Sunflower

IFIP Working Group 10.4
Dependable Computing and Fault Tolerance

65th Meeting

Sorrento, Italy, IT

January 23-27, 2014

Previous Page

 

Meeting Host

  Andrea Bondavalli (U. Florence, Italy)

 


Program-at-a-Glance and Contents

Workshop on Security Assessment: Metrics and Methods

Workshop 
Coordinators

Zbigniew Kalbarczyk, John Meyer, Bill Sanders

 

Introduction

Session 1

Session 2

Session 3

Session 4

Session 5

Session 6

Research Reports

Business Meeting

List of Attendees


Workshop on Security Assessment: Metrics and Methods

January 23-27, 2014 (Thursday to Monday)

Introduction

Paulo Verissimo, Andrea Bondavalli
Meeting Start: Introduction to the meeting and workshop

 


Session 1

8:45 John Meyer, Introduction to the workshop

.pdf icon 

9:00 Andrea Guarino (Acea SpA), The Fault of Defaults - Don't Let Anyone Else Make Your Security Choices

.pdf icon

9:45 Zbigniew Kalbarczyk (U. Illinois), Quantitative Security Research at Illinois: From Data & Models to Metrics

.pdf icon


Session 2

11:15 Mustaque Ahamad (Georgia Ins’t Tech.), Challenges in Data-Driven Characterization of Cyber Attacks

.pdf icon

12:00 Salvatore Stolfo (Columbia U.), An Empirical Approach to Measuring Defense-in-Depth as a Cloud-Based Service

.pdf icon


Session 3

16:00 Richard Lippmann (MIT Lincoln Labs), Threat-Based Metrics for Continuous Enterprise Network Security Management (based on work with James Riordan)

.pdf icon

16:45 Steve Noel (Mitre Corp.), Metrics Suite for Network Attack Graphs

.pdf icon


Session 4

8:30 Robin Bloomfield (City U. London), Security Risk Assessment: Between Snake Oil and Science

.pdf icon

9:15 Laurie Williams (NC State U.), Where Should I Look?  Using Metrics to Prioritize Verification Efforts

.pdf icon


Session 5

10:45 DongSeong (Dan) Kim (U. Canterbury), Toward Scalable Security Models and Analysis

.pdf icon

11:30 Andrea Cecarrelli (U. Florence), Design and Security Assessment of a Protocol for Continuous User Identity Verification

.pdf icon


Session 6 Wrap Up

  Session 1 Report/Summary

.pdf icon

  Session 2 Report/Summary

.pdf icon

Tom Anderson (U. Newcastle) - Session 3 Report/Summary

.pdf icon

Karama Kanoun (LAAS-CNRS) - Session 4 Report/Summary

.pdf icon

Mootaz Elnozahy (KAUST) - Session 5 Report/Summary

.pdf icon

 

Research Reports

Yair Amir, Johns Hopkins University, Intrusion Tolerant Cloud Infrastructure

 

.pdf icon

Haruo Yokota, Tokyo Institute of Technology, Efficient Gear-Shifting For A Power-Proportional Distributed Data-Placement Method

.pdf icon

Angelo MARINO, European Commission Research Executive Agency, Horizon 2020 Secure Societies

 

.pdf icon

Nick Multari, Pacific Northwest National Laboratory, Modeling for Cyber Security and Cyber Resiliency

 

.pdf icon

Nuno Neves, LASIGE, University of Lisboa, Stopping a Rapid Tornado with a Puff

 

.pdf icon

Luigi Romano, University of Naples “Parthenope”, Situation Aware Security Operations Center

 

.pdf icon

John Rushby, SRI International, Computational Metaphysics

 

.pdf icon

Lorenzo Strigini, Centre for Software Reliability, City University London, Dealing with epistemic uncertainty in probabilistic assessment of systems for which high confidence in very high dependability is required

 

.pdf icon

Robert Stroud, Adelard LLP, Security and Safety Modelling

 

.pdf icon

Laura Tinnel, SRI International, Collaborative Research: The Road to Tomorrow: Cybersecurity Experimentation of the Future, The LASER Workshop

 

.pdf icon

 

Business Meeting

IFIP Working Group 10.4 business meeting

              .pdf icon

List of Attendees

Names and Contact Information

               .pdf icon