posted by user: jfl || 1444 views || tracked by 4 users: [display]

GraMSec 2016 : The Third International Workshop on Graphical Models for Security


When Jun 27, 2016 - Jun 27, 2016
Where Lisbon, Portugal
Submission Deadline Apr 18, 2016
Notification Due May 20, 2016
Final Version Due Jun 3, 2016
Categories    security   vizualisation

Call For Papers

The Third International Workshop on Graphical Models for Security
Co-located with CSF 2016

Lisbon, Portugal - June 27, 2016

Graphical security models provide an intuitive but systematic approach to
analyze security weaknesses of systems and to evaluate potential protection
measures. Formal methods and cyber security researchers, as well as
professionals from industry and government, have proposed various graphical
security modeling schemes. Such models are used to capture different
facets (digital, physical, and social) and address a range of challenges
including vulnerability assessment, risk analysis, defense analysis,
automated defensing, secure services composition, policy validation and
verification. The objective of the GraMSec workshop is to contribute to the
development of well-founded graphical security models, efficient algorithms
for their analysis, as well as methodologies for their practical usage.

The workshop seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
graphical models for security. The topics of the workshop include, but are
not limited to:
- Graphical models for threat modeling and analysis
- Graphical models for risk analysis and management
- Graphical models for requirements analysis and management
- Textual and graphical representation for system, organizational, and
business security
- Visual security modeling and analysis of socio-technical and
cyber-physical systems
- Graphical security modeling for cyber situational awareness
- Graphical models supporting the security by design paradigm
- Methods for quantitative and qualitative analysis of graphical
security models
- Formal semantics and verification of graphical security models
- Methods for (semi-)automatic generation of graphical security models
- Enhancement and/or optimization of existing graphical security models
- Scalable evaluation of graphical security models
- Evaluation algorithms for graphical security models
- Dynamic update of graphical security models
- Game theoretical approaches to graphical security modeling
- Attack trees, attack graphs and their variants
- Stochastic Petri nets, Markov chains, and Bayesian networks for security
- UML-based models and other graphical modeling approaches for security
- Software tools for graphical security modeling and analysis
- Case studies and experience reports on the use of graphical security
modeling paradigm.

Submission deadline: April 18, 2016
Acceptance notification: May 20, 2016
Camera ready version: June 3, 2016
GraMSec'16 workshop: June 27, 2016

We solicit two types of submissions:
- Regular papers (up to 15 pages) describing original and unpublished work
within the scope of the workshop.
- Short papers (up to 7 pages) describing original and unpublished work in

All submissions must be prepared using the LNCS style.

Each paper will undergo a thorough review process. All accepted (regular
short) papers will be included in the workshop's post-proceedings. As last
year, we plan to publish the GraMSec'16 post-proceedings in the Lecture
in Computer Science (LNCS) series of Springer (confirmation pending).
Submissions should be made using the GraMSec'16 EasyChair web site:

The invited lecture of GraMSec'16 will be given by Xinming Ou, associate
professor at Computer Science and Engineering, University of South
Florida, USA

Barbara Kordy, INSA Rennes, IRISA, France

Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Dong Seong Kim, University of Canterbury, New Zealand

- Mathieu Acher, IRISA, FR
- Massimiliano Albanese, George Mason University, USA
- Ludovic Apvrille, Télécom ParisTech, CNRS LTCI, FR
- Thomas Bauereiss, DFKI GmbH, DE
- Giampaolo Bella, University of Catania, IT
- Stefano Bistarelli, University of Perugia, IT
- Frédéric Cuppens, Télécom Bretagne, FR
- Nora Cuppens-Boulahia, Télécom Bretagne, FR
- Binbin Chen, Advanced Digital Sciences Center, SG
- Jason Crampton, RHUL, UK
- Hervé Debar, Télécom SudParis, FR
- Giovanna Dondossola, RSE, IT
- Ulrik Franke, SICS, SE
- Frank Fransen, TNO, NL
- Olga Gadyatskaya, University of Luxembourg, LU
- Paolo Giorgini, University of Trento, IT
- Erlend Andreas Gjare, SINTEF, NO
- Dieter Gollmann, TU Hamburg, DE
- Olivier Heen, Technicolor, FR
- Hannes Holm, Swedish Defence Research Agency, SE
- Siv Hilde Houmb, Secure-NOK AS, NO
- René Rydhof Hansen, Aalborg University, DK
- Ravi Jhawar, University of Luxembourg, LU
- Henk Jonkers, BiZZdesign, NL
- Sushil Jajodia, George Mason University, USA
- Florian Kammueller, Middlesex University London, UK
- Nima Khakzad, TU Delft, NL
- Pascal Lafourcade, University of Auvergne, FR
- Jean-Louis Lanet, INRIA, FR
- Jean Leneutre, Télécom ParisTech, FR
- David Lubicz, DGA, FR
- Sjouke Mauw, University of Luxembourg, LU
- Per Hakon Meland, SINTEF, NO
- Jogesh Muppala, HKUST, HK
- Simin Nadjm-Tehrani, Linköping University, SE
- Steven Noel, MITRE, USA
- Andreas L. Opdahl, University of Bergen, NO
- Xinming Ou, University of South Florida, USA
- Stéphane Paul, Thales Research & Technology, FR
- Ludovic Piètre-Cambacédès, EDF, FR
- Sophie Pinchinat, University Rennes 1, IRISA, FR
- Vincenzo Piuri, University of Milan, IT
- Marc Pouly, Lucerne University of Applied Sciences and Arts, CH
- Cristian Prisacariu, University of Oslo, NO
- Nicolas Prigent, Supélec, FR
- Christian W. Probst, TU Denmark, DK
- David Pym, University College London, UK
- Sasa Radomirovic, ETH Zurich, CH
- Indrajit Ray, Colorado State University, USA
- Arend Rensink, University of Twente, NL
- Yves Roudier, EURECOM, FR
- Pierangela Samarati, University of Milan, IT
- Guttorm Sindre, NUST, NO
- Ketil Stolen, Sintef, NO
- Mariëlle Stoelinga, University of Twente, NL
- Axel Tanner, IBM Research Zürich, CH
- Kishor S. Trivedi, Duke University, USA
- Alexandre Vernotte, KTH, SE
- Luca Vigano, King's College London, GB
- Lingyu Wang, Concordia University, CA
- Jan Willemson, Cybernetica, EE

This call for papers and additional information about the workshop
can be found at

Related Resources

IEA/AIE 2017 PGM Track 2017   IEA/AIE 2017 - Special Track on Graphical Models: from Theory to Applications
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
PGM 2016   The eighth edition of the International Conference on Probabilistic Graphical Models
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
OSBMRM 2016   The Second International Conference on Organizational Strategy, Business Models, and Risk Management (OSBMRM2016)
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems