Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /

This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.  The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Liu, Peng. (Editor, http://id.loc.gov/vocabulary/relators/edt), Mauw, Sjouke. (Editor, http://id.loc.gov/vocabulary/relators/edt), Stolen, Ketil. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2018.
Edition:1st ed. 2018.
Series:Security and Cryptology ; 10744
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-74860-3
LEADER 03966nam a22006255i 4500
001 978-3-319-74860-3
003 DE-He213
005 20210624235245.0
007 cr nn 008mamaa
008 180220s2018 gw | s |||| 0|eng d
020 |a 9783319748603  |9 978-3-319-74860-3 
024 7 |a 10.1007/978-3-319-74860-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Graphical Models for Security  |h [electronic resource] :  |b 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /  |c edited by Peng Liu, Sjouke Mauw, Ketil Stolen. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XI, 147 p. 48 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 10744 
505 0 |a Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. 
520 |a This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.  The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. 
650 0 |a Computer security. 
650 0 |a Computer programming. 
650 0 |a Software engineering. 
650 0 |a Artificial intelligence. 
650 0 |a Computers. 
650 0 |a Computer organization. 
650 1 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Programming Techniques.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I14010 
650 2 4 |a Software Engineering.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I14029 
650 2 4 |a Artificial Intelligence.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I21000 
650 2 4 |a Computing Milieux.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I24008 
650 2 4 |a Computer Systems Organization and Communication Networks.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13006 
700 1 |a Liu, Peng.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Mauw, Sjouke.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Stolen, Ketil.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319748597 
776 0 8 |i Printed edition:  |z 9783319748610 
830 0 |a Security and Cryptology ;  |v 10744 
856 4 0 |u https://doi.org/10.1007/978-3-319-74860-3 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)