posted by user: dongseong || 2946 views || tracked by 3 users: [display]

GraMSec 2017 : The Fourth International Workshop on Graphical Models for Security

FacebookTwitterLinkedInGoogle

Link: http://gramsec.uni.lu/
 
When Aug 21, 2017 - Aug 21, 2017
Where Santa Barbara, CA, USA
Submission Deadline May 21, 2017
Notification Due Jul 7, 2017
Categories    security   graphical security model   security analysis   attack graphs
 

Call For Papers

SCOPE
Graphical security models provide an intuitive but systematic approach to analyze security weaknesses of systems and to evaluate potential protection measures. Cyber security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes. Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including vulnerability assessment, risk analysis, defense analysis, automated defensing, secure services composition, policy validation and verification. The objective of the GraMSec workshop is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.

TOPICS
The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security. The topics of the workshop include, but are not limited to:
Graphical models for threat modeling and analysis
Graphical models for risk analysis and management
Graphical models for requirements analysis and management
Textual and graphical representation for system, organizational, and business security
Visual security modeling and analysis of socio-technical and cyber-physical systems
Graphical security modeling for cyber situational awareness
Graphical models supporting the security by design paradigm
Methods for quantitative and qualitative analysis of graphical security models
Formal semantics and verification of graphical security models
Methods for (semi-)automatic generation of graphical security models
Enhancement and/or optimization of existing graphical security models
Scalable evaluation of graphical security models
Evaluation algorithms for graphical security models
Dynamic update of graphical security models
Game theoretical approaches to graphical security modeling
Attack trees, attack graphs and their variants
Stochastic Petri nets, Markov chains, and Bayesian networks for security
UML-based models and other graphical modeling approaches for security
Software tools for graphical security modeling and analysis
Case studies and experience reports on the use of graphical security modeling paradigm

IMPORTANT DATES
Submission deadline: Sunday, May 21, 2017
Notification deadline: Friday, July 7, 2017
Workshop: Monday, August 21, 2017

GENERAL CHAIR
Sjouke Mauw, University of Luxembourg, Luxembourg

PROGRAM CHAIRS
Peng Liu, Pennsylvania State University, USA
Ketil Stølen, SINTEF Digital and University of Oslo, Norway

PUBLICITY CHAIR
Barbara Kordy, INSA Rennes, IRISA, France

WEB CHAIR
Piotr Kordy, University of Luxembourg, Luxembourg

Related Resources

Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
GEDM 2017   Third International Workshop on Graph-based Educational Data Mining (GEDM) at the EDM 2017
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security
IJCSITY 2017   International Journal of Computational Science and Information Technology
eCrime 2018   13th Symposium on Electronic Crime Research