Lecture/Presentation Schedule

Sample Review Form

(“relevance” to Security and Privacy conference/journals)

Sample Review

Week 1

(Sept 3)

Introductions

Slides

Week 2

(Sept 10)

Lecture:

(James Joshi)

Overview of Access Control Models (PDF)

Presenters and Reviewers/Readers

Presenter: Leila Karimi

Relationship-Based Access Control for an Open-Source Medical Records System (PDF)

Reviewers:

Amer Malki, Usman Anjum,

Shadi Al-Khateeb

Presenter: Runhua Xu

Securing Electronic Medical Records

Using Attribute-Based Encryption

On Mobile Devices (PDF)

Reviewers:

Jinlai Xu, Li Chao,Maryam Karimi, Sanqiang Zhao

Week 3

(Sept 17)

Presentations

Presenter [12 - 12:40]: Jinlai Xu

Formal Specification of Role based

Security Policies for Clinical Information Systems (PDF)

Reviewers:

Runhua Xu, Usman Anjum

Readers:

Chao Li, Maryam Karimi

Presenter [12:40 – 1:20]: Chao Li

Patient-centric Authorization Framework for Sharing Electronic Health Records (PDF)

Reviewers:

Leila Karimi

Readers:

Runhua Xu, Sanqiang Zhao

Presenter [1:30 – 2:10] : Maryam Karimi

An Approach to Modular and Testable Security Models of Real-world Health-care Applications (PDF)

Reviewers:

Shadi AlKhateeb

Readers:

Usman Anjum, Amer Malki

Presenter [2:10 – 2:50]: Amer Malki

UCONLEGAL: A Usage Control Model for HIPAA (PDF)

Reviewers:

Sanqing Zhao

Readers:

Leila Karimi, Shadi Al-Khateeb, Jinlai Xu

Week 4

(Sept 24)

Presentations

Presenter: Shadi Al-Khateeb

Considering Privacy and Effectiveness of Authorization Policies for Shared Electronic Health Records (PDF)

Reviewers:

Jinlai Xu, Runhua Xu

Readers:

Usman Anjum, Maryam Karimi, Amer Malki

Presenter: Sanqiang Zhao

The linked medical data access control framework The linked medical data access control framework (PDF)

Reviewers:

Amer Malki, Maryam Karimi

Readers:

Runhua Xu, Leila Karimi,

Chao Li

Presenter: Usman Anjum

Situation-Based Access Control: Privacy management via modeling of patient

data access scenarios (PDF)

Reviewers:

Chao Li, Leila Karimi

Readers:

Shadi Al-Khateeb, Jinlai Xu,

Sanqiang Zhao

Week 5

(Oct 1)

Presentations

Privacy”: an overview (Prof. Balaji Palanisamy)

Presenter: Chao Li

“Secure Construction of k-unlinkable Patient Records from Distributed Providers” by Bradley Malin (PDF)

 

Everyone will review it

Week 6

(Oct 8)

Presentations

Presenter: Jinlai Xu

Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data (PDF)

Reviewers:

Maryam karimi

Readers:

Leila karma

Shadi Al-Khateeb

Presenter: Leila Karimi

Privacy Aspects of Health Related Information Sharing in Online Social Networks (PDF)

Reviewers:

Shadi Al-Khateeb 

Readers:

Amer Malki

Runhua Xu

Presenter: Amer Malki

A k-Anonymity Privacy-preserving Approach in Wireless Medical Monitoring Environments (PDF)

Reviewers:

Usman Anjum

Chao Li

Readers:

Sanqiang Zhao

Presenter: Runhua Xu

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare (PDF)

Reviewers:

Sanqiang Zhao

Readers:

Jinlai Xu

Chao Li

Usman Anjum

Week 7

(Oct 15)

Presentations

 

Week 8

(Oct 22)

Presentations

 

Week 9

(Oct 29)

Presentations

 

Week 10

(Nov 5)

Presentations

 

Week 11

(Nov 12)

Presentations/Progress Report

 

Week 12

(Nov 19)

Presentations/Progress Report

 

Week 13

(Nov 26)

Thanks giving

 

Week 14

(Dec 3)

Presentations/Progress Report

 

Week 15

(Dec 10)

Final Presentations