|
WORKSHOP PROGRAM
All sessions will take place in Elizabethan D unless otherwise noted.
All breakfast and refreshment breaks will take place in the California East/West Foyer,
Elizabethan Foyer, and Elizabethan C.
|
Tuesday, August 9, 2011
|
8:30 a.m.–9:00 a.m. Continental Breakfast
|
|
9:00 a.m.–9:05 a.m. |
Welcome
Program Co-Chairs: Ben Adida, Mozilla, and Umesh Shankar, Google
|
|
9:05 a.m.–9:30 a.m. |
Keynote Address
Speaker: Joy Pritts, Chief Privacy Officer, Office of the National Coordinator for Health Information Technology
Joy Pritts joined the Office of the National Coordinator for Health Information Technology, Department of Health and Human Services, in February 2010 as its first Chief Privacy Officer. Ms. Pritts provides critical advice to the Secretary and the National Coordinator in developing and implementing ONC's privacy and security programs under HITECH. She has an extensive background in confidentiality law, including the HIPAA Privacy Rule, federal alcohol and substance abuse treatment confidentiality laws, the Common Rule governing federally funded research, and state health information privacy laws.
|
|
9:30 a.m.–10:15 a.m. |
Short Papers
Implantable Medical Device Communication Security: Pattern vs. Signal Encryption
Fei Hu and Qi Hao, University of Alabama; Marcin Lukowiak, Rochester Institute of Technology
Read the PDF
View the Slides
Exposing Privacy Concerns in mHealth
Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz, Dartmouth College—Institute for Security, Technology, and Society
Read the PDF
View the Slides
Persistent Security, Privacy, and Governance for Healthcare Information
W. Knox Carey, Jarl Nilsson, and Steve Mitchell, Intertrust Technologies
Read the PDF
View the Slides
Who Does the Autopsy? Criminal Implications of Implantable Medical Devices
Marc Goodman, Future Crimes Institute
Read the PDF
|
|
10:15 a.m.–10:30 a.m. Break with coffee and tea
|
|
|
10:30 a.m.–11:15 a.m. |
Long Papers
A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report
Matthew D. Green and Aviel D. Rubin, Johns Hopkins University
Read the PDF
View the Slides
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices
Steve Hanna, University of California Berkeley; Rolf Rolles, Unaffiliated; Andrés Molina-Markham, University of Massachusetts Amherst; Pongsin Poosankam, University of California Berkeley and Carnegie Mellon University; Kevin Fu, University of Massachusetts Amherst; Dawn Song, University of California Berkeley
Read the PDF
View the Slides
|
|
11:15 a.m.–12:15 p.m. |
Panel: Do Medical Devices Have Significant Forensic Value?
Panelists: Kevin Fu, University of Massachusetts Amherst; Marc Goodman, Future Crimes Institute; Nate Paul, University of Tennessee/Oak Ridge National Laboratory; Mark Day, iRhythm Technologies, Inc.
|
|
12:15 p.m.–1:15 p.m. Workshop Luncheon served in the Colonial Room
|
|
|
1:15 p.m.–2:00 p.m. |
Short Papers
Providing an Additional Factor for Patient Identification Based on Digital Fingerprint
Guy C. Hembroff and Xinli Wang, Michigan Technological University; Sead Muftic, KTH—Royal Institute of Technology
Read the PDF
Context-Aware Anomaly Detection for Electronic Medical Record Systems
Xiaowei Li, Yuan Xue, You Chen, and Bradley Malin, Vanderbilt University
Read the PDF
View the Slides
Role Prediction Using Electronic Medical Record System Audits
Wen Zhang, Vanderbilt University; Carl A. Gunter, University of Illinois at Urbana-Champaign; David Liebovitz, Northwestern University; Jian Tian, Vanderbilt University; Bradley Malin, Vanderbilt University
Read the PDF
Audit Mechanisms for Privacy Protection in Healthcare Environments
Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha, Carnegie Mellon University
Read the PDF
View the Slides
|
|
2:00 p.m.–3:00 p.m. |
Panel: Can We Do Meaningful Deidentification of Medical Data?
Panelists: Arvind Narayanan, Stanford University; Lee Tien, Electronic Frontier Foundation; Kelly Edwards, University of Washington; Sean Nolan, Microsoft
|
|
3:00 p.m.–3:15 p.m. Break with beverages |
|
|
3:15 p.m.–4:15 p.m. |
Long Papers
Quickshear Defacing for Neuroimages
Nakeisha Schimke and John Hale, University of Tulsa
Read the PDF
View the Slides
Adaptive Security and Privacy for mHealth Sensing
Shrirang Mare and Jacob Sorber, Institute for Security, Technology, and Society, Dartmouth College; Minho Shin, Myongji University, South Korea; Cory Cornelius and David Kotz, Institute for Security, Technology, and Society, Dartmouth College
Read the PDF
View the Slides
Controlled Dissemination of Electronic Medical Records
Guido van 't Noordende, University of Amsterdam, The Netherlands
Read the PDF
|
|
4:15 p.m.–5:00 p.m. |
TBA
|
|