Graphical Models for Security [[electronic resource] ] : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers / / edited by Barbara Kordy, Mathias Ekstedt, Dong Seong Kim |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 167 p. 62 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer science—Mathematics Computer communication systems Software engineering Algorithms Systems and Data Security Discrete Mathematics in Computer Science Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity |
ISBN | 3-319-46263-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Bottom-up Approach to Applying Graphical Models in Security Analysis -- On the Soundness of Attack Trees -- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment -- Differential Privacy Analysis of Data Processing Workflows -- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees -- Enterprise Architecture-Based Risk and Security Modelling and Analysis -- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation -- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis -- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack -- Confining Adversary Actions via Measurement. . |
Record Nr. | UNISA-996466243803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers / / edited by Barbara Kordy, Mathias Ekstedt, Dong Seong Kim |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 167 p. 62 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer science—Mathematics Computer communication systems Software engineering Algorithms Systems and Data Security Discrete Mathematics in Computer Science Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity |
ISBN | 3-319-46263-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Bottom-up Approach to Applying Graphical Models in Security Analysis -- On the Soundness of Attack Trees -- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment -- Differential Privacy Analysis of Data Processing Workflows -- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees -- Enterprise Architecture-Based Risk and Security Modelling and Analysis -- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation -- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis -- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack -- Confining Adversary Actions via Measurement. . |
Record Nr. | UNINA-9910482995703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|