John Hale, PhD

John Hale, PhD
Tandy Professor of Bioinformatics and Computational Biology
College of Engineering & Natural Sciences
Computer Science
918-631-2745 Rayzor Hall Room 2150

Education

PhD – The University of Tulsa MS – The University of Tulsa BS – The University of Tulsa

Bio

John Hale is a founding member of the TU Institute of Bioinformatics and Computational Biology (IBCB), and a faculty research scholar in the Institute for Information Security  (iSec).  His research has been funded by the US Air Force, the National Science Foundation (NSF), the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the National Institute of Justice (NIJ).  These projects include research in the fields of information assurance and bioinformatics.  He has testified before Congress on three separate occasions as an information security expert, and in 2004 was awarded a patent on technology he co-developed to thwart digital piracy on file sharing networks.  In 2000, Hale earned a prestigious NSF CAREER award for his educational and research contributions to the field of information assurance.

Research Interests

Computational Biology
Bioinformatics
Neuroinformatics
Medical Informatics
Information Security
High-performance Computing
Formal Methods
Digital Humanities
Social Computing

Teaching Interests

Computer Architecture
Information Security
High-performance Computing
Computational Biology
Neuroinformatics
Medical Informatics
Enterprise Computing

Publications

Journal Articles

  • Kong, Liang, Gavin Bauer, and John Hale. “Robust Wireless Signal Indoor Localization.” Concurrency and Computation: Practice and Experience 27.11 (2015): 2839–2850. Print.

  • *Staggs, J., *Beyer, R., *Mol, M., *Fisher, M., Brummel, B., & Hale, J. (2014). A perceptual taxonomy of contextual cues for cyber trust. Proceeding of the Colloquium for Information System Security Education (CISSE), 2, 152-169.

  • The Access of Things: Spatial Access Control for. Handbook of Research on Progressive Trends in Wireless Communications and Networking, 2014, p. 189.
  • Using Hybrid Attack Graphs to Model and Analyze Attacks Against the Critical Information Infrastructure. Critical Information Infrastructure Protection and Resilience in the ICT Sector, 2013, p. 173.
  • Matlock, M., N. Schimke, L. Kong, S. Macke, and J. Hale. Systematic Redaction for Neuroimage Data. Vol. 3, International journal of computational models and algorithms in medicine, 2012.
  • Hawrylak, P., N. Schimke, J. Hale, and M. Papa. Security Risks Associated With Radio Frequency Identification in Medical Environments. Vol. 36, Journal of Medical Systems Special Issue on Radio Frequency Identification in the Healthcare Sector: Applications, Business Models, Drivers and Challenges, 2012, pp. 3491-05.
  • Schimke, Nakeisha, and John Hale. “Neuroimage Data Sets: Rethinking Privacy Policies.” Proceedings of the 3rd USENIX conference on Health Security and Privacy, USENIX Association (2012): 301–308. Print.

  • RFID in E-Health: Technology, Implementation. Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments, 2012, p. 347.
  • Kuehler, M., N. Schimke, and J. Hale. Privacy Considerations for Electronic Health Records. Privacy protection measures and technologies in business organizations: Aspects and standards. IGI Global, 2011, pp. 210–226.
  • Schimke, N., and J. Hale. Quickshear Defacing for Neuroimages. Proceedings of the 2nd USENIX conference on Health security and privacy, 2011, pp. 11–11.
  • Roberts, W., C. Johnson, and J. Hale. Transparent Emergency Data Destruction. Proceeding of the 5th International Conference Information Warfare and Security, 2010, p. 271.
  • Manes, G., J. Johnson, A. Barclay, M. Harvey, E. Downing, and J. Hale. Issues and Techniques for Redacting PDF Files. Vol. 2, Journal of Digital Forensic Practice, 2008, pp. 113–116.
  • Greer, D., J. Mulenex, J. Hale, and G. Manes. Education for Cyber Crime Investigators. Proceedings of the Conference on Digital Forensics, Security and Law, 2007, p. 139.
  • Hale, J., and P. Brusil. Secur (e/Ity) Management: A Continuing Uphill Climb. Vol. 15, Journal of Network and Systems Management, 2007, pp. 525–553.
  • Manes, G., L. Watson, A. Barclay, D. Greer, and J. Hale. Towards Redaction of Digital Information from Electronic Devices. Proceedings of the Conference on Digital Forensics, Security and Law, 2007, pp. 197–203.
  • Kissinger, A., and J. Hale. Lopol: A Deductive Database Approach to Policy Analysis and Rewriting. 2006 Security Enhanced Linux Symposium, 2006.
  • Marks, D., and J. Hale. Security Service Packages: Partitioning the Security Space. Vol. 2, Journal of Information Privacy and Security, 2006, pp. 30–44.
  • Brusil, P., J. Hale, M. Kabay, G. Padmavathi, S. Annadurai, L. Gaspary, E. Meneghetti, J. Dawkins, K. Clark, and G. Manes. Forthcoming Contributions. Vol. 13, Journal of Network and Systems Management, 2005.
  • Brusil, P., and J. Hale. The Shifting Sands of Security Management. Vol. 13, Journal of Network and Systems Management, 2005, pp. 241–245.
  • 2004 Cumulative Index. Vol. 47, Business Horizons, 2004, p. 85.
  • Hale, J., and P. Brusil. Guest Editorial: Secur (e/Ity) Management: Two Sides of the Same Coin. Vol. 12, Journal of Network and Systems Management, 2004, pp. 1–8.
  • Susceptibility Audits: A Tool for Safeguarding Information Assets. Vol. 47, Business Horizons, 2004, pp. 59–66.
  • Hale, J., M. Papa, and S. Shenoi. Programmable Access Control. Vol. 11, Journal of Computer Security, 2003, pp. 331–351.
  • Dawkins, J., C. Campbell, and J. Hale. Modeling Network Attacks: Extending the Attack Tree Paradigm. Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, 2002, pp. 75–86.
  • Galiasso Paris, P. A Policy Mediation Architecture for Multi-Enterprise Environments. The University of Tulsa, 2001.
  • Mauricio, P., O. Bremer, H. John, and S. Shenoi. Formal Analysis of E-Commerce Protocols. Vol. 84, IEICE TRANSACTIONS on Information and Systems, 2001, pp. 1313–1323.
  • Papa, M., O. Bremer, J. Hale, and S. Shenoi. IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems’ Assurance-PAPERS-Electronic Commerce-Formal Analysis of E-Commerce Protocols. Vol. 84, IEICE Transactions on Information and Systems, 2001, pp. 1313–1323.
  • Tidwell, T., R. Larson, K. Fitch, and J. Hale. Modeling Internet Attacks. Vol. 59, Proceedings of the 2001 IEEE Workshop on Information Assurance and security, 2001.
  • Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation. Vol. 2, Workshop on Information Assurance and Security, 2001, p. 1045.
  • Lorenz, G., T. Moore, G. Manes, J. Hale, and S. Shenoi. “Securing Ss7 Telecommunications Networks”. Second IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2001.
  • Hale, J., J. Threet, and S. Shenoi. A Ticket-Based Access Control Architecture for Object Systems. Vol. 8, Journal of Computer Security, 2000, pp. 43–65.
  • Lorenz, G., G. Manes, J. Hale, D. Marks, K. Davis, and S. Shenoi. Characterization of Attacks on Public Telephone Networks [4232-19]. PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING, 2000, pp. 93–103.
  • Jones, C., J. Hall, and J. Hale. Secure Distributed Database Mining: Principles of Design. Advances in Distributed and Parallel Knowledge Discovery, 2000, pp. 277–294.
  • Bakken, D., D. Karr, C. Jones, and J. Hale. The Voting Virtual Machine: A Flexible Mechanism for Collating Replicated Client Requests and Server Replies. FTCS-29 FastAbstract Proceedings, IEEE, 1999.
  • Hale, J. Thirteenth Annual IFIP Working Group 11.3 Conference on Database Security. 1999.
  • Hale, J., J. Threet, and S. Shenoi. Capability-Based Primitives for Access Control in Object-Oriented Systems. Vol. 11, DATABASE SECURITY, 1998, pp. 134–150.
  • Threet, J., J. Hale, and S. Shenoi. A Process Calculus for Distributed Objects. 1996.
  • Hale, J., and S. Shenoi. Analyzing FD Inference in Relational Databases. Vol. 18, Data & Knowledge Engineering, 1996, pp. 167–183.
  • Hale, J. Seamless and Secure Interoperation of Heterogeneous Distributed Objects. 1996.
  • Hale, J., and S. Shenoi. Catalytic Inference Analysis Using Fuzzy Relations. Vol. 2, Proceedings of the 6th International Fuzzy Systems Association World Congress, IFSA, 1995, p. 413.
  • Hale, J., S. Shenoi, and K. Hall. Imprecise Database Inference Using Functional Dependencies. Advances in fuzzy theory and technology, Duke University, 1995, pp. 307–326.
  • Schimke, N., M. Kuehler, and J. Hale. On Resolving Privacy in Deidentified Neuroimages.
  • Louthan, G., and J. Hale. SAND: An Architecture for Signature-Based Automatic Network Protocol Detection.
  • Kong, L., J. Hale, and D. Greer. Spatial Identity Awareness for Collaborative Environments.

Conference Proceedings

  • “Automatic Generation of Attack Scripts from Attack Graphs”. 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 267-74.
  • “Competitive Learning Environment for Cyber-Physical System Security Experimentation”. 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 211-8.
  • Introducing Priority into Hybrid Attack Graphs”. Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ACM, 2017, pp. 12:1–12:4.
  • Simulation and Analysis Framework for Cyber-Physical Systems”. Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ACM, 2017, pp. 7:1–7:4.
  • Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce”. Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact, ACM, 2017, pp. 53:1–53:4.
  • “Verifying Attack Graphs through Simulation”. 2017 Resilience Week (RWS), 2017, pp. 64-67.
  • Network Modeling for Security Analytics”. Proceedings of the 11th Annual Cyber and Information Security Research Conference, ACM, 2016, pp. 22:1–22:4.
  • Scalable Attack Graph Generation”. Proceedings of the 11th Annual Cyber and Information Security Research Conference, ACM, 2016, pp. 21:1–21:4.
  • Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

  • Hybrid Extensions for Stateful Attack Graphs”. Proceedings of the 9th Annual Cyber and Information Security Research Conference, ACM, 2014, pp. 101–104.
  • Kong, Liang, Gavin Bauer, and John Hale. “Location-Based Device Grouping for Function Restriction.” Proceedings of the 9th Annual Cyber and Information Security Research Conference. 2014. 113–116. Print.

  • Implementing Graceful RFID Privilege Reduction”. Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, ACM, 2013, pp. 54:1–54:4.
  • “Using Hybrid Attack Graphs to Model Cyber-Physical Attacks in the Smart Grid”. Resilient Control Systems (ISRCS), 2012 5th International Symposium on, 2012, pp. 161-4.
  • Graceful Privilege Reduction in RFID Security”. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, ACM, 2011, pp. 47:1–47:1.
  • Harbort, Z., G. Louthan, and J. Hale. “Techniques for Attack Graph Visualization and Interaction”. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, p. 74.
  • Toward Hybrid Attack Dependency Graphs”. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, ACM, 2011, pp. 62:1–62:1.
  • Louthan, G., W. Roberts, M. Butler, and J. Hale. “The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness.”. CSET, 2010.
  • Gehres, P., N. Singleton, G. Louthan, and J. Hale. “Toward Sensitive Information Redaction in a Collaborative, Multilevel Security Environment”. Proceedings of the 6th International Symposium on Wikis and Open Collaboration, 2010, p. 15.
  • Louthan, G., B. Deetz, M. Walker, and J. Hale. “Content-Based Alternatives to Conventional Network Monitoring Systems”. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, 2009, p. 67.
  • Louthan, G., C. McMillan, C. Johnson, and J. Hale. “Toward Robust and Extensible Automatic Protocol Identification.”. International Conference on Internet Computing, 2009, pp. 104–108.
  • Clark, K., E. Singleton, S. Tyree, and J. Hale. “Strata-Gem: Risk Assessment through Mission Modeling”. Proceedings of the 4th ACM Workshop on Quality of Protection, 2008, pp. 51–58.
  • Manes, G., L. Watson, E. Downing, A. Barclay, D. Greer, and J. Hale. “A Framework for Redacting Digital Information from Electronic Devices”. Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC, 2007, pp. 56–60.
  • Clark, K., C. Lee, S. Tyree, and J. Hale. “Guiding Threat Analysis With Threat Source Models”. Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC, 2007, pp. 262–269.
  • Clark, K., J. Dawkins, and J. Hale. “Security Risk Metrics: Fusing Enterprise Objectives and Vulnerabilities”. Information Assurance Workshop, 2005. IAW’05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 388–393.
  • Dawkins, J., and J. Hale. “A Systematic Approach to Multi-Stage Network Attack Analysis”. Information Assurance Workshop, 2004. Proceedings. Second IEEE International, 2004, pp. 48–56.
  • Clark, K., S. Tyree, J. Dawkins, and J. Hale. “Qualitative and Quantitative Analytical Techniques for Network Security Assessment”. Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, 2004, pp. 321–328.
  • Davis, N., P. Holloway, and J. Hale. “SILT: Integrated Logging Management for Security-Enhanced Linux”. Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, 2004, pp. 298–305.
  • Manes, G., J. Dawkins, S. Shenoi, and J. Hale. “Identifying and Tracking Attacks on Networks: C3I Displays and Related Technologies”. AeroSense 2003, 2003, pp. 105–113.
  • Lorenz, G., G. Manes, J. Hale, D. Marks, K. Davis, and S. Shenoi. “Characterization of Attacks on Public Telephone Networks”. Enabling Technologies for Law Enforcement, 2001, pp. 93–103.
  • Lorenz, G., T. Moore, G. Manes, J. Hale, and S. Shenoi. “Securing Ss7 Telecommunications Networks”. Second IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2001.
  • J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.

  • Sercel, J., and J. Hale. “A Strategy to Develop Robust Capabilities for Wireless Aerospace Expeditionary Force (AEF) C 3 I Requirements”. Aerospace Conference Proceedings, 2000 IEEE, Vol. 1, 2000, pp. 157–170.
  • Papa, M., O. Bremer, R. Chandia, J. Hale, and S. Shenoi. “Extending Java for Package Based Access Control”. Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference, 2000, pp. 67–76.
  • Galiasso, P., O. Bremer, J. Hale, S. Shenoi, D. Ferraiola, and V. Hu. “Policy Mediation for Multi-Enterprise Environments”. Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference, 2000, pp. 100–106.
  • Hale, J., P. Galiasso, M. Papa, and S. Shenoi. “Security Policy Coordination for Heterogeneous Information Systems”. Acsac, 1999, p. 219.
  • Berryman, M., C. Rummel, M. Papa, J. Hale, J. Threet, and S. Shenoi. “An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects”. Proceedings of the IFIP TC11 WG11. 3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1997, pp. 385–388.
  • Hale, J., and S. Shenoi. “Catalytic Inference Analysis: Detecting Inference Threats Due to Knowledge Discovery”. Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, 1997, pp. 188–199.
  • Hale, J., J. Threet, and S. Shenoi. “A Framework for High Assurance Security of Distributed Objects”. in Database Security, X: Status and Prospects, 1996.
  • Rath, S., D. Jones, J. Hale, and S. Shenoi. “A Tool for Inference Detection and Knowledge Discovery in Databases”. Proceedings of the Ninth Annual IFIP TC11 WG11. 3 Working Conference on Database Security IX: Status and Prospects: Status and Prospects, 1996, pp. 317–332.
  • Hale, J., and S. Shenoi. “Catalyzing Database Inference With Fuzzy Relations”. Uncertainty Modeling and Analysis, 1995, and Annual Conference of the North American Fuzzy Information Processing Society. Proceedings of ISUMA-NAFIPS’95., Third International Symposium on, 1995, pp. 408–413.
  • Corcoran, A., and J. Hale. “A Genetic Algorithm for Fragment Allocation in a Distributed Database System”. Proceedings of the 1994 ACM Symposium on Applied Computing, 1994, pp. 247–250.
  • Hale, J., J. Threet, and S. Shenoi. “A Practical Formalism for Imprecise Inference Control”. Proceedings of the 8th IFIP WG11. 3 Workshop on Database Security, 1994.
  • Hale, J., S. Finnerty, and S. Shenoi. “Analysing Inference in Fuzzy Database Systems”. Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference on, 1994, pp. 331–336.
  • Sen, S., M. Sekaran, and J. Hale. “Learning to Coordinate Without Sharing Information”. AAAI, 1994, pp. 426–431.

Books

  • Atluri, Vijay, and John Hale. Research Advances in Database and Information Systems Security: IFIP TC11 WG11. 3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA. Vol. 43. Springer, 2013. Print.

  • Atluri, V., and J. Hale. Special Issue on Database Security. IOS Press, 2000.

Book Chapters

  • “Training Cyber Security Personnel”. The Psychosocial Dynamics of Cyber Security, Routledge, 2016, pp. 217–239.
  • Medical Data Privacy Handbook. Springer International Publishing, 2015, pp. 549–567.
  • “The Use of Body-Area Networks and Radio Frequency Identification in Healthcare”. Encyclopedia of Information Science and Technology, IGI Global, 2015, pp. 6318-26.
  • “The Access of Things: Spatial Access Control for the Internet of Things”. Handbook of Research on Progressive Trends in Wireless Communications and Networking, IGI Global, 2014, pp. 189-07.
  • Techniques to Model and Derive a Cyber-attacker’s Intelligence. Efficiency and Scalability Methods for Computational Intellect, 2013, pp. 162-80.
  • “RFID in E-Health: Technology, Implementation, and Security Issues”. Telemedicine and E-Health Services, Policies and Applications: Advancements and Developments, IGI Global, 2012, pp. 347-68.
  • “Security Issues for ISO 18000-6 Type C RFID: Identification and Solutions”. Developments in Wireless Network Prototyping, Design and Deployment: Future Generations, IGI Global, 2012, pp. 38-55.
  • Kong, L., J. Hale, and D. Greer. “Spatial Identity Awareness: Towards Secure Collaborative Environments”. 2012 International Conference on Collaboration Technologies and Systems (CTS), 2012.
  • G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

  • Schimke, N., M. Kuehler, and J. Hale. “Preserving Privacy in Structural Neuroimages”. Data and Applications Security and Privacy XXV, Springer Berlin Heidelberg, 2011, pp. 301–308.
  • Tyree, S., R. Kuplicki, T. Sarratt, S. Fujan, and J. Hale. “GridSPiM: A Framework for Simple Locality and Containment in the Stochastic $π$-Calculus”. Bioinformatics and Computational Biology, Springer Berlin Heidelberg, 2009, pp. 409–423.
  • Barclay, A., L. Watson, D. Greer, J. Hale, and G. Manes. “Redacting Digital Information from Electronic Devices”. Advances in Digital Forensics III, Springer New York, 2007, pp. 205–214.
  • Magill, S., B. Skaggs, M. Papa, and J. Hale. “Implementation and Verification of Programmable Security”. Research Directions in Data and Applications Security, Springer US, 2003, pp. 285–299.
  • Papa, M., O. Bremer, J. Hale, and S. Shenoi. “Integrating Logics and Process Calculi for Cryptographic Protocol Analysis”. Security and Privacy in the Age of Uncertainty, Springer US, 2003, pp. 349–360.
  • Campbell, C., J. Dawkins, B. Pollet, K. Fitch, J. Hale, and M. Papa. “On Modeling Computer Networks for Vulnerability Analysis”. Research Directions in Data and Applications Security, Springer US, 2003, pp. 233–244.
  • Lorenz, G., J. Keller, G. Manes, J. Hale, and S. Shenoi. “Public Telephone Network Vulnerabilities”. Database and Application Security XV, Springer US, 2002, pp. 151–164.
  • Hale, J., R. Chandia, C. Campbell, M. Papa, and S. Shenoi. “Language Extensions for Programmable Security”. Data and Application Security, Springer US, 2001, pp. 221–232.
  • Papa, M., O. Bremer, S. Magill, J. Hale, and S. Shenoi. “Simulation and Analysis of Cryptographic Protocols”. Data and Application Security, Springer US, 2001, pp. 89–100.
  • Hale, J., M. Papa, and S. Shenoi. “Programmable Security for Object-Oriented Systems”. Database Security XII, Springer US, 1999, pp. 109–123.

Technical Reports

  • Hale, John, Maurico Papa, and David Greer. Security Engineering and Educational Initiatives for Critical Information Infrastructures. TULSA UNIV OK, 2013. Print.

Other

  • Hale, J., and G. Manes. Method to Inhibit the Identification and Retrieval of Proprietary Media via Automated Search Engines Utilized in Association With Computer Compatible Communications Network. 2004.
  • Hale, J. Light Propagation Extensions for Bidirectional Ray Tracing. University of Tulsa, 1992.

Courses Taught

  • Research and Dissertation
  • Research and Thesis
  • Professional Ethics in the Information Age
  • Professional Ethics in the Information Age Lab
  • Information System Security Engineering
  • Computing Ethics Lab
  • Independent Study
  • Computing Ethics
  • System Security and Cryptography
  • Computer Architecture, Organization and Assembler
  • High Performance Computing

Awards & Honors

  • Teaching Excellence Award
  • Kermit E. Brown Award for Teaching Excellence
  • Zelemir Schmidt Research Award