SPIMACS 2010 - Workshop on Security and Privacy in Medical and Home-Care Systems (SPIMACS 2010)
Topics/Call fo Papers
Second Security and Privacy in Medical and Home-Care Systems (SPIMACS) Workshop
Hyatt Regency Chicago, Chicago, IL, USA
An ACM CCS Affiliated Workshop
October 8, 2010
We are soliciting submissions for the second Security and Privacy in Medical and Home-Care Systems Workshop. The acronym is SPIMACS, pronounced "spy max". The goal of the workshop is to bring together a range of computer and social scientists to develop a more complete understanding of the interaction of individuals and computer security technologies as they are associated with critical care, continuing care and monitoring of the frail. The goals include, but go beyond, traditional vulnerability and usability critiques to include evaluations of use of security technologies in homes and in health care. Major initiatives in Electronic Health Records and increased sharing of medical information -- including cloud systems such as Google Health and Microsoft HealthVault -- raise significant challenges for protecting the privacy of health information. Next-generation medical devices, in the home, hospital, and beyond, have high security requirements to ensure that critical health functions are correctly and securely supported.
The defined domain of the home includes a wide range of devices from powerful broadband-connected desktop machines to embedded sensors for specialized applications. There are unique dimensions to security when computing occurs in the home: the importance of location privacy when location is equivalent to identification; unique usability targets including children and elders; a complete lack of IT staff and possible support; requirements for strong authentication in the home with the potential requirement for strong anonymity outside the home; and mobility requirements that ranging from constantly at rest to always in motion. Examples of unique security challenges include defense against traffic analysis with medium latency requirements for physical security or some cases of medical monitoring, or sensor networks that need to be managed (and be made trustworthy) by naïve users.
These challenges are compounded when the technology in the home is for the purpose of monitoring for medical purposes. Vulnerable populations can be made more independent by the adoption of ubicomp, AI, social technologies, and digital, networked living assistance. But ill-considered systems can create new risks. Medical monitoring and home monitoring of vulnerable populations create unique security and privacy risks in design and application.
SPIMACS seeks to bring together the people and expertise that will be required to address the challenges of securing the intimate digital spaces of the most vulnerable. Therefore the scope of this workshop includes but is not uniquely limited to:
usable security
usable privacy technologies, particularly for the physically or cognitively impaired
home-based wireless network security
security in specialized application for the home, e.g. medical or physical security monitoring
authentication in the home environment
security and anonymization of home-centric data on the network
usable security for unique populations, e.g. elders, children, or the ill
privacy and security evaluation mechanisms for home environments
security in home-based sensor networks
medical and spatial privacy
privacy-aware medical devices
privacy-enhanced medical search
analyses of in-home and medical systems
attacks on medical devices
threat analyses or attacks on medical or home data
novel applications of cryptography to medical or intimate data
We invite talks emphasizing unique security challenges, innovative technologies, and reconsidered threat models. We also invite papers which analyze the use of technologies at home, the challenges of design targeted at a population with cognitive decline, design for the disabled with a focus on medical and home support when these projects have a primary--or at least significant focus on--privacy and security. Papers explaining the data constraints and controls on data from policy, ethical or legal perspectives are also welcome.
Important Dates:
Submissions due: June 28, 2010 11:59 pm PST
Notification of acceptance: August 6, 2010
Camera ready along with copyright form: August 16, 2010
Workshop: October 8, 2010 (immediately following CCS 2010)
Please comply with the format suggested by ACM CCS
http://www.sigsac.org/ccs/CCS2010/submission.shtml
Templates available at http://www.acm.org/sigs/publications/proceedings-t...
Hyatt Regency Chicago, Chicago, IL, USA
An ACM CCS Affiliated Workshop
October 8, 2010
We are soliciting submissions for the second Security and Privacy in Medical and Home-Care Systems Workshop. The acronym is SPIMACS, pronounced "spy max". The goal of the workshop is to bring together a range of computer and social scientists to develop a more complete understanding of the interaction of individuals and computer security technologies as they are associated with critical care, continuing care and monitoring of the frail. The goals include, but go beyond, traditional vulnerability and usability critiques to include evaluations of use of security technologies in homes and in health care. Major initiatives in Electronic Health Records and increased sharing of medical information -- including cloud systems such as Google Health and Microsoft HealthVault -- raise significant challenges for protecting the privacy of health information. Next-generation medical devices, in the home, hospital, and beyond, have high security requirements to ensure that critical health functions are correctly and securely supported.
The defined domain of the home includes a wide range of devices from powerful broadband-connected desktop machines to embedded sensors for specialized applications. There are unique dimensions to security when computing occurs in the home: the importance of location privacy when location is equivalent to identification; unique usability targets including children and elders; a complete lack of IT staff and possible support; requirements for strong authentication in the home with the potential requirement for strong anonymity outside the home; and mobility requirements that ranging from constantly at rest to always in motion. Examples of unique security challenges include defense against traffic analysis with medium latency requirements for physical security or some cases of medical monitoring, or sensor networks that need to be managed (and be made trustworthy) by naïve users.
These challenges are compounded when the technology in the home is for the purpose of monitoring for medical purposes. Vulnerable populations can be made more independent by the adoption of ubicomp, AI, social technologies, and digital, networked living assistance. But ill-considered systems can create new risks. Medical monitoring and home monitoring of vulnerable populations create unique security and privacy risks in design and application.
SPIMACS seeks to bring together the people and expertise that will be required to address the challenges of securing the intimate digital spaces of the most vulnerable. Therefore the scope of this workshop includes but is not uniquely limited to:
usable security
usable privacy technologies, particularly for the physically or cognitively impaired
home-based wireless network security
security in specialized application for the home, e.g. medical or physical security monitoring
authentication in the home environment
security and anonymization of home-centric data on the network
usable security for unique populations, e.g. elders, children, or the ill
privacy and security evaluation mechanisms for home environments
security in home-based sensor networks
medical and spatial privacy
privacy-aware medical devices
privacy-enhanced medical search
analyses of in-home and medical systems
attacks on medical devices
threat analyses or attacks on medical or home data
novel applications of cryptography to medical or intimate data
We invite talks emphasizing unique security challenges, innovative technologies, and reconsidered threat models. We also invite papers which analyze the use of technologies at home, the challenges of design targeted at a population with cognitive decline, design for the disabled with a focus on medical and home support when these projects have a primary--or at least significant focus on--privacy and security. Papers explaining the data constraints and controls on data from policy, ethical or legal perspectives are also welcome.
Important Dates:
Submissions due: June 28, 2010 11:59 pm PST
Notification of acceptance: August 6, 2010
Camera ready along with copyright form: August 16, 2010
Workshop: October 8, 2010 (immediately following CCS 2010)
Please comply with the format suggested by ACM CCS
http://www.sigsac.org/ccs/CCS2010/submission.shtml
Templates available at http://www.acm.org/sigs/publications/proceedings-t...
Other CFPs
Last modified: 2010-06-12 10:31:18