DLPTHD1: International Workshop on Data Leakage Protection (DLP) and Trustworthiness in Health Data Gold Coast, Australia, October 25-29, 2021 |
Conference website | https://sites.google.com/view/dlp-and-thd/home/ |
Submission link | https://easychair.org/conferences/?conf=dlpthd1 |
Submission deadline | August 16, 2021 |
About the Workshop
Data leakage is the accidental or intended unauthorized transmission of data from an organization to unintended recipients. Data leakage threats can originate internally or externally via email, web, mobile data storage devices such as USB drives and laptops. Data leakage protection (DLP) is an approach to detect data leakage and/or ensure end-users do not send confidential or sensitive information outside of the enterprise network. These strategies may involve a combination of user and security policies and security monitoring, detection, and prevention tools. This DLP track of this workshop focuses on DLP response mechanisms to detect data leakage, protect and prevent data in all its shapes, such as text, images within an organization, on the cloud, or edge, from the risk of getting leaked accidentally or intentionally.
Moreover, requirements for future healthcare data management are likely to include increased volume and diversity, shared between an increasingly diverse range of people (e.g. practitioners, specialists, patients) and organisations (e.g. healthcare providers, technology providers, and social services). Regardless of the architecture used, a key enabler of interoperability is the clarification of “trust”. The Trustworthiness in health data track of this workshop will explore key aspects of trust, relevant trust-based concepts, and suitable semantic repository technologies capable of supporting a federated, community-oriented approach.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Full papers should not exceed 10 pages
- The short paper's maximum page limit is 6 pages.
- Papers should be submitted under only one of the Workshop Tracks.
- Papers should be submitted in PDF format.
- All submissions must comply with the IEEE Computer Society Conference Proceedings Format Guidelines.
List of Topics
- Data Leakage Protection (DLP) Track:
-
Cloud/Edge data sharing security and privacy.
-
Data identification, marking, or classification techniques.
-
Dynamic data protection techniques.
-
Big data leakage resilient methodologies.
-
Secure Bring Your Own Device (BYOD) environments.
-
Data leakage detection from Cloud, edge, fog, IoT, or Mobile applications.
-
Countermeasures against data leakage in Cloud, edge, fog, IoT, and Mobile applications.
-
Data leakage in medical records and images.
-
Data leakage detection mechanisms for text, images, or videos.
-
Data loss prevention and its mechanisms for cloud, edge, mobile, and embedded systems.
-
Leakages of information from encrypted data.
-
Methods of remediation after data leakage incidents.
-
Methods to detect and trace the agent/device that leaked the data.
-
Forensic investigation methods for data leakage attacks.
-
Data leakage controls for unstructured or transformed data.
-
Balancing data protection and privacy preservation techniques.
-
- Trustworthiness in Health Data Track:
-
The growing list of parties that have an interest in accessing health-related data
-
The fuzzy boundary between personal health data and other personal data
-
Limits of deidentification of health data and guidelines for aggregating regional health data into sharable formats that are of value to medical researchers
-
Working definitions of the data subject, data author, data custodian, data attester, data owner, authorised user, the delegation of authority, data user rights, commercial data use, etc that are encountered in practice, and the question to what extent these terms even make sense or can be defined in an adequate way for enforceable legislation
-
All relevant aspects of trust, including the trustworthiness of people and institutions that work with health data, trust in the technical capability of the people and institutions that work with health data, the trustworthiness of the systems tasked with storing and transmitting health data, trust in the adequacy of locally/globally enforceable legislation for health data governance, etc.
-
Analysis of national/regional/organisational health data governance policies from perspectives that relate to trust
-
Committees
Program Committee
-
Sira Yongchareon, Auckland University
-
Zawar Hussain, Macquarie University
-
Pasquale De Meo, Vrije Universiteit Amsterdam
-
Yan Yan, Lanzhou University of Technology
-
Xiu Susie Fang, Macquarie University
-
Faheem Ullah, The University of Adelaide
-
Xuyun Zhang, Macquarie University
-
Schahram Dustdar, Vienna University of Technology
-
Djamal Benslimane, Lyon 1 University
-
Athman Bouguettaya, The University of Sydney
-
Rajeswari Sridhar, Anna University
-
Wei Emma Zhang, The University of Adelaide
-
Seyedamin Pouriyeh, Kennesaw State University
-
Anne Ngu, Texas State University-San Marcos
-
Sherali Zeadally, University of Kentucky
-
Jian Yu, Auckland University of Technology
-
Shuang Wang, Southeast University
-
Yanjun Shu, Harbin Institute of Technology
Organizing committee
-
Prof Michael Sheng, Department of Computing, Macquarie University
-
Dr. Jorn Bettin, S23M – Collaboration for Life
-
Salma Abdalla Hamad, Department of Computing, Macquarie University
-
Dr. Pete Rive, S23M – Collaboration for Life
Contact
All questions about submissions should be emailed to salma.hamad@mq.edu.au (Track 1 Enquires) and jorn.bettin@s23m.com (Track 2 Enquires)