Wednesday, December 4, 2013

[DMANET] GraMSec'14 -- Deadline extended until December 13

Due to numerous requests, the GraMSec'14 deadline has been extended until Friday, December 13.
The full CFP can be found below.

Best regards,
Barbara
------------------------------------
Dr. Barbara Kordy
Research Associate
Université du Luxembourg, SnT
Campus Kirchberg, room F012
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg
Phone:  +352 466 644 5506
Fax:     +352 466 644 5741
------------------------------------


                   CALL FOR PAPERS - GraMSec'14
  The First International Workshop on Graphical Models for Security
                   April 12, 2014, Grenoble, France
                      http://www.gramsec.uni.lu/
                     (Co-located with ETAPS 2014)

SCOPE
Graphical security models provide an intuitive but systematic
methodology to analyze security weaknesses of systems and to evaluate
potential protection measures. Such models have been subject of
academic research and they have also been widely accepted by the
industrial sector, as a means to support and facilitate threat
analysis and risk management processes. The objective of GraMSec is to
contribute to the development of well-founded graphical security
models, efficient algorithms for their analysis, as well as
methodologies for their practical usage.

TOPICS
The workshop seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
graphical models for security. The topics of the workshop include, but
are not limited to:
- attack trees, attack graphs, Petri nets for security, Bayesian
  networks for security, UML-based models for security,
- security in system models, organizational models, business models,
  and methods for (semi-)automatic derivation of attack models from
  these,
- methods for quantitative analysis of graphical security models,
- analysis of digital, physical and social (socio-technical) security
  aspects using graphical models,
- risk assessment and risk management using graphical security models,
- software tools supporting security analysis using graphical models,
- case studies and experience reports on the use of graphical
  methodologies for analysis and evaluation of security of systems.

PAPER SUBMISSION
We solicit two types of submissions:
- Regular papers (up to 15 pages) describing original and unpublished
  work within the scope of the workshop.
- Short papers (up to 5 pages) describing work in progress or less
  mature results.
Case studies and tool papers are welcome as well. All submissions must
be prepared in LaTeX using the EPTCS macro package available at
http://style.eptcs.org/. Each paper will undergo a thorough review
process. Submissions should be made using the GraMSec'14 easychair web
site: https://www.easychair.org/conferences/?conf=gramsec14

The final versions of accepted regular and short papers will be
published as a volume of Electronic Proceedings in Theoretical
Computer Science (EPTCS). Furthermore, authors of a selection of the
accepted papers will be invited to submit an extended version of their
articles to a special issue of a high-quality journal, after the
workshop.

Participants are also encouraged to submit position statements on
linking industrial needs to academic research questions. The
statements should not exceed one page and they will not undergo the
review process. Based on the statements, a special session will be
organized.

IMPORTANT DATES
Submission deadline: December 13, 2013 (extended)
Acceptance notification: January 24, 2014
Camera ready version: February 6, 2014
Workshop: April 12, 2014

GENERAL CHAIR
Sjouke Mauw, University of Luxembourg, LU

PC CO-CHAIRS
Barbara Kordy, University of Luxembourg, LU
Wolter Pieters, Delft University of Technology and University of Twente, NL

PC MEMBERS
Giampaolo Bella, University of Catania, Italy
Matt Bishop, University of California at Davis, USA
Stefano Bistarelli, University of Perugia, Italy
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Donald Firesmith, Software Engineering Institute, USA
Virginia N. L. Franqueira, University of Central Lancashire, UK
Paolo Giorgini, University of Trento, Italy
Siv Hilde Houmb, Secure-NOK AS and Gjøvik University College, Norway
Sushil Jajodia, George Mason University, USA
Henk Jonkers, BiZZdesign, The Netherlands
Jan Jürjens, Technical University Dortmund, Germany
Peter Karpati, Institute for Energy Technology, Norway
Dong Seong Kim, University of Canterbury, New Zealand
Gabriele Lenzini, University of Luxembourg, Luxembourg
Per Håkon Meland, SINTEF, Norway
Svetla Nikova, KU Leuven, Belgium
Andreas L. Opdahl, University of Bergen, Norway
Stéphane Paul, Thales Research and Technology, France
Milan Petkovic, Philips and Eindhoven University of Technology, The Netherlands
Ludovic Piètre-Cambacédès, EDF, France
Christian W. Probst, Technical University of Denmark, Denmark
William H. Sanders, University of Illinois, USA
Simone Sillem, Delft University of Technology, The Netherlands
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Mariëlle Stoelinga, University of Twente, The Netherlands
Kishor S. Trivedi, Duke University, USA
Luca Viganò, King's College London, UK                
Lingyu Wang, Concordia University, Canada
Jan Willemson, Cybernetica, Estonia

CONTACT
For inquiries please send an e-mail to gramsec@uni.lu



**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************