Skip to main content
  • Conference proceedings
  • © 2016

Graphical Models for Security

Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9390)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): GraMSec: International Workshop on Graphical Models for Security

Conference proceedings info: GraMSec 2015.

Buy it now

Buying options

eBook USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (7 papers)

  1. Front Matter

    Pages I-IX
  2. The Attack Navigator

    • Christian W. Probst, Jan Willemson, Wolter Pieters
    Pages 1-17
  3. Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources

    • Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow et al.
    Pages 18-34
  4. Guided Specification and Analysis of a Loyalty Card System

    • Laurent Cuennet, Marc Pouly, SaÅ¡a Radomirović
    Pages 66-81
  5. Transforming Graphical System Models to Graphical Attack Models

    • Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller
    Pages 82-96
  6. ATSyRa: An Integrated Environment for Synthesizing Attack Trees

    • Sophie Pinchinat, Mathieu Acher, Didier Vojtisek
    Pages 97-101
  7. Back Matter

    Pages 103-103

Other Volumes

  1. Graphical Models for Security

About this book



This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015.
The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures.






Editors and Affiliations

  • University of Luxembourg, Luxembourg, Luxembourg

    Sjouke Mauw

  • INSA Rennes and IRISA, Rennes, France

    Barbara Kordy

  • George Mason University, Fairfax, VA, USA

    Sushil Jajodia

Bibliographic Information

Buy it now

Buying options

eBook USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access