The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

C. Sekar Chandersekaran: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan
    Design and Implementation of Secure Xenix. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:208-221 [Journal]
  2. Shabnam Erfani, C. Sekar Chandersekaran
    Generic Support for PKIX Certificate Management in CDSA. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:269-275 [Conf]
  3. Ping Lin, C. Sekar Chandersekaran
    Integration of DCE and Local Registries: Design Approaches. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:165-170 [Conf]
  4. K. S. Shankar, C. Sekar Chandersekaran
    Dat Flow, Abstraction Levels and Specifications for Communications Switching Systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 1976, pp:585-591 [Conf]
  5. Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan
    On the Design and the Implementation of Secure Xenix Workstations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:102-117 [Conf]
  6. Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
    A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:40-59 [Conf]
  7. Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran
    A Formal Method for the Identification of Covert Storage Channels in Source Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:74-87 [Conf]
  8. C. Sekar Chandersekaran, Richard C. Linger
    Software specification using the SPECIAL language. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1981, v:2, n:1, pp:31-38 [Journal]
  9. Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
    A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:169-183 [Journal]
  10. Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran
    On the Identification of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:6, pp:569-580 [Journal]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002