GraMSec 2015
Date: Jul 13, 2015 1:00 am – Jul 13, 2015 10:00 am
Location: Verona, Italy
The Second International Workshop on Graphical Models for Security (GraMSec 2015)
Co-located with CSF 2015
Graphical security models provide an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. Formal methods and computer security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes.
Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including security assessment, risk analysis, automated defensing, secure services composition, policy validation and verification. The objective of GraMSec is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.
The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of
graphical models for security. The topics of the workshop include, but are not limited to:
- Attack trees, attack graphs, and their variants
- Petri nets, Markov chains, and Bayesian networks for security
- UML-based models and other graphical modeling approaches for security
- Enhancement and/or optimization of existing graphical security models
- Methods for (semi-)automatic generation of graphical security models
- Scalability of graphical security models
- Software tools for graphical security modeling and analysis
- Risk assessment and risk management using graphical security models
- Methods for quantitative analysis of graphical security models
- Formal semantics of graphical security models
- Formal verification of graphical security models
- Game theoretical approaches to graphical security models
- Visualization of system security
- Visual security modeling and analysis of socio-technical and cyber-physical systems
- Graphical models for system, organizational, and business security
- Graphical security models for emerging paradigms (e.g., Cloud computing, IoT, Software Defined Networks, Big Data)
- Case studies and experience reports on the use of graphical security models
IMPORTANT DATES
- Submission deadline: April 19, 2015
- Acceptance notification: May 26, 2015
- Camera ready version: June 15, 2015
- Workshop: July 13, 2015
GENERAL CHAIR
- Sushil Jajodia, George Mason University, USA
PC CO-CHAIRS
- Sjouke Mauw, University of Luxembourg, LU
- Barbara Kordy, INSA Rennes, IRISA, FR
PROGRAM COMMITTEE
- Mathieu Acher, IRISA, France
- Massimiliano Albanese, George Mason University, USA
- Ludovic Apvrille, Institut Mines-Telecom, Telecom ParisTech, CNRS LTCI, France
- Thomas Bauereiss, DFKI GmbH, Germany
- Giampaolo Bella, University of Catania, Italy
- Stefano Bistarelli, University of Perugia, Italy
- Ahto Buldas, Cybernetica, Estonia
- Jason Crampton, Royal Holloway University of London, UK
- Frederic Cuppens, Telecom Bretagne, France
- Mathias Ekstedt, Royal Institute of Technology, Sweden
- Olga Gadyatskaya, University of Luxembourg, Luxembourg
- Paolo Giorgini, University of Trento, Italy
- Erlend Andreas Gjare, SINTEF, Norway
- Dieter Gollmann, TU Hamburg, Germany
- Olivier Heen, Technicolor, France
- Siv Hilde Houmb, Secure-NOK AS, and Gjovik University College, Norway
- Ravi Jhawar, University of Luxembourg, Luxembourg
- Henk Jonkers, BiZZdesign, The Netherlands
- Jan Jurjens, Technical University Dortmund, Germany
- Jean-Louis Lanet, INRIA, France
- Gurvan Le Guernic, DGA Maitrise de l'Information, France
- Dong Seong Kim, University of Canterbury, New Zealand
- Per Haakon Meland, SINTEF, Norway
- Jogesh Muppala, HKUST, Hong Kong
- Flemming Nielson, Technical University of Denmark, Denmark
- Steven Noel, MITRE and George Mason University, USA
- Andreas L. Opdahl, University of Bergen, Norway
- Stephane Paul, Thales Research and Technology, France
- Wolter Pieters, TU Delft and University of Twente, The Netherlands
- Ludovic Pietre-Cambacedes, EDF, France
- Sophie Pinchinat, University Rennes 1, IRISA, France
- Vincenzo Piuri, University of Milan, Italy
- Cristian Prisacariu, University of Oslo, Norway
- Nicolas Prigent, Supelec, France
- Christian W. Probst, Technical University of Denmark, Denmark
- David Pym, University College London, UK
- Sasa Radomirovic, ETH Zurich, Switzerland
- Indrajit Ray, Colorado State University, USA
- Arend Rensink, University of Twente, The Netherlands
- Yves Roudier, EURECOM, France
- Pierangela Samarati, University of Milan, Italy
- Guttorm Sindre, Norwegian University of Science and Technology, Norway
- Ketil Stolen, Sintef, Norway
- Axel Tanner, IBM Research Zurich, Switzerland
- Kishor S. Trivedi, Duke University, USA
- Luca Vigano, King's College London, UK
- Lingyu Wang, Concordia University, Canada
- Jan Willemson, Cybernetica, Estonia
This call for papers and additional information about the workshop
can be found at http://gramsec.uni.lu/
Submitted by Anonymous
on
The Second International Workshop on Graphical Models for Security (GraMSec 2015)
Co-located with CSF 2015
Graphical security models provide an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. Formal methods and computer security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes.
Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including security assessment, risk analysis, automated defensing, secure services composition, policy validation and verification. The objective of GraMSec is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.
The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of
graphical models for security. The topics of the workshop include, but are not limited to:
- Attack trees, attack graphs, and their variants
- Petri nets, Markov chains, and Bayesian networks for security
- UML-based models and other graphical modeling approaches for security
- Enhancement and/or optimization of existing graphical security models
- Methods for (semi-)automatic generation of graphical security models
- Scalability of graphical security models
- Software tools for graphical security modeling and analysis
- Risk assessment and risk management using graphical security models
- Methods for quantitative analysis of graphical security models
- Formal semantics of graphical security models
- Formal verification of graphical security models
- Game theoretical approaches to graphical security models
- Visualization of system security
- Visual security modeling and analysis of socio-technical and cyber-physical systems
- Graphical models for system, organizational, and business security
- Graphical security models for emerging paradigms (e.g., Cloud computing, IoT, Software Defined Networks, Big Data)
- Case studies and experience reports on the use of graphical security models
IMPORTANT DATES
- Submission deadline: April 19, 2015
- Acceptance notification: May 26, 2015
- Camera ready version: June 15, 2015
- Workshop: July 13, 2015
GENERAL CHAIR
- Sushil Jajodia, George Mason University, USA
PC CO-CHAIRS
- Sjouke Mauw, University of Luxembourg, LU
- Barbara Kordy, INSA Rennes, IRISA, FR
PROGRAM COMMITTEE
- Mathieu Acher, IRISA, France
- Massimiliano Albanese, George Mason University, USA
- Ludovic Apvrille, Institut Mines-Telecom, Telecom ParisTech, CNRS LTCI, France
- Thomas Bauereiss, DFKI GmbH, Germany
- Giampaolo Bella, University of Catania, Italy
- Stefano Bistarelli, University of Perugia, Italy
- Ahto Buldas, Cybernetica, Estonia
- Jason Crampton, Royal Holloway University of London, UK
- Frederic Cuppens, Telecom Bretagne, France
- Mathias Ekstedt, Royal Institute of Technology, Sweden
- Olga Gadyatskaya, University of Luxembourg, Luxembourg
- Paolo Giorgini, University of Trento, Italy
- Erlend Andreas Gjare, SINTEF, Norway
- Dieter Gollmann, TU Hamburg, Germany
- Olivier Heen, Technicolor, France
- Siv Hilde Houmb, Secure-NOK AS, and Gjovik University College, Norway
- Ravi Jhawar, University of Luxembourg, Luxembourg
- Henk Jonkers, BiZZdesign, The Netherlands
- Jan Jurjens, Technical University Dortmund, Germany
- Jean-Louis Lanet, INRIA, France
- Gurvan Le Guernic, DGA Maitrise de l'Information, France
- Dong Seong Kim, University of Canterbury, New Zealand
- Per Haakon Meland, SINTEF, Norway
- Jogesh Muppala, HKUST, Hong Kong
- Flemming Nielson, Technical University of Denmark, Denmark
- Steven Noel, MITRE and George Mason University, USA
- Andreas L. Opdahl, University of Bergen, Norway
- Stephane Paul, Thales Research and Technology, France
- Wolter Pieters, TU Delft and University of Twente, The Netherlands
- Ludovic Pietre-Cambacedes, EDF, France
- Sophie Pinchinat, University Rennes 1, IRISA, France
- Vincenzo Piuri, University of Milan, Italy
- Cristian Prisacariu, University of Oslo, Norway
- Nicolas Prigent, Supelec, France
- Christian W. Probst, Technical University of Denmark, Denmark
- David Pym, University College London, UK
- Sasa Radomirovic, ETH Zurich, Switzerland
- Indrajit Ray, Colorado State University, USA
- Arend Rensink, University of Twente, The Netherlands
- Yves Roudier, EURECOM, France
- Pierangela Samarati, University of Milan, Italy
- Guttorm Sindre, Norwegian University of Science and Technology, Norway
- Ketil Stolen, Sintef, Norway
- Axel Tanner, IBM Research Zurich, Switzerland
- Kishor S. Trivedi, Duke University, USA
- Luca Vigano, King's College London, UK
- Lingyu Wang, Concordia University, Canada
- Jan Willemson, Cybernetica, Estonia
This call for papers and additional information about the workshop
can be found at http://gramsec.uni.lu/