2009 | ||
---|---|---|
33 | EE | Stephen Tyree, Rayus Kuplicki, Trevor Sarratt, Scott Fujan, John Hale: GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus. BICoB 2009: 409-423 |
2008 | ||
32 | EE | Kevin Clark, Ethan Singleton, Stephen Tyree, John Hale: Strata-Gem: risk assessment through mission modeling. QoP 2008: 51-58 |
31 | EE | Gavin Wylie Manes, James Johnson, Alex Barclay, Michael Harvey, Elizabeth Downing, John Hale: Issues and Techniques for Redacting PDF Files. J. Digital Forensic Practice 2(3): 113-116 (2008) |
2007 | ||
30 | EE | Alex Barclay, L. Watson, David Greer, John Hale, Gavin Manes: Redacting Digital Information from Electronic Devices. IFIP Int. Conf. Digital Forensics 2007: 205-214 |
29 | EE | John Hale, Paul Brusil: Secur(e/ity) Management: A Continuing Uphill Climb. J. Network Syst. Manage. 15(4): 525-553 (2007) |
28 | EE | John Hale: Book Review. Journal of Logic, Language and Information 16(2): 217-220 (2007) |
2006 | ||
27 | EE | John Hale, Izhak Shafran, Lisa Yung, Bonnie J. Dorr, Mary P. Harper, Anna Krasnyanskaya, Matthew Lease, Yang Liu, Brian Roark, Matthew G. Snover, Robin Stewart: PCFGs with Syntactic and Prosodic Indicators of Speech Repairs. ACL 2006 |
2005 | ||
26 | EE | Paul Brusil, John Hale: The Shifting Sands of Security Management. J. Network Syst. Manage. 13(3): 241-245 (2005) |
2004 | ||
25 | EE | Jerald Dawkins, John Hale: A Systematic Approach to Multi-Stage Network Attack Analysis. IWIA 2004: 48-58 |
24 | John Hale, Paul Brusil: Secur(e/ity) Management: Two Sides of the Same Coin. J. Network Syst. Manage. 12(1): (2004) | |
2003 | ||
23 | Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360 | |
22 | John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Access Control. Journal of Computer Security 11(3): 331-352 (2003) | |
2002 | ||
21 | Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa: On Modeling Computer Networks for Vulnerability Analysis. DBSec 2002: 233-244 | |
20 | Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale: Implementation and Verification of Programmable Security. DBSec 2002: 285-299 | |
2001 | ||
19 | G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi: Public Telephone Network Vulnerabilities. DBSec 2001: 151-164 | |
18 | EE | Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Formal Analysis of E-Commerce Protocols. ISADS 2001: 19-28 |
17 | EE | John Hale: A Probabilistic Earley Parser as a Psycholinguistic Model. NAACL 2001 |
2000 | ||
16 | Vijayalakshmi Atluri, John Hale: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA Kluwer 2000 | |
15 | EE | Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu: Policy Mediation for Multi-Enterprise Environments. ACSAC 2000: 100-106 |
14 | EE | John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi: Extending Java for Package based Access Control. ACSAC 2000: 67-76 |
13 | John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi: Language Extensions for Programmable Security. DBSec 2000: 221-232 | |
12 | Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi: Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100 | |
11 | John Hale, Jody Threet, Sujeet Shenoi: A Ticket-Based Access Control Architecture for Object Systems. Journal of Computer Security 8(1): (2000) | |
1999 | ||
10 | EE | John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi: Security Policy Coordination for Heterogeneous Information Systems. ACSAC 1999: 219-228 |
1998 | ||
9 | John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123 | |
1997 | ||
8 | John Hale, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems. DBSec 1997: 134-148 | |
7 | M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi: An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388 | |
6 | EE | John Hale, Sujeet Shenoi: Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. IEEE Symposium on Security and Privacy 1997: 188-199 |
1996 | ||
5 | EE | John Hale, Sujeet Shenoi: Analyzing FD Inference in Relational Databases. Data Knowl. Eng. 18(2): 167-183 (1996) |
1995 | ||
4 | Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi: A Tool for Inference Detection and Knowledge Discovery in Databases. DBSec 1995: 317-332 | |
1994 | ||
3 | Sandip Sen, Mahendra Sekaran, John Hale: Learning to Coordinate without Sharing Information. AAAI 1994: 426-431 | |
2 | John Hale, Jody Threet, Sujeet Shenoi: A Practical Formalism for Imprecise Inference Control. DBSec 1994: 139-156 | |
1 | EE | Arthur L. Corcoran, John Hale: A genetic algorithm for fragment allocation in a distributed database system. SAC 1994: 247-250 |