• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.

Richard C. LingerMark G. PleszkochStacy J. ProwellKirk SayreT. Scott Ankrum
Published in: CSIIRW (2013)
Keyphrases
  • security properties
  • legacy software
  • formal model
  • security requirements
  • security analysis
  • low cost
  • security protocols
  • formal methods
  • artificial intelligence
  • life cycle