Login / Signup
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.
Richard C. Linger
Mark G. Pleszkoch
Stacy J. Prowell
Kirk Sayre
T. Scott Ankrum
Published in:
CSIIRW (2013)
Keyphrases
</>
security properties
legacy software
formal model
security requirements
security analysis
low cost
security protocols
formal methods
artificial intelligence
life cycle