google-plus
utulsa.edu

John Hale PhD

Professor of Computer Science and Tandy Professor of Bioinformatics and Computational Biology College of Engineering & Natural Sciences
Tandy School of Computer Science
918-631-2745
john-hale@utulsa.edu
faculty-photo

Biography

John Hale is a founding member of the TU Institute of Bioinformatics and Computational Biology (IBCB), and a faculty research scholar in the Institute for Information Security  (iSec).  His research has been funded by the US Air Force, the National Science Foundation (NSF), the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the National Institute of Justice (NIJ).  These projects include research in the fields of information assurance and bioinformatics.  He has testified before Congress on three separate occasions as an information security expert, and in 2004 was awarded a patent on technology he co-developed to thwart digital piracy on file sharing networks.  In 2000, Hale earned a prestigious NSF CAREER award for his educational and research contributions to the field of information assurance.



Ph.D., The University of Tulsa
M.S., The University of Tulsa
B.S., The University of Tulsa


Computational Biology
Bioinformatics
Neuroinformatics
Medical Informatics
Information Security
High-performance Computing
Formal Methods
Digital Humanities
Social Computing

Computer Architecture
Information Security
High-performance Computing
Computational Biology
Neuroinformatics
Medical Informatics
Enterprise Computing


The following may be selected publications rather than a comprehensive list.

Journal Articles


Kong, Liang, Gavin Bauer, and John Hale. “Robust Wireless Signal Indoor Localization.” Concurrency and Computation: Practice and Experience 27.11 (2015): 2839–2850. Print.

Hawrylak, Peter et al. “The Access of Things: Spatial Access Control For.” Handbook of Research on Progressive Trends in Wireless Communications and Networking (2014): 189. Print.

*Staggs, J., *Beyer, R., *Mol, M., *Fisher, M., Brummel, B., & Hale, J. (2014). A perceptual taxonomy of contextual cues for cyber trust. Proceeding of the Colloquium for Information System Security Education (CISSE), 2, 152-169.

Hawrylak, Peter et al. “Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure.” Critical Information Infrastructure Protection and Resilience in the ICT Sector (2013): 173. Print.

Hawrylak, Peter et al. “Security Risks Associated with Radio Frequency Identification in Medical Environments.” Journal of Medical Systems Special Issue on Radio Frequency Identification in the Healthcare Sector: Applications, Business Models, Drivers and Challenges 36.6 (2012): 3491–3505. Print.

Hawrylak, Peter et al. “Security Risks Associated with Radio Frequency Identification in Medical Environments.” Journal of medical systems 36.6 (2012): 3491–3505. Print.

Hawrylak, Peter et al. “RFID in E-Health: Technology, Implementation.” Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments (2012): 347. Print.

Matlock, Matt et al. “Systematic Redaction for Neuroimage Data.” International journal of computational models and algorithms in medicine 3.2 (2012): n. pag. Print.

Schimke, Nakeisha, and John Hale. “Neuroimage Data Sets: Rethinking Privacy Policies.” Proceedings of the 3rd USENIX conference on Health Security and Privacy, USENIX Association (2012): 301–308. Print.

Schimke, Nakeisha, and John Hale. “Quickshear Defacing for Neuroimages.” Proceedings of the 2nd USENIX conference on Health security and privacy (2011): 11–11. Print.

Kuehler, Mary, Nakeisha Schimke, and John Hale. “Privacy Considerations for Electronic Health Records.” Privacy protection measures and technologies in business organizations: Aspects and standards. IGI Global (2011): 210–226. Print.

Roberts, Warren, Christopher Johnson, and John Hale. “Transparent Emergency Data Destruction.” Proceeding of the 5th International Conference Information Warfare and Security (2010): 271. Print.

Manes, Gavin et al. “Issues and Techniques for Redacting PDF Files.” Journal of Digital Forensic Practice 2.3 (2008): 113–116. Print.

Hale, John, and Paul Brusil. “Secur (e/Ity) Management: A Continuing Uphill Climb.” Journal of Network and Systems Management 15.4 (2007): 525–553. Print.

Greer, David et al. “Education for Cyber Crime Investigators.” Proceedings of the Conference on Digital Forensics, Security and Law (2007): 139. Print.

Manes, Gavin et al. “Towards Redaction of Digital Information from Electronic Devices.” Proceedings of the Conference on Digital Forensics, Security and Law (2007): 197–203. Print.

Marks, Donald, and John Hale. “Security Service Packages: Partitioning the Security Space.” Journal of Information Privacy and Security 2.4 (2006): 30–44. Print.

Kissinger, Aleks, and John Hale. “Lopol: A Deductive Database Approach to Policy Analysis and Rewriting.” 2006 Security Enhanced Linux Symposium (2006): n. pag. Print.

Brusil, Paul et al. “Forthcoming Contributions.” Journal of Network and Systems Management 13.2 (2005): n. pag. Print.

Brusil, Paul, and John Hale. “The Shifting Sands of Security Management.” Journal of Network and Systems Management 13.3 (2005): 241–245. Print.

Hale, John, Timothy Landry, and Charles Wood. “Susceptibility Audits: A Tool for Safeguarding Information Assets.” Business Horizons 47.3 (2004): 59–66. Print.

Hale, John, and Paul Brusil. “Guest Editorial: Secur (e/Ity) Management: Two Sides of the Same Coin.” Journal of Network and Systems Management 12.1 (2004): 1–8. Print.

Boyd, Thomas et al. “2004 Cumulative Index.” Business Horizons 47.3 (2004): 85. Print.

Hale, John, Mauricio Papa, and Sujeet Shenoi. “Programmable Access Control.” Journal of Computer Security 11.3 (2003): 331–351. Print.

Dawkins, J, C Campbell, and John Hale. “Modeling Network Attacks: Extending the Attack Tree Paradigm.” Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection (2002): 75–86. Print.

Tidwell, Terry et al. “Modeling Internet Attacks.” Proceedings of the 2001 IEEE Workshop on Information Assurance and security 59 (2001): n. pag. Print.

Papa, Mauricio et al. “IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems’ Assurance-PAPERS-Electronic Commerce-Formal Analysis of E-Commerce Protocols.” IEICE Transactions on Information and Systems 84.10 (2001): 1313–1323. Print.

Galiasso Paris, Pablo. “A Policy Mediation Architecture for Multi-Enterprise Environments.” The University of Tulsa (2001): n. pag. Print.

Mauricio, PAPA et al. “Formal Analysis of e-Commerce Protocols.” IEICE TRANSACTIONS on Information and Systems 84.10 (2001): 1313–1323. Print.

Lorenz, G et al. “Securing ss7 Telecommunications Networks.” Workshop on Information Assurance and Security 2 (2001): 273–278. Print.

Meehan, A et al. “Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation.” Workshop on Information Assurance and Security 2 (2001): 1045. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “A Ticket-Based Access Control Architecture for Object Systems.” Journal of Computer Security 8.1 (2000): 43–65. Print.

Jones, Chris, John Hall, and John Hale. “Secure Distributed Database Mining: Principles of Design.” Advances in Distributed and Parallel Knowledge Discovery (2000): 277–294. Print.

Lorenz, GV et al. “Characterization of Attacks on Public Telephone Networks [4232-19].” PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING (2000): 93–103. Print.

Bakken, D et al. “The Voting Virtual Machine: A Flexible Mechanism for Collating Replicated Client Requests and Server Replies.” FTCS-29 FastAbstract Proceedings, IEEE (1999): n. pag. Print.

Hale, John. “Thirteenth Annual IFIP Working Group 11.3 Conference on Database Security.” (1999): n. pag. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “Capability-Based Primitives for Access Control in Object-Oriented Systems.” DATABASE SECURITY 11 (1998): 134–150. Print.

Threet, Jody, John Hale, and Sujeet Shenoi. “A Process Calculus for Distributed Objects.” (1996): n. pag. Print.

Hale, John, and Sujeet Shenoi. “Analyzing FD Inference in Relational Databases.” Data & Knowledge Engineering 18.2 (1996): 167–183. Print.

Hale, John. “Seamless and Secure Interoperation of Heterogeneous Distributed Objects.” (1996): n. pag. Print.

Hale, John, and Sujeet Shenoi. “Catalytic Inference Analysis Using Fuzzy Relations.” Proceedings of the 6th International Fuzzy Systems Association World Congress, IFSA 2 (1995): 413. Print.

Hale, John, Sujeet Shenoi, and Keplinger Hall. “Imprecise Database Inference Using Functional Dependencies.” Advances in fuzzy theory and technology, Duke University (1995): 307–326. Print.

Kong, Liang, John Hale, and David Greer. “Spatial Identity Awareness for Collaborative Environments.” (2017): n. pag. Print.

Schimke, Nakeisha, Mary Kuehler, and John Hale. “On Resolving Privacy in Deidentified Neuroimages.” (2017): n. pag. Print.

Louthan, G, and John Hale. “SAND: An Architecture for Signature-Based Automatic Network Protocol Detection.” (2017): n. pag. Print.

Book Chapters


Brummel, Bradley, John Hale, and Matthew. Mol. “Training Cyber Security Personnel.” The Psychosocial Dynamics of Cyber Security. Routledge, 2016. 217–239. Print.

Hawrylak, Peter, and John Hale. “The Use of Body-Area Networks and Radio Frequency Identification in Healthcare.” Encyclopedia of Information Science and Technology. Ed. M. Khosrow-Pour. IGI Global, 2015. 6318–6326. Print.

Hawrylak, Peter, and John Hale. “Medical Data Privacy Handbook.” Ed. Aris Gkoulalas-Divanis and Grigorios Loukides. Springer International Publishing, 2015. 549–567. Print.

Hawrylak, Peter et al. “The Access of Things: Spatial Access Control for the Internet of Things.” Handbook of Research on Progressive Trends in Wireless Communications and Networking. Ed. M. A. Matin. IGI Global, 2014. 189–207. Print.

Hawrylak, Peter et al. “Techniques to Model and Derive a Cyber-Attacker’s Intelligence.” Ed. Boris Igelnik and Jacek Zurada. Efficiency and Scalability Methods for Computational Intellect, 2013. 162–180. Print.

Hawrylak, Peter, John Hale, and Mauricio Papa. “Security Issues for ISO 18000-6 Type C RFID: Identification and Solutions.” Developments in Wireless Network Prototyping, Design and Deployment: Future Generations. Ed. M. A. Matin. IGI Global, 2012. 38–55. Print.

Hawrylak, Peter et al. “RFID in E-Health: Technology, Implementation, and Security Issues.” Telemedicine and E-Health Services, Policies and Applications: Advancements and Developments. Ed. Isabel de la Torre Díez Joel J. P. C. Rodrigues and Beatriz Sainz de Abajo. IGI Global, 2012. 347–368. Print.

Kong, Liang, John Hale, and David Greer. “Spatial Identity Awareness: Towards Secure Collaborative Environments.” 2012 International Conference on Collaboration Technologies and Systems (CTS). 2012. Print.

G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

Schimke, Nakeisha, Mary Kuehler, and John Hale. “Preserving Privacy in Structural Neuroimages.” Data and Applications Security and Privacy XXV. Springer Berlin Heidelberg, 2011. 301–308. Print.

Tyree, Stephen et al. “GridSPiM: A Framework for Simple Locality and Containment in the Stochastic $π$-Calculus.” Bioinformatics and Computational Biology. Springer Berlin Heidelberg, 2009. 409–423. Print.

Barclay, Alex et al. “Redacting Digital Information from Electronic Devices.” Advances in Digital Forensics III. Springer New York, 2007. 205–214. Print.

Papa, Mauricio et al. “Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.” Security and Privacy in the Age of Uncertainty. Springer US, 2003. 349–360. Print.

Magill, Stephen et al. “Implementation and Verification of Programmable Security.” Research Directions in Data and Applications Security. Springer US, 2003. 285–299. Print.

Campbell, Clinton et al. “On Modeling Computer Networks for Vulnerability Analysis.” Research Directions in Data and Applications Security. Springer US, 2003. 233–244. Print.

Lorenz, G et al. “Public Telephone Network Vulnerabilities.” Database and Application Security XV. Springer US, 2002. 151–164. Print.

Hale, John et al. “Language Extensions for Programmable Security.” Data and Application Security. Springer US, 2001. 221–232. Print.

Papa, Mauricio et al. “Simulation and Analysis of Cryptographic Protocols.” Data and Application Security. Springer US, 2001. 89–100. Print.

Hale, John, Mauricio Papa, and Sujeet Shenoi. “Programmable Security for Object-Oriented Systems.” Database Security XII. Springer US, 1999. 109–123. Print.

Books


Atluri, Vijay, and John Hale. Research Advances in Database and Information Systems Security: IFIP TC11 WG11. 3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA. Vol. 43. Springer, 2013. Print.

Atluri, Vijay, and John Hale. Special Issue on Database Security. IOS Press, 2000. Print.

Technical Report


Hale, John, Maurico Papa, and David Greer. Security Engineering and Educational Initiatives for Critical Information Infrastructures. TULSA UNIV OK, 2013. Print.

Conference Proceedings


Hill, Z. et al. “Verifying Attack Graphs through Simulation.” 2017 Resilience Week (RWS). 2017. 64–67. Print.

Hill, Zachary et al. “Simulation and Analysis Framework for Cyber-Physical Systems.” Proceedings of the 12th Annual Conference on Cyber and Information Security Research. ACM, 2017. 7:1–7:4. Print.

Nichols, W. et al. “Introducing Priority into Hybrid Attack Graphs.” Proceedings of the 12th Annual Conference on Cyber and Information Security Research. ACM, 2017. 12:1–12:4. Print.

Hawrylak, Peter, John Hale, and Mauricio Papa. “Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.” Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact. ACM, 2017. 53:1–53:4. Print.

Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

Smith, Bailey et al. “Network Modeling for Security Analytics.” Proceedings of the 11th Annual Cyber and Information Security Research Conference. ACM, 2016. 22:1–22:4. Print.

Cook, Kyle et al. “Scalable Attack Graph Generation.” Proceedings of the 11th Annual Cyber and Information Security Research Conference. ACM, 2016. 21:1–21:4. Print.

Kong, Liang, Gavin Bauer, and John Hale. “Location-Based Device Grouping for Function Restriction.” Proceedings of the 9th Annual Cyber and Information Security Research Conference. 2014. 113–116. Print.

Louthan, George et al. “Hybrid Extensions for Stateful Attack Graphs.” Proceedings of the 9th Annual Cyber and Information Security Research Conference. ACM, 2014. 101–104. Print.

Butler, Matthew et al. “Implementing Graceful RFID Privilege Reduction.” Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. ACM, 2013. 54:1–54:4. Print.

Hawrylak, P.J. et al. “Using Hybrid Attack Graphs to Model Cyber-Physical Attacks in the Smart Grid.” Resilient Control Systems (ISRCS), 2012 5th International Symposium On. 2012. 161–164. Print.

Louthan, George et al. “Toward Hybrid Attack Dependency Graphs.” Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. ACM, 2011. 62:1–62:1. Print.

Harbort, Zach, George Louthan, and John Hale. “Techniques for Attack Graph Visualization and Interaction.” Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 2011. 74. Print.

Butler, Matthew, Peter Hawrylak, and John Hale. “Graceful Privilege Reduction in RFID Security.” Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. ACM, 2011. 47:1–47:1. Print.

Louthan, George et al. “The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness.” CSET. 2010. Print.

Gehres, Peter et al. “Toward Sensitive Information Redaction in a Collaborative, Multilevel Security Environment.” Proceedings of the 6th International Symposium on Wikis and Open Collaboration. 2010. 15. Print.

Louthan, George et al. “Toward Robust and Extensible Automatic Protocol Identification.” International Conference on Internet Computing. 2009. 104–108. Print.

Louthan, George et al. “Content-Based Alternatives to Conventional Network Monitoring Systems.” Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. 2009. 67. Print.

Clark, Kevin et al. “Strata-Gem: Risk Assessment through Mission Modeling.” Proceedings of the 4th ACM Workshop on Quality of Protection. 2008. 51–58. Print.

Clark, K et al. “Guiding Threat Analysis with Threat Source Models.” Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC. 2007. 262–269. Print.

Manes, Gavin et al. “A Framework for Redacting Digital Information from Electronic Devices.” Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC. 2007. 56–60. Print.

Clark, K, J Dawkins, and John Hale. “Security Risk Metrics: Fusing Enterprise Objectives and Vulnerabilities.” Information Assurance Workshop, 2005. IAW’05. Proceedings from the Sixth Annual IEEE SMC. 2005. 388–393. Print.

Clark, Kevin et al. “Qualitative and Quantitative Analytical Techniques for Network Security Assessment.” Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC. 2004. 321–328. Print.

Davis, Nicholas, Perry Holloway, and John Hale. “SILT: Integrated Logging Management for Security-Enhanced Linux.” Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC. 2004. 298–305. Print.

Dawkins, Jerald, and John Hale. “A Systematic Approach to Multi-Stage Network Attack Analysis.” Information Assurance Workshop, 2004. Proceedings. Second IEEE International. 2004. 48–56. Print.

Manes, Gavin et al. “Identifying and Tracking Attacks on Networks: C3I Displays and Related Technologies.” AeroSense 2003. 2003. 105–113. Print.

Lorenz, Gary et al. “Securing SS7 Telecommunications Networks.” Second IEEE Systems, Man and Cybernetics Information Assurance Workshop. 2001. Print.

J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.

Lorenz, Gary et al. “Characterization of Attacks on Public Telephone Networks.” Enabling Technologies for Law Enforcement. 2001. 93–103. Print.

Sercel, Jonathan, and Jim Hale. “A Strategy to Develop Robust Capabilities for Wireless Aerospace Expeditionary Force (AEF) C 3 I Requirements.” Aerospace Conference Proceedings, 2000 IEEE. Vol. 1. 2000. 157–170. Print.

Galiasso, Pablo et al. “Policy Mediation for Multi-Enterprise Environments.” Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference. 2000. 100–106. Print.

Papa, Mauricio et al. “Extending Java for Package Based Access Control.” Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference. 2000. 67–76. Print.

Hale, John et al. “Security Policy Coordination for Heterogeneous Information Systems.” Acsac. 1999. 219. Print.

Berryman, M et al. “An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.” Proceedings of the IFIP TC11 WG11. 3 Eleventh International Conference on Database Securty XI: Status and Prospects. 1997. 385–388. Print.

Hale, John, and Sujeet Shenoi. “Catalytic Inference Analysis: Detecting Inference Threats Due to Knowledge Discovery.” Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium On. 1997. 188–199. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “A Framework for High Assurance Security of Distributed Objects.” In Database Security, X: Status and Prospects. 1996. Print.

Rath, Surath et al. “A Tool for Inference Detection and Knowledge Discovery in Databases.” Proceedings of the Ninth Annual IFIP TC11 WG11. 3 Working Conference on Database Security IX: Status and Prospects: Status and Prospects. 1996. 317–332. Print.

Hale, John, and Sujeet Shenoi. “Catalyzing Database Inference with Fuzzy Relations.” Uncertainty Modeling and Analysis, 1995, and Annual Conference of the North American Fuzzy Information Processing Society. Proceedings of ISUMA-NAFIPS’95., Third International Symposium On. 1995. 408–413. Print.

Hale, John, Scott Finnerty, and Sujeet Shenoi. “Analysing Inference in Fuzzy Database Systems.” Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference On. 1994. 331–336. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “A Practical Formalism for Imprecise Inference Control.” Proceedings of the 8th IFIP WG11. 3 Workshop on Database Security. 1994. Print.

Sen, Sandip et al. “Learning to Coordinate without Sharing Information.” AAAI. 1994. 426–431. Print.

Corcoran, Arthur, and John Hale. “A Genetic Algorithm for Fragment Allocation in a Distributed Database System.” Proceedings of the 1994 ACM Symposium on Applied Computing. 1994. 247–250. Print.

Others


Hale, John, and Gavin Manes. “Method to Inhibit the Identification and Retrieval of Proprietary Media via Automated Search Engines Utilized in Association with Computer Compatible Communications Network.” (2004): n. pag. Print.

Hale, John. “Light Propagation Extensions for Bidirectional Ray Tracing.” University of Tulsa (1992): n. pag. Print.


CS 2033 Computer Architecture, Organization and Assembler
CS 3861 Special Topics in Computer Science
CS 4373 High Performance Computing
CS 6653 Medical Informatics
CS 7183 Information System Security Engineering
CS 7463 Enterprise Security Management
CS 9983 Research and Dissertation