dblp.uni-trier.dewww.uni-trier.de

John Hale

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
33EEStephen Tyree, Rayus Kuplicki, Trevor Sarratt, Scott Fujan, John Hale: GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus. BICoB 2009: 409-423
2008
32EEKevin Clark, Ethan Singleton, Stephen Tyree, John Hale: Strata-Gem: risk assessment through mission modeling. QoP 2008: 51-58
31EEGavin Wylie Manes, James Johnson, Alex Barclay, Michael Harvey, Elizabeth Downing, John Hale: Issues and Techniques for Redacting PDF Files. J. Digital Forensic Practice 2(3): 113-116 (2008)
2007
30EEAlex Barclay, L. Watson, David Greer, John Hale, Gavin Manes: Redacting Digital Information from Electronic Devices. IFIP Int. Conf. Digital Forensics 2007: 205-214
29EEJohn Hale, Paul Brusil: Secur(e/ity) Management: A Continuing Uphill Climb. J. Network Syst. Manage. 15(4): 525-553 (2007)
28EEJohn Hale: Book Review. Journal of Logic, Language and Information 16(2): 217-220 (2007)
2006
27EEJohn Hale, Izhak Shafran, Lisa Yung, Bonnie J. Dorr, Mary P. Harper, Anna Krasnyanskaya, Matthew Lease, Yang Liu, Brian Roark, Matthew G. Snover, Robin Stewart: PCFGs with Syntactic and Prosodic Indicators of Speech Repairs. ACL 2006
2005
26EEPaul Brusil, John Hale: The Shifting Sands of Security Management. J. Network Syst. Manage. 13(3): 241-245 (2005)
2004
25EEJerald Dawkins, John Hale: A Systematic Approach to Multi-Stage Network Attack Analysis. IWIA 2004: 48-58
24 John Hale, Paul Brusil: Secur(e/ity) Management: Two Sides of the Same Coin. J. Network Syst. Manage. 12(1): (2004)
2003
23 Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360
22 John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Access Control. Journal of Computer Security 11(3): 331-352 (2003)
2002
21 Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa: On Modeling Computer Networks for Vulnerability Analysis. DBSec 2002: 233-244
20 Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale: Implementation and Verification of Programmable Security. DBSec 2002: 285-299
2001
19 G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi: Public Telephone Network Vulnerabilities. DBSec 2001: 151-164
18EEMauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Formal Analysis of E-Commerce Protocols. ISADS 2001: 19-28
17EEJohn Hale: A Probabilistic Earley Parser as a Psycholinguistic Model. NAACL 2001
2000
16 Vijayalakshmi Atluri, John Hale: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA Kluwer 2000
15EEPablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu: Policy Mediation for Multi-Enterprise Environments. ACSAC 2000: 100-106
14EEJohn Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi: Extending Java for Package based Access Control. ACSAC 2000: 67-76
13 John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi: Language Extensions for Programmable Security. DBSec 2000: 221-232
12 Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi: Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100
11 John Hale, Jody Threet, Sujeet Shenoi: A Ticket-Based Access Control Architecture for Object Systems. Journal of Computer Security 8(1): (2000)
1999
10EEJohn Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi: Security Policy Coordination for Heterogeneous Information Systems. ACSAC 1999: 219-228
1998
9 John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123
1997
8 John Hale, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems. DBSec 1997: 134-148
7 M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi: An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388
6EEJohn Hale, Sujeet Shenoi: Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. IEEE Symposium on Security and Privacy 1997: 188-199
1996
5EEJohn Hale, Sujeet Shenoi: Analyzing FD Inference in Relational Databases. Data Knowl. Eng. 18(2): 167-183 (1996)
1995
4 Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi: A Tool for Inference Detection and Knowledge Discovery in Databases. DBSec 1995: 317-332
1994
3 Sandip Sen, Mahendra Sekaran, John Hale: Learning to Coordinate without Sharing Information. AAAI 1994: 426-431
2 John Hale, Jody Threet, Sujeet Shenoi: A Practical Formalism for Imprecise Inference Control. DBSec 1994: 139-156
1EEArthur L. Corcoran, John Hale: A genetic algorithm for fragment allocation in a distributed database system. SAC 1994: 247-250

Coauthor Index

1Vijayalakshmi Atluri (Vijay Atluri) [16]
2Alex Barclay [30] [31]
3M. Berryman [7]
4Oliver Bremer [12] [14] [15] [18] [23]
5Paul Brusil [24] [26] [29]
6Clinton Campbell [13] [21]
7Rodrigo Chandia [13] [14]
8Kevin Clark [32]
9Arthur L. Corcoran [1]
10Jerald Dawkins [21] [25]
11Bonnie J. Dorr [27]
12Elizabeth Downing [31]
13David F. Ferraiolo [15]
14Kenneth Fitch [21]
15Scott Fujan [33]
16Pablo Galiasso [10] [15]
17David Greer [30]
18Mary P. Harper [27]
19Michael Harvey [31]
20Vincent C. Hu [15]
21James Johnson [31]
22Dominic Jones [4]
23J. Keller [19]
24Anna Krasnyanskaya [27]
25Rayus Kuplicki [33]
26Matthew Lease [27]
27Yang Liu [27]
28G. Lorenz [19]
29Stephen Magill [12] [20]
30Gavin Manes [19] [30]
31Gavin Wylie Manes [31]
32Mauricio Papa [7] [9] [10] [12] [14] [18] [20] [21] [22] [23]
33Brandon Pollet [21]
34Surath Rath [4]
35Brian Roark [27]
36C. Rummel [7]
37Trevor Sarratt [33]
38Mahendra Sekaran [3]
39Sandip Sen [3]
40Izhak Shafran [27]
41Sujeet Shenoi [2] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [18] [19] [22] [23]
42Ethan Singleton [32]
43Bradley Skaggs [20]
44Matthew G. Snover [27]
45Robin Stewart [27]
46Jody Threet [2] [7] [8] [11]
47Stephen Tyree [32] [33]
48L. Watson [30]
49Lisa Yung [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)