|
Search the dblp DataBase
C. Sekar Chandersekaran:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan
Design and Implementation of Secure Xenix. [Citation Graph (1, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:208-221 [Journal]
- Shabnam Erfani, C. Sekar Chandersekaran
Generic Support for PKIX Certificate Management in CDSA. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:269-275 [Conf]
- Ping Lin, C. Sekar Chandersekaran
Integration of DCE and Local Registries: Design Approaches. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:165-170 [Conf]
- K. S. Shankar, C. Sekar Chandersekaran
Dat Flow, Abstraction Levels and Specifications for Communications Switching Systems. [Citation Graph (0, 0)][DBLP] ICSE, 1976, pp:585-591 [Conf]
- Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan
On the Design and the Implementation of Secure Xenix Workstations. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:102-117 [Conf]
- Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:40-59 [Conf]
- Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran
A Formal Method for the Identification of Covert Storage Channels in Source Code. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1987, pp:74-87 [Conf]
- C. Sekar Chandersekaran, Richard C. Linger
Software specification using the SPECIAL language. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1981, v:2, n:1, pp:31-38 [Journal]
- Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:169-183 [Journal]
- Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran
On the Identification of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:569-580 [Journal]
Search in 0.003secs, Finished in 0.004secs
|