A graph based model for survivability applications

被引:5
|
作者
Krings, AW [1 ]
Azadmanesh, A
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83844 USA
[2] Univ Nebraska, Dept Comp Sci, Omaha, NE 68182 USA
关键词
scheduling; security; survivability; transformation model;
D O I
10.1016/j.ejor.2003.10.052
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Many problems found in standard security and survivability applications can be transformed into graph and scheduling problems, thereby opening up the problems to a wealth of potential solutions or knowledge of limitations, infeasibility, scalability or intractability. This paper introduces a model to aid in the design, analysis, or operations of applications with security and survivability concerns. Specifically, a five step model is presented that transforms such applications into a parameterized graph model that, together with model abstraction and representations, can be the basis for solutions derived from graph and scheduling algorithms. A reverse transformation translates the solutions back to the application domain. The model is demonstrated using migratory agent security and fault-tolerant agreement and their transformation into chain constrained and group scheduling problems, respectively. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:680 / 689
页数:10
相关论文
共 50 条
  • [1] Graph-based technique for survivability assessment and optimization of IoT applications
    Shakhov, Vladimir
    Koo, Insoo
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (01) : 105 - 114
  • [2] Graph-based technique for survivability assessment and optimization of IoT applications
    Vladimir Shakhov
    Insoo Koo
    [J]. International Journal on Software Tools for Technology Transfer, 2021, 23 : 105 - 114
  • [3] A survivability quantitative analysis model for network system based on attack graph
    Zhang, Le-Jun
    Wang, Wei
    Guo, Lin
    Yang, Wu
    Yang, Yong-Tian
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3211 - 3216
  • [4] On network survivability algorithms based on trellis graph transformations
    Louca, S
    Pitsillides, A
    Samaras, G
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1999, : 235 - 243
  • [5] A model with applications for data survivability in Critical Infrastructures
    Albano, Michele
    Chessa, Stefano
    Di Pietro, Roberto
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 629 - 639
  • [6] An immune-based model for service survivability
    Zeng, Jinquan
    Liu, Xiaojie
    Li, Tao
    Sun, Feixian
    Peng, Lingxi
    Liu, Caiming
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 354 - +
  • [7] Model-based diagnosis for information survivability
    Shrobe, H
    [J]. SELF-ADAPTIVE SOFTWARE: APPLICATIONS, 2001, 2614 : 142 - 157
  • [8] A novel graph model for maximum survivability in mesh networks under multiple generic risks
    She, Qingya
    Huang, Xiaodong
    Jue, Jason P.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 2330 - 2335
  • [9] Survivability model based on system structure and runtime environment
    Geng, Ji
    Song, Xu
    Chen, Wei
    Qin, Zhi-Guang
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2014, 43 (01): : 101 - 106
  • [10] Network Survivability Analysis Based on Stochastic Game Model
    Wang Chunlei
    Miao Qing
    Dai Yiqi
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 99 - 104