|
WORKSHOP PROGRAM
Just Up! Videos of the presentations will be posted as soon as they become available. Access is currently restricted to USENIX members and HealthSec '10 workshop attendees. Not a member? Join today!
All sessions will take place in Wilson C unless otherwise noted.
Session papers are available on the authors' Web sites: just click on the presentation name to read the paper.
|
Tuesday, August 10, 2010
|
8:30 a.m.–8:45 a.m. |
Opening Remarks
View the video
|
8:45 a.m.–9:45 a.m. |
Invited Panel
Session Chair: Kevin Fu, University of Massachusetts Amherst
Medical Device Security and Privacy
Panelists: John F. Murray Jr., Software Compliance Expert, United States Food and Drug Administration, CDRH/Office of Compliance; Nathanael Paul, Research Scientist, Oak Ridge National Laboratory; Karen Sandler, General Counsel of the Software Freedom Law Center
View the Murray video
View the Paul video
View the Sandler video
|
9:45 a.m.–10:30 a.m. |
Sensors, Client Devices, and Mobile Health
Session Chair: Tadayoshi Kohno, University of Washington
View the post-session Q&A video
Protecting E-healthcare Client Devices against Malware and Physical Theft
Daisuke Mashima, Abhinav Srivastava, Jonathon Giffin, and Mustaque Ahamad, Georgia Institute of Technology
View the video
Can I access your data? Privacy Management in mHealth
Aarathi Prasad, Dartmouth College; David Kotz, Dartmouth College and ISTS
View the video
Using Trusted Sensors to Monitor Patients' Habits
Alec Wolman, Stefan Saroiu, and Victor Bahl, Microsoft Research
View the video
|
10:30 a.m.–11:00 a.m. Break
|
|
11:00 a.m.–12:15 p.m. |
Policy for Health Records
Session Chair: Avi Rubin, Johns Hopkins University
View the post-session Q&A video
Practical Health Information Exchange using a Personally Controlled Health Record
Ben Adida, Isaac S. Kohane, and Kenneth D. Mandl, Childrens Hospital Boston and Harvard Medical School
View the video
Policy Management for E-Health Records
Maritza Johnson and Steven M. Bellovin, Columbia University
View the video
Technology Companies Are Best Positioned to Offer Health
Record Trusts
Shirley Gaw and Umesh Shankar, Google
View the video
Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare
Joseph Cooley and Sean W. Smith, Dartmouth College
View the video
Privacy Challenges in Patient-centric Health Information Systems
Anupam Datta, Carnegie Mellon University; Nipun Dave and John Mitchell, Stanford University; Helen Nissenbaum, New York University; Divya Sharma, Carnegie Mellon University
View the video
|
12:15 p.m.–1:45 p.m. Workshop Luncheon, Thurgood Marshall South West |
|
1:45 p.m.–3:00 p.m. |
Devices
Session Chair: Kevin Fu, University of Massachusetts Amherst
Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices
Stuart Schechter, Microsoft Research
Privacy Challenges for Wireless Medical Devices
Brent Lagesse, Oak Ridge National Laboratory
View the video
Insulin Pump System Security
Nathanael Paul, CSIIR, Oak Ridge National Lab; David C. Klonoff, Diabetes Research Institute, Mills-Peninsula Health Services
View the video
Is Bluetooth the Right Technology for mHealth?
Shrirang Mare, Dartmouth College; David Kotz, Dartmouth College and ISTS
On Usable Authentication for Wireless Body Area Networks
Cory Cornelius, Dartmouth College; David Kotz, Dartmouth College and ISTS
View the video
|
3:00 p.m.–3:45 p.m. |
Sharing Data
Session Chair: Umesh Shankar, Google
View the post-session Q&A video
A Risk Management Framework for Health Care Data Anonymization
Tyrone Grandison, IBM Services Research; Murat Kantarcioglu, University of Texas at Dallas
View the video
On Resolving the Privacy Debate in Deidentified Neuroimages
Nakeisha L. Schimke, Mary Kuehler, and John Hale, University of Tulsa
View the video
Securing Medical Research Data with a Rights Management System
Mohammad Jafari, Reihaneh Safavi-Naini, and Chad Saunders, University of Calgary; Nicholas Paul Sheppard, Queensland University of Technology
View the video
|
3:45 p.m.–4:15 p.m. Break |
|
4:15 p.m.–5:30 p.m. |
Approaches for Health Records
Session Chair: Steven Bellovin, Columbia University
View the post-session Q&A video
Beefing Up a Health-Data Ecosystem: Struggles and Successes from Microsoft HealthVault
Jim O'Leary, Microsoft Health Solutions Group and University of Washington
View the video
Using the Wave Protocol to Represent Individuals' Health Records
Shirley Gaw and Umesh Shankar, Google
View the video
EBAM: Experience-Based Access Management for Healthcare
Carl Gunter, University of Illinois at Urbana-Champaign; David Liebovitz, Northwestern University; Bradley Malin, Vanderbilt University
View the video
Fine-grained Sharing of Health Records using XSPA Profile for XACML—An Extended Abstract
A. Al-Faresi, B. Yu, K. Moidu, and A. Stavrou, George Mason University; D. Wijesekera, National Institute of Standards and Technology and George Mason University; A. Singhal, National Institute of Standards and Technology
View the video
An Anonymous Health Care System
Melissa Chase and Kristin Lauter, Microsoft Research
View the video
|
|