|
Search the dblp DataBase
John Hale:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sandip Sen, Mahendra Sekaran, John Hale
Learning to Coordinate without Sharing Information. [Citation Graph (0, 0)][DBLP] AAAI, 1994, pp:426-431 [Conf]
- John Hale, Izhak Shafran, Lisa Yung, Bonnie J. Dorr, Mary P. Harper, Anna Krasnyanskaya, Matthew Lease, Yang Liu, Brian Roark, Matthew G. Snover, Robin Stewart
PCFGs with Syntactic and Prosodic Indicators of Speech Repairs. [Citation Graph (0, 0)][DBLP] ACL, 2006, pp:- [Conf]
- John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:219-228 [Conf]
- John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:67-76 [Conf]
- Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:100-106 [Conf]
- Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa
On Modeling Computer Networks for Vulnerability Analysis. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:233-244 [Conf]
- M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:385-388 [Conf]
- John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi
Language Extensions for Programmable Security. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:221-232 [Conf]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:109-123 [Conf]
- John Hale, Jody Threet, Sujeet Shenoi
A Practical Formalism for Imprecise Inference Control. [Citation Graph (0, 0)][DBLP] DBSec, 1994, pp:139-156 [Conf]
- John Hale, Jody Threet, Sujeet Shenoi
Capability-Based Primitives for Access Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:134-148 [Conf]
- J. Halle, Jody Threet, Sujeet Shenoi
A Framework for High Assurance Security of Distributed Objects. [Citation Graph (0, 0)][DBLP] DBSec, 1996, pp:101-119 [Conf]
- G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi
Public Telephone Network Vulnerabilities. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:151-164 [Conf]
- Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:285-299 [Conf]
- Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:89-100 [Conf]
- Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi
A Tool for Inference Detection and Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:317-332 [Conf]
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
Formal Analysis of E-Commerce Protocols. [Citation Graph (0, 0)][DBLP] ISADS, 2001, pp:19-28 [Conf]
- Jerald Dawkins, John Hale
A Systematic Approach to Multi-Stage Network Attack Analysis. [Citation Graph (0, 0)][DBLP] IWIA, 2004, pp:48-58 [Conf]
- John Hale
A Probabilistic Earley Parser as a Psycholinguistic Model. [Citation Graph (0, 0)][DBLP] NAACL, 2001, pp:- [Conf]
- Arthur L. Corcoran, John Hale
A genetic algorithm for fragment allocation in a distributed database system. [Citation Graph (0, 0)][DBLP] SAC, 1994, pp:247-250 [Conf]
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:349-360 [Conf]
- John Hale, Sujeet Shenoi
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:188-199 [Conf]
- John Hale, Sujeet Shenoi
Analyzing FD Inference in Relational Databases. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 1996, v:18, n:2, pp:167-183 [Journal]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Access Control. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
- John Hale, Jody Threet, Sujeet Shenoi
A Ticket-Based Access Control Architecture for Object Systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]
- John Hale, Paul Brusil
Secur(e/ity) Management: Two Sides of the Same Coin. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
- Paul Brusil, John Hale
The Shifting Sands of Security Management. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2005, v:13, n:3, pp:241-245 [Journal]
- John Hale
Book Review. [Citation Graph (0, 0)][DBLP] Journal of Logic, Language and Information, 2007, v:16, n:2, pp:217-220 [Journal]
Strata-Gem: risk assessment through mission modeling. [Citation Graph (, )][DBLP]
Toward Robust and Extensible Automatic Protocol Identification. [Citation Graph (, )][DBLP]
Redacting Digital Information from Electronic Devices. [Citation Graph (, )][DBLP]
Heuristic search in a cognitive model of human parsing. [Citation Graph (, )][DBLP]
Toward sensitive information redaction in a collaborative, multilevel security environment. [Citation Graph (, )][DBLP]
GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|