John Hale - Faculty & Adjuncts

John Hale, PhD

John Hale, PhD
Chairperson of Computer Science
Tandy Professor of Bioinformatics and Computational Biology
College of Engineering & Natural Sciences
Computer Science
918-631-2745 Rayzor Hall Room 2115

Education

PhD – The University of Tulsa MS – The University of Tulsa BS – The University of Tulsa

Bio

John Hale is a founding member of the TU Institute of Bioinformatics and Computational Biology (IBCB), and a faculty research scholar in the Institute for Information Security  (iSec).  His research has been funded by the US Air Force, the National Science Foundation (NSF), the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the National Institute of Justice (NIJ).  These projects include research in the fields of information assurance and bioinformatics.  He has testified before Congress on three separate occasions as an information security expert, and in 2004 was awarded a patent on technology he co-developed to thwart digital piracy on file sharing networks.  In 2000, Hale earned a prestigious NSF CAREER award for his educational and research contributions to the field of information assurance.

Research Interests

Computational Biology
Bioinformatics
Neuroinformatics
Medical Informatics
Cyber Security
High Performance Computing
Formal Methods
Digital Humanities
Social Computing

Teaching Interests

Computer Architecture
Cyber Security
High Performance Computing
Computational Biology
Neuroinformatics
Medical Informatics

Publications

Journal Articles

  • Kong, Liang, Gavin Bauer, and John Hale. “Robust Wireless Signal Indoor Localization.” Concurrency and Computation: Practice and Experience 27.11 (2015): 2839–2850. Print.

  • *Staggs, J., *Beyer, R., *Mol, M., *Fisher, M., Brummel, B., & Hale, J. (2014). A perceptual taxonomy of contextual cues for cyber trust. Proceeding of the Colloquium for Information System Security Education (CISSE), 2, 152-169.

  • The Access of Things: Spatial Access Control for. Handbook of Research on Progressive Trends in Wireless Communications and Networking, 2014, p. 189.
  • Using Hybrid Attack Graphs to Model and Analyze Attacks Against the Critical Information Infrastructure. Critical Information Infrastructure Protection and Resilience in the ICT Sector, 2013, p. 173.
  • Matlock M., Schimke N., Kong L., Macke S., and Hale J. Systematic Redaction for Neuroimage Data. Vol. 3, International journal of computational models and algorithms in medicine, 2012.
  • Hawrylak P., Schimke N., Hale J., and Papa M. Security Risks Associated With Radio Frequency Identification in Medical Environments. Vol. 36, Journal of Medical Systems Special Issue on Radio Frequency Identification in the Healthcare Sector: Applications, Business Models, Drivers and Challenges, 2012, pp. 3491-05.
  • Schimke, Nakeisha, and John Hale. “Neuroimage Data Sets: Rethinking Privacy Policies.” Proceedings of the 3rd USENIX conference on Health Security and Privacy, USENIX Association (2012): 301–308. Print.

  • RFID in E-Health: Technology, Implementation. Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments, 2012, p. 347.
  • Kuehler M., Schimke N., and Hale J. Privacy Considerations for Electronic Health Records. Privacy protection measures and technologies in business organizations: Aspects and standards. IGI Global, 2011, pp. 210–226.
  • Schimke N., and Hale J. Quickshear Defacing for Neuroimages. Proceedings of the 2nd USENIX conference on Health security and privacy, 2011, pp. 11–11.
  • Roberts W., Johnson C., and Hale J. Transparent Emergency Data Destruction. Proceeding of the 5th International Conference Information Warfare and Security, 2010, p. 271.
  • Manes G., Johnson J., Barclay A., Harvey M., Downing E., and Hale J. Issues and Techniques for Redacting PDF Files. Vol. 2, Journal of Digital Forensic Practice, 2008, pp. 113–116.
  • Greer D., Mulenex J., Hale J., and Manes G. Education for Cyber Crime Investigators. Proceedings of the Conference on Digital Forensics, Security and Law, 2007, p. 139.
  • Hale J., and Brusil P. Secur (e/Ity) Management: A Continuing Uphill Climb. Vol. 15, Journal of Network and Systems Management, 2007, pp. 525–553.
  • Manes G., Watson L., Barclay A., Greer D., and Hale J. Towards Redaction of Digital Information from Electronic Devices. Proceedings of the Conference on Digital Forensics, Security and Law, 2007, pp. 197–203.
  • Kissinger A., and Hale J. Lopol: A Deductive Database Approach to Policy Analysis and Rewriting. 2006 Security Enhanced Linux Symposium, 2006.
  • Marks D., and Hale J. Security Service Packages: Partitioning the Security Space. Vol. 2, Journal of Information Privacy and Security, 2006, pp. 30–44.
  • Brusil P., Hale J., Kabay M., Padmavathi G., Annadurai S., Gaspary L., Meneghetti E., Dawkins J., Clark K., and Manes G. Forthcoming Contributions. Vol. 13, Journal of Network and Systems Management, 2005.
  • Brusil P., and Hale J. The Shifting Sands of Security Management. Vol. 13, Journal of Network and Systems Management, 2005, pp. 241–245.
  • 2004 Cumulative Index. Vol. 47, Business Horizons, 2004, p. 85.
  • Hale J., and Brusil P. Guest Editorial: Secur (e/Ity) Management: Two Sides of the Same Coin. Vol. 12, Journal of Network and Systems Management, 2004, pp. 1–8.
  • Susceptibility Audits: A Tool for Safeguarding Information Assets. Vol. 47, Business Horizons, 2004, pp. 59–66.
  • Hale J., Papa M., and Shenoi S. Programmable Access Control. Vol. 11, Journal of Computer Security, 2003, pp. 331–351.
  • Dawkins J., Campbell C., and Hale J. Modeling Network Attacks: Extending the Attack Tree Paradigm. Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, 2002, pp. 75–86.
  • Galiasso Paris P. A Policy Mediation Architecture for Multi-Enterprise Environments. The University of Tulsa, 2001.
  • Mauricio P., Bremer O., John H., and Shenoi S. Formal Analysis of E-Commerce Protocols. Vol. 84, IEICE TRANSACTIONS on Information and Systems, 2001, pp. 1313–1323.
  • Papa M., Bremer O., Hale J., and Shenoi S. IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems’ Assurance-PAPERS-Electronic Commerce-Formal Analysis of E-Commerce Protocols. Vol. 84, IEICE Transactions on Information and Systems, 2001, pp. 1313–1323.
  • Tidwell T., Larson R., Fitch K., and Hale J. Modeling Internet Attacks. Vol. 59, Proceedings of the 2001 IEEE Workshop on Information Assurance and security, 2001.
  • Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation. Vol. 2, Workshop on Information Assurance and Security, 2001, p. 1045.
  • Lorenz G., Moore T., Manes G., Hale J., and Shenoi S. “Securing Ss7 Telecommunications Networks”. Second IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2001.
  • Hale J., Threet J., and Shenoi S. A Ticket-Based Access Control Architecture for Object Systems. Vol. 8, Journal of Computer Security, 2000, pp. 43–65.
  • Lorenz G., Manes G., Hale J., Marks D., Davis K., and Shenoi S. Characterization of Attacks on Public Telephone Networks [4232-19]. PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING, 2000, pp. 93–103.
  • Jones C., Hall J., and Hale J. Secure Distributed Database Mining: Principles of Design. Advances in Distributed and Parallel Knowledge Discovery, 2000, pp. 277–294.
  • Bakken D., Karr D., Jones C., and Hale J. The Voting Virtual Machine: A Flexible Mechanism for Collating Replicated Client Requests and Server Replies. FTCS-29 FastAbstract Proceedings, IEEE, 1999.
  • Hale J. Thirteenth Annual IFIP Working Group 11.3 Conference on Database Security. 1999.
  • Hale J., Threet J., and Shenoi S. Capability-Based Primitives for Access Control in Object-Oriented Systems. Vol. 11, DATABASE SECURITY, 1998, pp. 134–150.
  • Threet J., Hale J., and Shenoi S. A Process Calculus for Distributed Objects. 1996.
  • Hale J., and Shenoi S. Analyzing FD Inference in Relational Databases. Vol. 18, Data & Knowledge Engineering, 1996, pp. 167–183.
  • Hale J. Seamless and Secure Interoperation of Heterogeneous Distributed Objects. 1996.
  • Hale J., and Shenoi S. Catalytic Inference Analysis Using Fuzzy Relations. Vol. 2, Proceedings of the 6th International Fuzzy Systems Association World Congress, IFSA, 1995, p. 413.
  • Hale J., Shenoi S., and Hall K. Imprecise Database Inference Using Functional Dependencies. Advances in fuzzy theory and technology, Duke University, 1995, pp. 307–326.
  • Schimke N., Kuehler M., and Hale J. On Resolving Privacy in Deidentified Neuroimages.
  • Louthan G., and Hale J. SAND: An Architecture for Signature-Based Automatic Network Protocol Detection.
  • Kong L., Hale J., and Greer D. Spatial Identity Awareness for Collaborative Environments.

Conference Proceedings

  • “Automatic Generation of Attack Scripts from Attack Graphs”. 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 267-74.
  • “Competitive Learning Environment for Cyber-Physical System Security Experimentation”. 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 211-8.
  • Introducing Priority into Hybrid Attack Graphs”. Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ACM, 2017, pp. 12:1–12:4.
  • Simulation and Analysis Framework for Cyber-Physical Systems”. Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ACM, 2017, pp. 7:1–7:4.
  • Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce”. Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact, ACM, 2017, pp. 53:1–53:4.
  • “Verifying Attack Graphs through Simulation”. 2017 Resilience Week (RWS), 2017, pp. 64-67.
  • Network Modeling for Security Analytics”. Proceedings of the 11th Annual Cyber and Information Security Research Conference, ACM, 2016, pp. 22:1–22:4.
  • Scalable Attack Graph Generation”. Proceedings of the 11th Annual Cyber and Information Security Research Conference, ACM, 2016, pp. 21:1–21:4.
  • Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

  • Hybrid Extensions for Stateful Attack Graphs”. Proceedings of the 9th Annual Cyber and Information Security Research Conference, ACM, 2014, pp. 101–104.
  • Kong, Liang, Gavin Bauer, and John Hale. “Location-Based Device Grouping for Function Restriction.” Proceedings of the 9th Annual Cyber and Information Security Research Conference. 2014. 113–116. Print.

  • Implementing Graceful RFID Privilege Reduction”. Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, ACM, 2013, pp. 54:1–54:4.
  • “Using Hybrid Attack Graphs to Model Cyber-Physical Attacks in the Smart Grid”. Resilient Control Systems (ISRCS), 2012 5th International Symposium on, 2012, pp. 161-4.
  • Graceful Privilege Reduction in RFID Security”. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, ACM, 2011, pp. 47:1–47:1.
  • Harbort Z., Louthan G., and Hale J. “Techniques for Attack Graph Visualization and Interaction”. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, p. 74.
  • Toward Hybrid Attack Dependency Graphs”. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, ACM, 2011, pp. 62:1–62:1.
  • Louthan G., Roberts W., Butler M., and Hale J. “The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness.”. CSET, 2010.
  • Gehres P., Singleton N., Louthan G., and Hale J. “Toward Sensitive Information Redaction in a Collaborative, Multilevel Security Environment”. Proceedings of the 6th International Symposium on Wikis and Open Collaboration, 2010, p. 15.
  • Louthan G., Deetz B., Walker M., and Hale J. “Content-Based Alternatives to Conventional Network Monitoring Systems”. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, 2009, p. 67.
  • Louthan G., McMillan C., Johnson C., and Hale J. “Toward Robust and Extensible Automatic Protocol Identification.”. International Conference on Internet Computing, 2009, pp. 104–108.
  • Clark K., Singleton E., Tyree S., and Hale J. “Strata-Gem: Risk Assessment through Mission Modeling”. Proceedings of the 4th ACM Workshop on Quality of Protection, 2008, pp. 51–58.
  • Manes G., Watson L., Downing E., Barclay A., Greer D., and Hale J. “A Framework for Redacting Digital Information from Electronic Devices”. Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC, 2007, pp. 56–60.
  • Clark K., Lee C., Tyree S., and Hale J. “Guiding Threat Analysis With Threat Source Models”. Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC, 2007, pp. 262–269.
  • Clark K., Dawkins J., and Hale J. “Security Risk Metrics: Fusing Enterprise Objectives and Vulnerabilities”. Information Assurance Workshop, 2005. IAW’05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 388–393.
  • Dawkins J., and Hale J. “A Systematic Approach to Multi-Stage Network Attack Analysis”. Information Assurance Workshop, 2004. Proceedings. Second IEEE International, 2004, pp. 48–56.
  • Clark K., Tyree S., Dawkins J., and Hale J. “Qualitative and Quantitative Analytical Techniques for Network Security Assessment”. Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, 2004, pp. 321–328.
  • Davis N., Holloway P., and Hale J. “SILT: Integrated Logging Management for Security-Enhanced Linux”. Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, 2004, pp. 298–305.
  • Manes G., Dawkins J., Shenoi S., and Hale J. “Identifying and Tracking Attacks on Networks: C3I Displays and Related Technologies”. AeroSense 2003, 2003, pp. 105–113.
  • Lorenz G., Manes G., Hale J., Marks D., Davis K., and Shenoi S. “Characterization of Attacks on Public Telephone Networks”. Enabling Technologies for Law Enforcement, 2001, pp. 93–103.
  • Lorenz G., Moore T., Manes G., Hale J., and Shenoi S. “Securing Ss7 Telecommunications Networks”. Second IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2001.
  • J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.

  • Sercel J., and Hale J. “A Strategy to Develop Robust Capabilities for Wireless Aerospace Expeditionary Force (AEF) C 3 I Requirements”. Aerospace Conference Proceedings, 2000 IEEE, Vol. 1, 2000, pp. 157–170.
  • Papa M., Bremer O., Chandia R., Hale J., and Shenoi S. “Extending Java for Package Based Access Control”. Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference, 2000, pp. 67–76.
  • Galiasso P., Bremer O., Hale J., Shenoi S., Ferraiola D., and Hu V. “Policy Mediation for Multi-Enterprise Environments”. Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference, 2000, pp. 100–106.
  • Hale J., Galiasso P., Papa M., and Shenoi S. “Security Policy Coordination for Heterogeneous Information Systems”. Acsac, 1999, p. 219.
  • Berryman M., Rummel C., Papa M., Hale J., Threet J., and Shenoi S. “An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects”. Proceedings of the IFIP TC11 WG11. 3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1997, pp. 385–388.
  • Hale J., and Shenoi S. “Catalytic Inference Analysis: Detecting Inference Threats Due to Knowledge Discovery”. Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, 1997, pp. 188–199.
  • Hale J., Threet J., and Shenoi S. “A Framework for High Assurance Security of Distributed Objects”. in Database Security, X: Status and Prospects, 1996.
  • Rath S., Jones D., Hale J., and Shenoi S. “A Tool for Inference Detection and Knowledge Discovery in Databases”. Proceedings of the Ninth Annual IFIP TC11 WG11. 3 Working Conference on Database Security IX: Status and Prospects: Status and Prospects, 1996, pp. 317–332.
  • Hale J., and Shenoi S. “Catalyzing Database Inference With Fuzzy Relations”. Uncertainty Modeling and Analysis, 1995, and Annual Conference of the North American Fuzzy Information Processing Society. Proceedings of ISUMA-NAFIPS’95., Third International Symposium on, 1995, pp. 408–413.
  • Corcoran A., and Hale J. “A Genetic Algorithm for Fragment Allocation in a Distributed Database System”. Proceedings of the 1994 ACM Symposium on Applied Computing, 1994, pp. 247–250.
  • Hale J., Threet J., and Shenoi S. “A Practical Formalism for Imprecise Inference Control”. Proceedings of the 8th IFIP WG11. 3 Workshop on Database Security, 1994.
  • Hale J., Finnerty S., and Shenoi S. “Analysing Inference in Fuzzy Database Systems”. Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference on, 1994, pp. 331–336.
  • Sen S., Sekaran M., and Hale J. “Learning to Coordinate Without Sharing Information”. AAAI, 1994, pp. 426–431.

Books

  • Atluri, Vijay, and John Hale. Research Advances in Database and Information Systems Security: IFIP TC11 WG11. 3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA. Vol. 43. Springer, 2013. Print.

  • Atluri V., and Hale J. Special Issue on Database Security. IOS Press, 2000.

Book Chapters

  • “Training Cyber Security Personnel”. The Psychosocial Dynamics of Cyber Security, Routledge, 2016, pp. 217–239.
  • Medical Data Privacy Handbook. Springer International Publishing, 2015, pp. 549–567.
  • “The Use of Body-Area Networks and Radio Frequency Identification in Healthcare”. Encyclopedia of Information Science and Technology, IGI Global, 2015, pp. 6318-26.
  • “The Access of Things: Spatial Access Control for the Internet of Things”. Handbook of Research on Progressive Trends in Wireless Communications and Networking, IGI Global, 2014, pp. 189-07.
  • Techniques to Model and Derive a Cyber-attacker’s Intelligence. Efficiency and Scalability Methods for Computational Intellect, 2013, pp. 162-80.
  • “RFID in E-Health: Technology, Implementation, and Security Issues”. Telemedicine and E-Health Services, Policies and Applications: Advancements and Developments, IGI Global, 2012, pp. 347-68.
  • “Security Issues for ISO 18000-6 Type C RFID: Identification and Solutions”. Developments in Wireless Network Prototyping, Design and Deployment: Future Generations, IGI Global, 2012, pp. 38-55.
  • Kong L., Hale J., and Greer D. “Spatial Identity Awareness: Towards Secure Collaborative Environments”. 2012 International Conference on Collaboration Technologies and Systems (CTS), 2012.
  • G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

  • Schimke N., Kuehler M., and Hale J. “Preserving Privacy in Structural Neuroimages”. Data and Applications Security and Privacy XXV, Springer Berlin Heidelberg, 2011, pp. 301–308.
  • Tyree S., Kuplicki R., Sarratt T., Fujan S., and Hale J. “GridSPiM: A Framework for Simple Locality and Containment in the Stochastic $π$-Calculus”. Bioinformatics and Computational Biology, Springer Berlin Heidelberg, 2009, pp. 409–423.
  • Barclay A., Watson L., Greer D., Hale J., and Manes G. “Redacting Digital Information from Electronic Devices”. Advances in Digital Forensics III, Springer New York, 2007, pp. 205–214.
  • Magill S., Skaggs B., Papa M., and Hale J. “Implementation and Verification of Programmable Security”. Research Directions in Data and Applications Security, Springer US, 2003, pp. 285–299.
  • Papa M., Bremer O., Hale J., and Shenoi S. “Integrating Logics and Process Calculi for Cryptographic Protocol Analysis”. Security and Privacy in the Age of Uncertainty, Springer US, 2003, pp. 349–360.
  • Campbell C., Dawkins J., Pollet B., Fitch K., Hale J., and Papa M. “On Modeling Computer Networks for Vulnerability Analysis”. Research Directions in Data and Applications Security, Springer US, 2003, pp. 233–244.
  • Lorenz G., Keller J., Manes G., Hale J., and Shenoi S. “Public Telephone Network Vulnerabilities”. Database and Application Security XV, Springer US, 2002, pp. 151–164.
  • Hale J., Chandia R., Campbell C., Papa M., and Shenoi S. “Language Extensions for Programmable Security”. Data and Application Security, Springer US, 2001, pp. 221–232.
  • Papa M., Bremer O., Magill S., Hale J., and Shenoi S. “Simulation and Analysis of Cryptographic Protocols”. Data and Application Security, Springer US, 2001, pp. 89–100.
  • Hale J., Papa M., and Shenoi S. “Programmable Security for Object-Oriented Systems”. Database Security XII, Springer US, 1999, pp. 109–123.

Technical Reports

  • Hale, John, Maurico Papa, and David Greer. Security Engineering and Educational Initiatives for Critical Information Infrastructures. TULSA UNIV OK, 2013. Print.

Other

  • Hale J., and Manes G. Method to Inhibit the Identification and Retrieval of Proprietary Media via Automated Search Engines Utilized in Association With Computer Compatible Communications Network. 2004.
  • Hale J. Light Propagation Extensions for Bidirectional Ray Tracing. University of Tulsa, 1992.

Courses Taught

  • Research and Thesis
  • Research and Dissertation
  • Independent Study
  • Computer Architecture, Organization and Assembler
  • High Performance Computing
  • Professional Ethics in the Information Age
  • Professional Ethics in the Information Age Lab
  • Information System Security Engineering
  • Computing Ethics Lab

Awards & Honors

  • Teaching Excellence Award
  • Kermit E. Brown Award for Teaching Excellence
  • Zelemir Schmidt Research Award