Graphical Models for Security [[electronic resource] ] : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers / / edited by Barbara Kordy, Mathias Ekstedt, Dong Seong Kim |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 167 p. 62 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer science—Mathematics Computer communication systems Software engineering Algorithms Systems and Data Security Discrete Mathematics in Computer Science Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity |
ISBN | 3-319-46263-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Bottom-up Approach to Applying Graphical Models in Security Analysis -- On the Soundness of Attack Trees -- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment -- Differential Privacy Analysis of Data Processing Workflows -- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees -- Enterprise Architecture-Based Risk and Security Modelling and Analysis -- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation -- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis -- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack -- Confining Adversary Actions via Measurement. . |
Record Nr. | UNISA-996466243803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Graphical Models for Security [[electronic resource] ] : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 103 p. 44 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Software engineering Algorithms Application software Computer logic Systems and Data Security Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Logics and Meanings of Programs |
ISBN | 3-319-29968-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks -- Guided Specification and Analysis of a Loyalty Card System -- How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems -- Transforming Graphical System Models to Graphical Attack Models -- ATSyRa: An Integrated Environment for Synthesizing Attack Trees. . |
Record Nr. | UNISA-996465999603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers / / edited by Barbara Kordy, Mathias Ekstedt, Dong Seong Kim |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 167 p. 62 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer science—Mathematics Computer communication systems Software engineering Algorithms Systems and Data Security Discrete Mathematics in Computer Science Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity |
ISBN | 3-319-46263-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Bottom-up Approach to Applying Graphical Models in Security Analysis -- On the Soundness of Attack Trees -- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment -- Differential Privacy Analysis of Data Processing Workflows -- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees -- Enterprise Architecture-Based Risk and Security Modelling and Analysis -- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation -- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis -- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack -- Confining Adversary Actions via Measurement. . |
Record Nr. | UNINA-9910482995703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Graphical Models for Security : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 103 p. 44 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Software engineering Algorithms Application software Computer logic Systems and Data Security Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Logics and Meanings of Programs |
ISBN | 3-319-29968-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks -- Guided Specification and Analysis of a Loyalty Card System -- How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems -- Transforming Graphical System Models to Graphical Attack Models -- ATSyRa: An Integrated Environment for Synthesizing Attack Trees. . |
Record Nr. | UNINA-9910484309203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|