LEADER 04511nam 22008415 450 001 996465999603316 005 20200629225702.0 010 $a3-319-29968-9 024 7 $a10.1007/978-3-319-29968-6 035 $a(CKB)3780000000096473 035 $a(SSID)ssj0001658564 035 $a(PQKBManifestationID)16441821 035 $a(PQKBTitleCode)TC0001658564 035 $a(PQKBWorkID)14987085 035 $a(PQKB)11640919 035 $a(DE-He213)978-3-319-29968-6 035 $a(MiAaPQ)EBC6296511 035 $a(MiAaPQ)EBC5586492 035 $a(Au-PeEL)EBL5586492 035 $a(OCoLC)939516114 035 $a(PPN)192221736 035 $a(EXLCZ)993780000000096473 100 $a20160205d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aGraphical Models for Security$b[electronic resource] $eSecond International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers /$fedited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (IX, 103 p. 44 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9390 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-29967-0 327 $aIntegrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks -- Guided Specification and Analysis of a Loyalty Card System -- How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems -- Transforming Graphical System Models to Graphical Attack Models -- ATSyRa: An Integrated Environment for Synthesizing Attack Trees. . 330 $aThis volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015. The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. 410 0$aSecurity and Cryptology ;$v9390 606 $aComputer security 606 $aComputer communication systems 606 $aSoftware engineering 606 $aAlgorithms 606 $aApplication software 606 $aComputer logic 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aSoftware engineering. 615 0$aAlgorithms. 615 0$aApplication software. 615 0$aComputer logic. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aLogics and Meanings of Programs. 676 $a005.8 702 $aMauw$b Sjouke$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKordy$b Barbara$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465999603316 996 $aGraphical Models for Security$92278484 997 $aUNISA