| Article ID: | iaor20061796 |
| Country: | Netherlands |
| Volume: | 164 |
| Issue: | 3 |
| Start Page Number: | 680 |
| End Page Number: | 689 |
| Publication Date: | Aug 2005 |
| Journal: | European Journal of Operational Research |
| Authors: | Krings A.W., Azadmanesh A. |
| Keywords: | scheduling, optimization |
Many problems found in standard security and survivability applications can be transformed into graph and scheduling problems, thereby opening up the problems to a wealth of potential solutions or knowledge of limitations, infeasibility, scalability or intractability. This paper introduces a model to aid in the design, analysis, or operations of applications with security and survivability concerns. Specifically, a five step model is presented that transforms such applications into a parameterized graph model that, together with model abstraction and representations, can be the basis for solutions derived from graph and scheduling algorithms. A reverse transformation translates the solutions back to the application domain. The model is demonstrated using migratory agent security and fault-tolerant agreement and their transformation into chain constrained and group scheduling problems, respectively.