C. Sekar Chandersekaran

According to our database1, C. Sekar Chandersekaran authored at least 11 papers between 1976 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Surviving Insider Attacks: A Call for System Experiments.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

1999
Generic Support for PKIX Certificate Management in CDSA.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1993
Integration of DCE and Local Registries: Design Approaches.
Proceedings of the CCS '93, 1993

1990
On the Identification of Covert Storage Channels in Secure Systems.
IEEE Trans. Software Eng., 1990

1987
A New Security Testing Method and Its Application to the Secure Xenix Kernel.
IEEE Trans. Software Eng., 1987

Design and Implementation of Secure Xenix.
IEEE Trans. Software Eng., 1987

A Formal Method for the Identification of Covert Storage Channels in Source Code.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1986
A New Security Testing Method and Its Application to the Secure Xenix Kernel.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

On the Design and the Implementation of Secure Xenix Workstations.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1981
Software specification using the SPECIAL language.
J. Syst. Softw., 1981

1976
Dat Flow, Abstraction Levels and Specifications for Communications Switching Systems.
Proceedings of the 2nd International Conference on Software Engineering, 1976


  Loading...