LEADER 04140nam 22006975 450 001 996466243803316 005 20200705085133.0 010 $a3-319-46263-6 024 7 $a10.1007/978-3-319-46263-9 035 $a(CKB)3710000000872935 035 $a(DE-He213)978-3-319-46263-9 035 $a(MiAaPQ)EBC5610863 035 $a(PPN)195511085 035 $a(EXLCZ)993710000000872935 100 $a20160907d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGraphical Models for Security$b[electronic resource] $eThird International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers /$fedited by Barbara Kordy, Mathias Ekstedt, Dong Seong Kim 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (IX, 167 p. 62 illus.) 225 1 $aSecurity and Cryptology ;$v9987 311 $a3-319-46262-8 320 $aIncludes bibliographical references and index. 327 $aA Bottom-up Approach to Applying Graphical Models in Security Analysis -- On the Soundness of Attack Trees -- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment -- Differential Privacy Analysis of Data Processing Workflows -- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees -- Enterprise Architecture-Based Risk and Security Modelling and Analysis -- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation -- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis -- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack -- Confining Adversary Actions via Measurement. . 330 $aThis book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016. The 9 papers presented in this volume were carefully reviewed and selected from 23 submissions. The volume also contains the invited talk by Xinming Ou. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage. . 410 0$aSecurity and Cryptology ;$v9987 606 $aComputer security 606 $aComputer science?Mathematics 606 $aComputer communication systems 606 $aSoftware engineering 606 $aAlgorithms 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aComputer security. 615 0$aComputer science?Mathematics. 615 0$aComputer communication systems. 615 0$aSoftware engineering. 615 0$aAlgorithms. 615 14$aSystems and Data Security. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aKordy$b Barbara$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aEkstedt$b Mathias$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Dong Seong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466243803316 996 $aGraphical Models for Security$92278484 997 $aUNISA