Graphical models for security [electronic resource] : second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised selected papers / Sjouke Mauw, Barbara Kordy, Sushil Jajodia (eds.).
2016
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Graphical models for security [electronic resource] : second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised selected papers / Sjouke Mauw, Barbara Kordy, Sushil Jajodia (eds.).
ISBN
9783319299686 (electronic book)
3319299689 (electronic book)
9783319299679
3319299689 (electronic book)
9783319299679
Published
Cham : Springer, 2016.
Language
English
Description
1 online resource (ix, 103 pages) : color illustrations.
Item Number
10.1007/978-3-319-29968-6 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015. The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures.
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed February 16, 2016).
Series
Lecture notes in computer science ; 9390.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources
SysML-Sec Attack Graphs: Compact Representations for Complex Attacks
Guided Specification and Analysis of a Loyalty Card System
How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems
Transforming Graphical System Models to Graphical Attack Models
ATSyRa: An Integrated Environment for Synthesizing Attack Trees. .
SysML-Sec Attack Graphs: Compact Representations for Complex Attacks
Guided Specification and Analysis of a Loyalty Card System
How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems
Transforming Graphical System Models to Graphical Attack Models
ATSyRa: An Integrated Environment for Synthesizing Attack Trees. .