2009 |
33 | EE | Stephen Tyree,
Rayus Kuplicki,
Trevor Sarratt,
Scott Fujan,
John Hale:
GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus.
BICoB 2009: 409-423 |
2008 |
32 | EE | Kevin Clark,
Ethan Singleton,
Stephen Tyree,
John Hale:
Strata-Gem: risk assessment through mission modeling.
QoP 2008: 51-58 |
31 | EE | Gavin Wylie Manes,
James Johnson,
Alex Barclay,
Michael Harvey,
Elizabeth Downing,
John Hale:
Issues and Techniques for Redacting PDF Files.
J. Digital Forensic Practice 2(3): 113-116 (2008) |
2007 |
30 | EE | Alex Barclay,
L. Watson,
David Greer,
John Hale,
Gavin Manes:
Redacting Digital Information from Electronic Devices.
IFIP Int. Conf. Digital Forensics 2007: 205-214 |
29 | EE | John Hale,
Paul Brusil:
Secur(e/ity) Management: A Continuing Uphill Climb.
J. Network Syst. Manage. 15(4): 525-553 (2007) |
28 | EE | John Hale:
Book Review.
Journal of Logic, Language and Information 16(2): 217-220 (2007) |
2006 |
27 | EE | John Hale,
Izhak Shafran,
Lisa Yung,
Bonnie J. Dorr,
Mary P. Harper,
Anna Krasnyanskaya,
Matthew Lease,
Yang Liu,
Brian Roark,
Matthew G. Snover,
Robin Stewart:
PCFGs with Syntactic and Prosodic Indicators of Speech Repairs.
ACL 2006 |
2005 |
26 | EE | Paul Brusil,
John Hale:
The Shifting Sands of Security Management.
J. Network Syst. Manage. 13(3): 241-245 (2005) |
2004 |
25 | EE | Jerald Dawkins,
John Hale:
A Systematic Approach to Multi-Stage Network Attack Analysis.
IWIA 2004: 48-58 |
24 | | John Hale,
Paul Brusil:
Secur(e/ity) Management: Two Sides of the Same Coin.
J. Network Syst. Manage. 12(1): (2004) |
2003 |
23 | | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
SEC 2003: 349-360 |
22 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Access Control.
Journal of Computer Security 11(3): 331-352 (2003) |
2002 |
21 | | Clinton Campbell,
Jerald Dawkins,
Brandon Pollet,
Kenneth Fitch,
John Hale,
Mauricio Papa:
On Modeling Computer Networks for Vulnerability Analysis.
DBSec 2002: 233-244 |
20 | | Stephen Magill,
Bradley Skaggs,
Mauricio Papa,
John Hale:
Implementation and Verification of Programmable Security.
DBSec 2002: 285-299 |
2001 |
19 | | G. Lorenz,
J. Keller,
Gavin Manes,
John Hale,
Sujeet Shenoi:
Public Telephone Network Vulnerabilities.
DBSec 2001: 151-164 |
18 | EE | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Formal Analysis of E-Commerce Protocols.
ISADS 2001: 19-28 |
17 | EE | John Hale:
A Probabilistic Earley Parser as a Psycholinguistic Model.
NAACL 2001 |
2000 |
16 | | Vijayalakshmi Atluri,
John Hale:
Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA
Kluwer 2000 |
15 | EE | Pablo Galiasso,
Oliver Bremer,
John Hale,
Sujeet Shenoi,
David F. Ferraiolo,
Vincent C. Hu:
Policy Mediation for Multi-Enterprise Environments.
ACSAC 2000: 100-106 |
14 | EE | John Hale,
Mauricio Papa,
Oliver Bremer,
Rodrigo Chandia,
Sujeet Shenoi:
Extending Java for Package based Access Control.
ACSAC 2000: 67-76 |
13 | | John Hale,
Rodrigo Chandia,
Clinton Campbell,
Sujeet Shenoi:
Language Extensions for Programmable Security.
DBSec 2000: 221-232 |
12 | | Mauricio Papa,
Oliver Bremer,
Stephen Magill,
John Hale,
Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols.
DBSec 2000: 89-100 |
11 | | John Hale,
Jody Threet,
Sujeet Shenoi:
A Ticket-Based Access Control Architecture for Object Systems.
Journal of Computer Security 8(1): (2000) |
1999 |
10 | EE | John Hale,
Pablo Galiasso,
Mauricio Papa,
Sujeet Shenoi:
Security Policy Coordination for Heterogeneous Information Systems.
ACSAC 1999: 219-228 |
1998 |
9 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Security for Object-Oriented Systems.
DBSec 1998: 109-123 |
1997 |
8 | | John Hale,
Jody Threet,
Sujeet Shenoi:
Capability-Based Primitives for Access Control in Object-Oriented Systems.
DBSec 1997: 134-148 |
7 | | M. Berryman,
C. Rummel,
Mauricio Papa,
John Hale,
Jody Threet,
Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
DBSec 1997: 385-388 |
6 | EE | John Hale,
Sujeet Shenoi:
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.
IEEE Symposium on Security and Privacy 1997: 188-199 |
1996 |
5 | EE | John Hale,
Sujeet Shenoi:
Analyzing FD Inference in Relational Databases.
Data Knowl. Eng. 18(2): 167-183 (1996) |
1995 |
4 | | Surath Rath,
Dominic Jones,
John Hale,
Sujeet Shenoi:
A Tool for Inference Detection and Knowledge Discovery in Databases.
DBSec 1995: 317-332 |
1994 |
3 | | Sandip Sen,
Mahendra Sekaran,
John Hale:
Learning to Coordinate without Sharing Information.
AAAI 1994: 426-431 |
2 | | John Hale,
Jody Threet,
Sujeet Shenoi:
A Practical Formalism for Imprecise Inference Control.
DBSec 1994: 139-156 |
1 | EE | Arthur L. Corcoran,
John Hale:
A genetic algorithm for fragment allocation in a distributed database system.
SAC 1994: 247-250 |