of Disclosure (AOD). Instead of the patient-centric AOD, we propose a provider-centric "Accounting of Relationships" that aggregates "data flows" involving PHI across all patients. This AOR artifact allows a number of complementary uses in conjunction with the AOD, but also allows meaningful comparisons of PHI data flows across provider institutions.

Available Media
4:45 p.m.–5:00 p.m. Tuesday