Article ID: | iaor20061796 |
Country: | Netherlands |
Volume: | 164 |
Issue: | 3 |
Start Page Number: | 680 |
End Page Number: | 689 |
Publication Date: | Aug 2005 |
Journal: | European Journal of Operational Research |
Authors: | Krings A.W., Azadmanesh A. |
Keywords: | scheduling, optimization |
Many problems found in standard security and survivability applications can be transformed into graph and scheduling problems, thereby opening up the problems to a wealth of potential solutions or knowledge of limitations, infeasibility, scalability or intractability. This paper introduces a model to aid in the design, analysis, or operations of applications with security and survivability concerns. Specifically, a five step model is presented that transforms such applications into a parameterized graph model that, together with model abstraction and representations, can be the basis for solutions derived from graph and scheduling algorithms. A reverse transformation translates the solutions back to the application domain. The model is demonstrated using migratory agent security and fault-tolerant agreement and their transformation into chain constrained and group scheduling problems, respectively.