Variability modeling of cryptographic components (Clafer experience report)

Sarah Nadi, Stefan Krüger

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Software systems need to use cryptography to protect any sensitive data they collect. However, there are various classes of cryptographic components (e.g., ciphers, digests, etc.), each suitable for a specific purpose. Additionally, each class of such components comes with various algorithms and configurations. Finding the right combination of algorithms and correct settings to use is often difficult. We believe that using variability modeling to model these algorithms, their relationships, and restrictions can help non-experts navigate this complex domain. In this paper, we report on our experience modeling cryptographic components in Clafer, a modeling language that combines feature modeling and metamodeling. We discuss design decisions we took as well as the challenges we ran into. Our work helps expand variability modeling into new domains and sheds lights on modeling requirements that appear in practice.

Original languageEnglish (US)
Title of host publicationProceedings - VaMoS 2016
Subtitle of host publication10th International Workshop on Variability Modelling of Software-Intensive Systems
EditorsVander Alves, Ina Schaefer, Eduardo Santana de Almeida
PublisherAssociation for Computing Machinery
Pages105-112
Number of pages8
ISBN (Electronic)9781450340199
DOIs
StatePublished - Jan 27 2016
Event10th International Workshop on Variability Modelling of Software-Intensive Systems, VaMoS 2016 - Salvador, Brazil
Duration: Jan 27 2016Jan 29 2016

Publication series

NameACM International Conference Proceeding Series
Volume27-29-January-2016

Conference

Conference10th International Workshop on Variability Modelling of Software-Intensive Systems, VaMoS 2016
Country/TerritoryBrazil
CitySalvador
Period1/27/161/29/16

Keywords

  • Clafer
  • Cryptography
  • Variability modeling

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Variability modeling of cryptographic components (Clafer experience report)'. Together they form a unique fingerprint.

Cite this