****************************************************************** GraMSec 2016 The Third International Workshop on Graphical Models for Security Co-located with CSF 2016
Lisbon, Portugal - June 27, 2016 http://gramsec.uni.lu/ ****************************************************************** GraMSec REGISTRATION IS NOW OPEN To register please follow the instructions given at http://www.gramsec.uni.lu/registration.php ABOUT GraMSec Graphical security models provide an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. Such models have been subject of academic research and they have also been widely accepted by the industrial sector, as a means to support and facilitate threat analysis and risk assessment processes. The objective of GraMSec is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies and tools for their practical usage. INVITED TALK Xinming Ou, University of South Florida, USA A Bottom-up Approach to Applying Graphical Models in Security Analysis ACCEPTED REGULAR PAPERS * Maxime Audinot and Sophie Pinchinat. On the Soundness of Attack Trees * Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer and David M. Nicol. The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment * Marlon Dumas, Luciano García-Bañuelos and Peeter Laud. Differential Privacy Analysis of Data Processing Workflows * Eric Li, Jeroen Barendse, Frederic Brodbeck and Axel Tanner. From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation * Nihal Pekergin, Sovanna Tan and Jean-Michel Fourneau. Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis * Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li and Kishor S. Trivedi. Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack * Paul Rowe. Confining Adversary Actions via Measurement ACCEPTED SHORT PAPERS * Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cedric Muller and Steve Muller. Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees * Henk Jonkers and Dick Quartel. Enterprise Architecture-Based Risk and Security Modelling and Analysis GENERAL CHAIR Barbara Kordy, INSA Rennes, IRISA, France PROGRAM COMMITTEE CO-CHAIRS Mathias Ekstedt, KTH Royal Institute of Technology, Sweden DongSeong Kim, University of Canterbury, New Zealand CONTACT For inquiries please send an e-mail to gramse...@easychair.org ------------------------------------------------------------------------------ What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic patterns at an interface-level. Reveals which users, apps, and protocols are consuming the most bandwidth. Provides multi-vendor support for NetFlow, J-Flow, sFlow and other flows. Make informed decisions using capacity planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e _______________________________________________ hol-info mailing list hol-info@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/hol-info