Writings

2013
Lee, H. (2013). 2013 Information Security Program for the Ministry of Justice, Province of British Columbia. A Ministry of Justice Program Plan.
Bailey, I., Lee, H. (2013). 2013 Information Security Program. Government Chief Information Security Officer's Strategic Plan.
2012
Office of the Chief Information Officer for the Province of British Columbia (2012). Information Security Policy V2.2. Government Policy.
2011
Hackett, S., Lee, H. (2011). 2011 Information Security Program. Government Chief Information Security Officer's Strategic Plan.
Office of the Chief Information Officer for the Province of British Columbia (2011). Information Security Policy V2.1. Government Policy.
Lee, H. (2011). eDiscovery. CIO Research Paper.
2010
Hackett, S., Lee, H. (2010). 2010 Information Security Program. Government Chief Information Security Officer's Strategic Plan.
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Security Policy V2.0. Government Policy.
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Incident Management Process. Government Standard.
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Security Classification Framework. Government Standard.
Office of the Chief Information Officer for the Province of British Columbia (2010). Information Security Classification Guidelines. Government Standard Guidelines.
Lee, H. (2010). Information incident investigations process. CIO Research Paper.
Lee, H. (2010). Information incident reporting process. CIO Research Paper.
Lee, H. (2010). Law-enforcement communication protocol process. CIO Research Paper.
2009
Lee, H. (2009). Practice of Information Security. Textbook. University of Victoria.
Office of the Chief Information Officer for the Province of British Columbia (2009). Cryptographic Standards for Information Protection. Government Standards.
Lee, H. (2009). An implementation scheme for the corporate information security classification. CIO Research Paper.
Lee, H. (2009). Roles and responsibilities of the Ministry Information Security Officers in the centralized security management. CIO Research Paper.
Lee, H. (2009). SANS Consensus Audit Guidelines. CIO Research Paper.
Lee, H. (2009). Security aspects of the government remote access services. CIO Research Paper.
Lee, H. (2009). Web 2.0 Security. CIO Research Paper.
2008
Lee, H. (2008). Advanced Topics in Information Security. Textbook. University of Victoria.
Office of the Chief Information Officer for the Province of British Columbia (2008). Information Security Policy V1.2. Government Policy.
Lee, H. (2008). Whistleblower protection and processes to make a disclosure. CIO Research Paper.
2007
Office of the Chief Information Officer for the Province of British Columbia (2007). Information Security Policy V1.1. Government Policy.
Lee, H. (2007). Responsibilities, Accountabilities, Consultation and Information (RACI) matrices of the Information Security Policy V1.0. CIO Research Paper.
Lee, H. (2007). Security Organization. CIO Research Paper.
Lee, H. (2007). BlackBerry's PIN-to-PIN communication capability. CIO Research Paper.
Lee, H. (2007). Instant messaging. CIO Research Paper.
2006
Lee, H. (2006). Roles and responsibilities grids of the Information Security Policy V1.0. CIO Research Paper.
Lee, H. (2006). Forensic investigations in encrypted environment. CIO Research Paper.
Lee, H. (2006). Future trends of security technologies. CIO Research Paper.
Lee, J.-H. (2006). Education and awareness on the Capability Maturity Model. CIO Research Paper.
2004
Lee, J.-H. (2004). 21 CFR Part 11 and FiloSAFE. FILOSAFE Corporation Technical Document FS-DES-121.
Lee, J.-H. (2004). Health Insurance Portability and Accountability Act (HIPAA) and FiloSAFE. FILOSAFE Corporation Technical Document FS-DES-120.
2003
Lee, J.-H. (2003). DOX general description: duty-oriented access control, delegation and credential handling. FILOSAFE Corporation Technical Document FS-DES-116.
Chung, H. Y., Lee, J.-H. (2003). Evaluations of Postgram. FILOSAFE Corporation Technical Document PG-DES-104.
Chung, H. Y., Lee, J.-H. (2003). Postgram: a revised user interface. FILOSAFE Corporation Technical Document PG-DES-105.
2002
Lee, J.-H. (2002). Security audit: a consulting methodology. FILOSAFE Corporation Technical Document CS-TM-106.
Chung, H. Y., Chang, H. W., Lee, J.-H. (2002). Postgram: the design. FILOSAFE Corporation Technical Document PG-DES-101.
Chung, H. Y., Lee, J.-H. (2002). Evaluation of FiloSAFE 3. FILOSAFE Corporation Technical Document FS-DES-111.
Chung, H. Y., Lee, J.-H. (2002). FiloSAFE 3 user interface description. FILOSAFE Corporation Technical Document FS-DES-109.
Chung, H. Y., Lee, J.-H. (2002). ShareDrive: the design concept. FILOSAFE Corporation Technical Document SD-DES-101.
Chung, H. Y., Lee, J.-H. (2002). ShareDrive: user interface design. FILOSAFE Corporation Technical Document SD-DES-102.
Chung, H. Y., Lee, J.-H. (2002). User-space analysis for FiloSAFE 3. FILOSAFE Corporation Technical Document FS-DES-110.
MacDorman, K. F., Lee, J.-H., Chang, C. (2002). FiloSAFE 3.3: client user's guide. FILOSAFE Corporation Technical Document FS-DES-108.
2001
Anderson, R. J., Stajano, F. & Lee, J.-H. (2001). Security policies. In Zelkowitz, M. V. (Ed.), Advances in Computers Vol. 55, pp. 185-235. London: Academic Press. ISBN 0-12-012155-7.
Lee, J.-H. (2001). A note on the Electronic Document Standard (EDS) for the Korea government standard document format. FILOSAFE Corporation Technical Document FS-DES-105.
Lee, J.-H. (2001). FiloSAFE 3 development milestones. FILOSAFE Corporation Technical Document FS-DES-101.
Lee, J.-H. (2001). FiloSAFE 3: solution overview. FILOSAFE Corporation Technical Document FS-DES-107.
Lee, J.-H. (2001). Knowledgenome system design. FILOSAFE Corporation Technical Document KG-DES-001.
Lee, J.-H., MacDorman, K. F., Rabinovich, I. (2001). FiloSAFE 3: system specifications. FILOSAFE Corporation Technical Document FS-DES-102.
2000
Lee, J.-H. (2000). Designing a reliable publishing framework. Computer Laboratory Technical Report 489. Cambridge: Cambridge University Computer Laboratory. ISSN 1476-2986 UCAM-CL-TR-489.
Anderson, R. J. & Lee, J.-H. (2000). Jikzi - a new framework for secure publishing. Security Protocols Workshop 1999 (Lecture Notes in Computer Science, Vol. 1796), pp. 21-47. Berlin: Springer. ISBN 3-540-67381-4.
Lee, J.-H. (2000). Fingerprinting. In Katzenbeisser, S. & Petitcolas, F. (Eds.), Information hiding techniques for steganography and digital watermarking, pp.175-190. Boston: Artech House. ISBN 1-58053-035-4.
Anderson, R. J. & Lee, J.-H. (2000). Jikzi - a new framework for security policy, trusted publishing and electronic commerce. Computer Communications, 23(17): 1621-1626.
1999
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Matyas Jr., V. & Petitcolas, F. (1999). The global Internet trust register 1999. Cambridge: MIT Press. ISBN 0-262-51105-3.
Lee, J.-H. (1999). Big brother ballot. Operating Systems Review, 33(3): 19-25.
Lee, J.-H. (1999). Anonymity revisited: the degree of the knowledge transfer. Cambridge.
1998
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Matyas Jr., V. & Petitcolas, F. (1998). The global trust register 1998. Cambridge: Northgate Consultants Ltd. ISBN 0-9532397-0-5.
Anderson, R. J., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R. M. (1998). A new family of authentication protocols. Operating Systems Review, 32(4): 9-20.
Lee, J.-H. (1998). A resilient access control scheme for secure electronic transactions. Proceedings of the 3rd USENIX Workshop on Electronic Commerce (pp. 75-82). August 31-September 3, 1998. Boston, MA, USA.
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Matyas Jr., V. & Petitcolas, F. (1998). The global trust register. Proceedings of Datasem '98 (pp. 219-241). October 1998. Brno, Czech Republic.
Lee, J.-H. (1998). A method for generating authentication key used for authentication center of digital mobile communication network (English translation of the Korean patent title). Patent Registration No. 10-0152393-0000, IPC Code H04L 9/32. June 26, 1998. Korea.
Lee, J.-H. (1998). A practical election scheme using the Guy Fawkes protocol and paired chaining publication. Cambridge.
Lee, J.-H. (1998). Comments on "Digital signature for Diffie-Hellman public keys without using a one-way function." Cambridge.
1997
Lee, J.-H. & Koo, Y.-H. (1997). Modern cryptology. Taejon: SOFTFORUM.
Anderson, R. J., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R. M. (1997). The Guy Fawkes Protocol. Recent Results Session of the 4th Fast Software Encryption Workshop. January 20-22, 1997. Haifa, Israel.
Lee, J.-H. (1997). A survey on IPSEC key management protocols. Cambridge.
Lee, J.-H. (1997). A personal information management scheme. Cambridge.
Lee, J.-H. (1997). A PIN management scheme based on the Needham's scheme. Cambridge.
1996
Lee, J.-H. (1996). Certifying authority in FPLMTS. Proceedings of the 2nd International Symposium on Multi-dimensional Mobile Communications. July 18-20, 1996. Seoul, Korea.
Lee, J.-H. (1996). Certifying authority-based FPLMTS authentication. Proceedings of IEEE International Conference on Communication Systems '96 (pp. 26.5.1-26.5.5). November 25-29, 1996. Singapore.
1995
Kang, Y., Guen, D., Kim, M., Kim, B. H., Kim, Y., Kim, J. H., Kim, E. A., Kim, C., Nam, Y. J., Park, J. Y., Shin, M. K., Shin, J. H., Yun, S. C., Lee, K., Lee, Y. S., Lee, J.-H., Lee, H., Lim, J. M., Jeon, J. H., Choi, M. J. & Hwang, I. Y. (1995). World Wide Web. Revised edition. Seoul: WWW Forum, Korea (WWW-KR).
1994
Lee, J.-H. & Lim, S. B. (1994). Multiple HLRs in PLMN/PCN. Proceedings of the 13th Joint Conference on Communications & Information. April 28-30, 1994. Chuncheon, Korea.
Kim, K. & Lee, J.-H. (1994). Media access control of ATM hub. Proceedings of the IEEE ICCCN'94. September 1994. San Francisco, CA, USA.
Lee, J.-H. (1994). Design of command interpreter block for system administration and maintenance. Electronics and Telecommunications Research Institute Technical Document HLRBLK644-220C.
Lee, J.-H. (1994). Home Location Register's operations and maintenance function specification. Electronics and Telecommunications Research Institute Technical Document HLR-SSB004-190A.
Lee, J.-H. (1994). User guide for form generator (command user interface). Electronics and Telecommunications Research Institute Technical Document HLRBLK650-140A.
1993
Lee, J.-H. (1993). Terminologies in differential geometry with special focus on differential topology, semi-Riemannian manifolds, relativity and gravitation. Taejon. (Note that the size of the pdf file is about 2.3 Mbytes.)
Lee, J.-H., Koo, Y.-H., Lim, S.-B. & Park, J.-W. (1993). Reduction of message exchange in HLR. 1993 Joint Technical Conference on Circuits/Systems, Computers and Communications. July 26-28, 1993. Nara, Japan.
Kim, K. & Lee, J.-H. (1993). Data communication over ATM networks. Proceedings of the 8th Joint Workshop on Computer Communications (E1-2-1-E1-2-5). December 10-11, 1993. Taipei, Taiwan.
Lee, J.-H. (1993). Design of form generator (command user interface). Electronics and Telecommunications Research Institute Technical Document HLRBLK644-220B.
Lee, J.-H. (1993). Design of man-machine-interface block. Electronics and Telecommunications Research Institute Technical Document TD93-7230-028.
Lee, J.-H. (1993). Design of security controller block. Electronics and Telecommunications Research Institute Technical Document HLRBLK645-220A.
1992
Lee, J.-H. (1992). On the operating system for home location register. Telecommunications Review, 2(6):24-35.
1991
Lee, J.-H. (1991). On the splittings of Lorentzian manifolds. Master's dissertation (Department of Mathematics). Pohang: Pohang University of Science and Technology.