GraMSec 2019: 6th International Workshop on Graphical Models for Security Stevens Institute of Technology Hoboken, NJ, United States, June 24, 2019 |
Conference website | http://gramsec.uni.lu/ |
Submission link | https://easychair.org/conferences/?conf=gramsec2019 |
Submission deadline | April 5, 2019 |
[CFP] The Sixth International Workshop on Graphical Models for Security (GraMSec 2019) Hoboken, NJ, USA - June 24, 2019
Official website: http://gramsec.uni.lu
Co-located with:
32nd IEEE Computer Security Foundations Symposium (CSF 2019), June 25-28, 2019:
https://web.stevens.edu/csf2019/
SCOPE
The use of graphical security models to represent and analyse the
security of systems has gained an increasing research attention over the
last two decades. Formal methods and computer security researchers, as
well as security professionals from the industry and government, have
proposed various graphical security models, metrics, and measurements.
Graphical models are used to capture different security facets and
address a range of challenges including security assessment, automated
defence, secure services composition, security policy validation, and
verification. For example, attack graphs, attack trees, attack–defence
trees, and attack countermeasure trees represent possible ways of
attacking and defending a system while misuse cases and mal-activity
diagrams capture threats and abusive behaviour of users.
TOPICS
This year, we are particularly keen to encourage excellent submissions
related, but not restricted, to the following broad headings:
• Graph representations: mathematical, conceptual, and implemented tools
for describing and reasoning about security
• Logical approaches: formal logical tools for representing and
reasoning about graphs and their use as modelling tools in security
• Machine learning: modelling and reasoning about the role of big data
and machine learning in security operations
• Networks in national security: terrorist networks, counter-terrorism
networks; safety in national infrastructure (e.g., utilities and
transportation)
• Risk analysis and management: models of risk management in business
and organizational architectures
• Social networks: using and reasoning about social graphs, network
analysis, network protocols, social mapping, sociometry.
Preference will be given to papers likely to stimulate high-quality
debate at the Workshop.
IMPORTANT DATES (NOTE TWO SUBMISSION DEADLINES)
Early submissions (priority in program, and early notification)
- Early paper submission due: Friday, April 5
- Notification for early submissions: Friday, May 3
Late submissions (after CSF notification)
- Late papers submissions due: Monday, April 22
- Notification for late submissions: Monday, May 13
- Camera ready versions due: Monday, May 27
- Workshop: Monday, June 24
Submission Guidelines
We solicit two types of submissions:
• Regular papers (up to 15 pages, excluding the bibliography and
well-marked appendices) describing original and unpublished work within
the scope of the workshop.
• Short papers (up to 7 pages, excluding the bibliography and
well-marked appendices) describing original and unpublished work in
progress.
The reviewers are not required to read the appendices, so the papers
should be intelligible without them. All submissions must be prepared
using the LNCS style:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
Each paper will undergo a thorough review process. Submissions should be
made using the GraMSec 2019 EasyChair website:
https://easychair.org/conferences/?conf=gramsec2019
List of Topics
This year, we are particularly keen to encourage excellent submissions
related, but not restricted, to the following broad headings:
• Graph representations: mathematical, conceptual, and implemented tools
for describing and reasoning about security
• Logical approaches: formal logical tools for representing and
reasoning about graphs and their use as modelling tools in security
• Machine learning: modelling and reasoning about the role of big data
and machine learning in security operations
• Networks in national security: terrorist networks, counter-terrorism
networks; safety in national infrastructure (e.g., utilities and
transportation)
• Risk analysis and management: models of risk management in business
and organizational architectures
• Social networks: using and reasoning about social graphs, network
analysis, network protocols, social mapping, sociometry.
Preference will be given to papers likely to stimulate high-quality
debate at the Workshop.
Committees and Speakers
PROGRAM CHAIRS
- Massimiliano Albanese, George Mason University, VA, USA
- Ross Horne, University of Luxembourg, Luxembourg
GENERAL CHAIR
- Christian W. Probst, Unitec, New Zealand
STEERING COMMITTEE
- Sushil Jajodia, George Mason University, VA, USA
- Barbara Kordy, INSA Rennes, IRISA, FR
- Sjouke Mauw, University of Luxembourg, LU
- Christian W. Probst, Unitec, New Zealand
- Ketil Stølen, SINTEF Digital and University of Oslo, Norway
PC MEMBERS
- Ludovic Apvrille, Telecom ParisTech, France
- Zaruhi Aslanyan, Alexandra Institute, Denmark
- Stefano Bistarelli, Università di Perugia, Italy
- Hasan Cam, U.S. Army Research Laboratory, PA, US
- Nora Cuppens-Boulahia, IMT Atlantique, France
- Harley Eades III, Augusta University, GA, US
- Olga Gadyatskaya, SnT, University of Luxembourg, Luxembourg
- René Rydhof Hansen, Aalborg University, Denmark
- Jin B. Hong, University of Western Australia, Australia
- DongSeong Kim, The University of Queensland, New Zealand
- Barbara Kordy, INSA Rennes, IRISA, France
- Sjouke Mauw, University of Luxembourg, Luxembourg
- Per Håkon Meland, SINTEF ICT, Norway
- Guozhu Meng, Chinese Academy of Sciences, Beijing, China
- Vivek Nigam, fortiss GmbH, Germany
- Andreas Lothe Opdahl, University of Bergen, Norway
- Noseong Park, George Mason University, VA, US
- Stéphane Paul, Thales Research and Technology, France
- Sophie Pinchinat, INSA Rennes, France
- Saša Radomirovic, University of Dundee, United Kingdom
- Rolando Trujillo Rasúa, Deakin University, Australia
- Paul Rowe, The MITRE Corporation, MA, US
- Giedre Sabaliauskaite, Singapore University of Technology and Design, Singapore
- Ketil Stølen, SINTEF, Norway
- Sridhar Venkatesan, Vencore Labs, VA, US
PUBLICITY CHAIR
- Ibifubara Iganibo, George Mason University, VA, US
Publication
In previous editions a post-proceedings has been made available in the Lecture Notes in Computer Science (LNCS) series, published by Springer. This is published after the workshop, permiting the authors to incorporate feedback.
Venue
The conference will be held at the Stevens Institute of Technology campus located at 1 Castle Point Terrace in Hoboken, New Jersey.
Conference Rooms: Sessions will take place on the first floor of the Lawrence T. Babbio, Jr. Center for Business and Technology Management in the Babbio Atrium and Babbio Center, room 122. View the exact location of the Babbio Center on a campus map (building number 2).
Registration for CSF & Workshops will be held in the Babbio Atrium starting on Monday.
Meals: Continental breakfast will provided in the Babbio Atrium. Conference attendees should use local restaurants and cafes for lunch and dinner. A reception will be held on Tuesday evening and a boat-cruise/banquet will be held on Thursday evening.
Social Events
CSF will include a reception on Tuesday and a boat-cruise around New York harbor on Thursday.
Contact
All questions about submissions should be emailed to Ross Horne <ross.horne@uni.lu> or Massimiliano Albanese <malbanes@gmu.edu>.