Thursday, May 26, 2016

[DMANET] GraMSec'16 CALL FOR PARTICIPATION

******************************************************************
GraMSec 2016
The Third International Workshop on Graphical Models for Security
Co-located with CSF 2016

Lisbon, Portugal - June 27, 2016
http://gramsec.uni.lu/
******************************************************************


GraMSec REGISTRATION IS NOW OPEN

To register please follow the instructions given at
http://www.gramsec.uni.lu/registration.php


ABOUT GraMSec

Graphical security models provide an intuitive but systematic
methodology to analyze security weaknesses of systems and to evaluate
potential protection measures. Such models have been subject of
academic research and they have also been widely accepted by the
industrial sector, as a means to support and facilitate threat
analysis and risk assessment processes. The objective of GraMSec is to
contribute to the development of well-founded graphical security
models, efficient algorithms for their analysis, as well as
methodologies and tools for their practical usage.

INVITED TALK

Xinming Ou, University of South Florida, USA
A Bottom-up Approach to Applying Graphical Models in Security Analysis

ACCEPTED REGULAR PAPERS

* Maxime Audinot and Sophie Pinchinat.
On the Soundness of Attack Trees

* Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew
Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer and David M. Nicol.
The Right Tool for the Job: a Case for Common Input Scenarios for
Security Assessment

* Marlon Dumas, Luciano García-Bañuelos and Peeter Laud.
Differential Privacy Analysis of Data Processing Workflows

* Eric Li, Jeroen Barendse, Frederic Brodbeck and Axel Tanner.
From A to Z: Developing a Visual Vocabulary for Information Security
Threat Visualisation

* Nihal Pekergin, Sovanna Tan and Jean-Michel Fourneau.
Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical
Analysis

* Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li and Kishor S. Trivedi.
Survivability Analysis of a Computer System under an Advanced
Persistent Threat Attack

* Paul Rowe.
Confining Adversary Actions via Measurement

ACCEPTED SHORT PAPERS

* Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cedric Muller and Steve
Muller.
Bridging Two Worlds: Reconciling Practical Risk Assessment
Methodologies with Theory of Attack Trees

* Henk Jonkers and Dick Quartel.
Enterprise Architecture-Based Risk and Security Modelling and Analysis

GENERAL CHAIR
Barbara Kordy, INSA Rennes, IRISA, France

PROGRAM COMMITTEE CO-CHAIRS
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
DongSeong Kim, University of Canterbury, New Zealand

CONTACT
For inquiries please send an e-mail to gramsec16@easychair.org

**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************