The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John Hale: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sandip Sen, Mahendra Sekaran, John Hale
    Learning to Coordinate without Sharing Information. [Citation Graph (0, 0)][DBLP]
    AAAI, 1994, pp:426-431 [Conf]
  2. John Hale, Izhak Shafran, Lisa Yung, Bonnie J. Dorr, Mary P. Harper, Anna Krasnyanskaya, Matthew Lease, Yang Liu, Brian Roark, Matthew G. Snover, Robin Stewart
    PCFGs with Syntactic and Prosodic Indicators of Speech Repairs. [Citation Graph (0, 0)][DBLP]
    ACL, 2006, pp:- [Conf]
  3. John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
    Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:219-228 [Conf]
  4. John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
    Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:67-76 [Conf]
  5. Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
    Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:100-106 [Conf]
  6. Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa
    On Modeling Computer Networks for Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:233-244 [Conf]
  7. M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
    An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:385-388 [Conf]
  8. John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi
    Language Extensions for Programmable Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:221-232 [Conf]
  9. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:109-123 [Conf]
  10. John Hale, Jody Threet, Sujeet Shenoi
    A Practical Formalism for Imprecise Inference Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:139-156 [Conf]
  11. John Hale, Jody Threet, Sujeet Shenoi
    Capability-Based Primitives for Access Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:134-148 [Conf]
  12. J. Halle, Jody Threet, Sujeet Shenoi
    A Framework for High Assurance Security of Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:101-119 [Conf]
  13. G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi
    Public Telephone Network Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:151-164 [Conf]
  14. Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
    Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:285-299 [Conf]
  15. Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
    Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:89-100 [Conf]
  16. Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi
    A Tool for Inference Detection and Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:317-332 [Conf]
  17. Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
    Formal Analysis of E-Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ISADS, 2001, pp:19-28 [Conf]
  18. Jerald Dawkins, John Hale
    A Systematic Approach to Multi-Stage Network Attack Analysis. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:48-58 [Conf]
  19. John Hale
    A Probabilistic Earley Parser as a Psycholinguistic Model. [Citation Graph (0, 0)][DBLP]
    NAACL, 2001, pp:- [Conf]
  20. Arthur L. Corcoran, John Hale
    A genetic algorithm for fragment allocation in a distributed database system. [Citation Graph (0, 0)][DBLP]
    SAC, 1994, pp:247-250 [Conf]
  21. Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
    Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:349-360 [Conf]
  22. John Hale, Sujeet Shenoi
    Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:188-199 [Conf]
  23. John Hale, Sujeet Shenoi
    Analyzing FD Inference in Relational Databases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:18, n:2, pp:167-183 [Journal]
  24. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Access Control. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
  25. John Hale, Jody Threet, Sujeet Shenoi
    A Ticket-Based Access Control Architecture for Object Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]
  26. John Hale, Paul Brusil
    Secur(e/ity) Management: Two Sides of the Same Coin. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
  27. Paul Brusil, John Hale
    The Shifting Sands of Security Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:3, pp:241-245 [Journal]
  28. John Hale
    Book Review. [Citation Graph (0, 0)][DBLP]
    Journal of Logic, Language and Information, 2007, v:16, n:2, pp:217-220 [Journal]

  29. Strata-Gem: risk assessment through mission modeling. [Citation Graph (, )][DBLP]


  30. Toward Robust and Extensible Automatic Protocol Identification. [Citation Graph (, )][DBLP]


  31. Redacting Digital Information from Electronic Devices. [Citation Graph (, )][DBLP]


  32. Heuristic search in a cognitive model of human parsing. [Citation Graph (, )][DBLP]


  33. Toward sensitive information redaction in a collaborative, multilevel security environment. [Citation Graph (, )][DBLP]


  34. GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.325secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002