Login / Signup

Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.

Richard C. LingerMark G. PleszkochStacy J. ProwellKirk SayreT. Scott Ankrum
Published in: CSIIRW (2013)
Keyphrases
  • security properties
  • legacy software
  • formal model
  • security requirements
  • security analysis
  • low cost
  • security protocols
  • formal methods
  • artificial intelligence
  • life cycle