GraMSec 2015 - Second International Workshop on Graphical Models for Security
Topics/Call fo Papers
Graphical security models provide an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. Formal methods and computer security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes. Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including security assessment, risk analysis, automated defensing, secure services composition, policy validation and verification. The objective of GraMSec is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.
TOPICS
The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security. The topics of the workshop include, but are not limited to:
Attack trees, attack graphs, and their variants
Petri nets, Markov chains, and Bayesian networks for security
UML-based models and other graphical modeling approaches for security
Enhancement and/or optimization of existing graphical security models
Methods for (semi-)automatic generation of graphical security models
Scalability of graphical security models
Software tools for graphical security modeling and analysis
Risk assessment and risk management using graphical security models
Methods for quantitative analysis of graphical security models
Formal semantics of graphical security models
Formal verification of graphical security models
Game theoretical approaches to graphical security models
Visualization of system security
Visual security modeling and analysis of socio-technical and cyber-physical systems
Graphical models for system, organizational, and business security
Graphical security models for emerging paradigms (e.g., Cloud computing, IoT, Software Defined Networks, Big Data)
Case studies and experience reports on the use of graphical security modeling paradigm.
TOPICS
The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security. The topics of the workshop include, but are not limited to:
Attack trees, attack graphs, and their variants
Petri nets, Markov chains, and Bayesian networks for security
UML-based models and other graphical modeling approaches for security
Enhancement and/or optimization of existing graphical security models
Methods for (semi-)automatic generation of graphical security models
Scalability of graphical security models
Software tools for graphical security modeling and analysis
Risk assessment and risk management using graphical security models
Methods for quantitative analysis of graphical security models
Formal semantics of graphical security models
Formal verification of graphical security models
Game theoretical approaches to graphical security models
Visualization of system security
Visual security modeling and analysis of socio-technical and cyber-physical systems
Graphical models for system, organizational, and business security
Graphical security models for emerging paradigms (e.g., Cloud computing, IoT, Software Defined Networks, Big Data)
Case studies and experience reports on the use of graphical security modeling paradigm.
Other CFPs
Last modified: 2015-02-07 23:07:26