Colin Robbins’ Bibliography

During my career I have written (or co-authored) the following books, papers, presentations and articles…

  • The Cloudy World of Secure Information Exchange.  Nexor White Paper.  November 2022
  • The Birds of Wollaton ParkFriends of Wollaton Park. August 2022.
  • ZeTruDE (Zero Trust Development Environment) — Architecture.   Serapis Project AII69, May 2022 (co-author).
  • ZeTruDE (Zero Trust Development Environment) — Provenance Technologies.   Serapis Project AII69, May 2022 (co-author).
  • Cross-Domain Security (for cloud platforms).  Serapis Project AII33, November 2021.
  • Single Information Environment Communication Protocol (SCP) Specification.  Serapis Project AII59, September 2021
  • Innovation in Secure Information Exchange, Nexor White Paper, March 2021
  • 20/20 Vision is not all it is cracked up to be.  Nexor Report, January 2021
  • Actionable advice to tackle threats for everyone with access to the network. SC Magazine. June 2020
  • Protecting Information in the CAV Domain.   Nexor White Paper, April 2020
  • Being aware of Cyber Threats, Building Services and Environment Engineer. April 2020
  • What All Employees With Network Access Should Know About Cybersecurity. Supply Chain Brain. April 2020.
  • If an Employee has network access, they should be aware of threats.  GPPR report April 2020
  • IoT Security – Autonomous Vehicles.   BCS Webinar.   March 2020.
  • Ensuring Cybersecurity Resilience with a Skilled Workforce,  East Midlands Cyber Security Conference, January 2020
  • The Industrial Data Space – A Cloud Based Approach.  Nexor.  November 2019
  • Why you could risk your cyber security through the supply chain.  Supply Chain Briefing.  November 2019
  • All the links in your supply chain need to be secure against cyber attacks.  Lodestar.  Oct 2019
  • The print security blind spot.   Brother.  September 2019
  • Strong Cyber Security drives growth & innovation. Vodafone.  2019
  • Overcoming the safety and security barriers to autonomous vehicle deployment, IoT Security Foundation Conference, November 2018
  • Overcoming the safety and security barriers to autonomous vehicle deployment . Aesin.  October 2018
  • The benefits of being a ‘cyber ready’ business.  Nexor.  Oct 2018
  • Deploying IEGs with greater flexibility and a reduced footprint through virtualisation technologies. Nexor. October 2017
  • Enabling Secure Information Exchange in Cloud Environments
    Nexor WWW.  March 2017
  • Security professionals: the board is not the problem – we are.  Security Solutions Magazine.  August 2016
  • Achieving Cyber Essentials.   (Public Presentation). East Midlands Cyber Security Conference and Expo.  July 2016
  • Governance: The Role of the Board.   (Public Presentation). East Midlands Cyber Security Conference and Expo.  July 2016
  • The Importance of Cyber Hygiene.   East Midlands Chambers Magazine.   June 2016
  • Trustworthy Software.   (Public Presentation). BCS Nottingham.  Feb 2016
  • Cyber Essentials at Home.  Smart Homes and Buildings Association.  November 2015
  • Information Exchange Gateways – The Evolving Story. Nexor WWW  May 2015
  • The Internet of Automotive Things – IISP Pulse Magazine. Spring 2015
  • Protecting confidential information using Data Diodes.  Nexor / Fox WWW.  July 2014
  • Preventing document-based malware from devasting your business.  Nexor WWW. July 2013
  • Air-Gaps, Firewalls and Data Diodes in Industrial Control Systems.  Nexor WWW.  March 2013
  • Nexor Dinoto: A new approach to document tracking. Nexor WWW. Jan 2012
  • Preventing Data Leakage in Cloud Environments. Nexor WWW. May 2011
  • The Role of Virtualisation in Cross-Domain Solutions. Nexor WWW. March 2011
  • Data Labelling, NATO IA. 2009
  • Identity Federation in Government – An Opportunity for Privacy Enhancement? The EU e-Identity Management Conference, June 2009
  • Open Architecture for Advanced Data Guarding . RSA Europe, 2009
  • Service Provisioning between Fixed and Deployed Security Domains, Nexor, 2008
  • Using a Cell Process in a Data Guard Application. Nexor. December 2008.
  • Enabling Smart Cards in Multiple Security Domains. Nexor WWW. June 2008
  • Majority of Business still reply on passwords. SC Magazine.  Sept 2007.
  • Should businesses back the UK National Identity Programme? Infosec conference. April 2007.
  • Virtual Directories. Siemens WWW. Infosec 2007
  • Databases – the easy way to harvest sensitive business data. Infosec 2007
  • Successfully deploying single sign-on (SSO) within an outsourced environment. Siemens WWW. 2006
  • PKI article contribution – SC Magazine, July 2007
  • The Defensive Security Trap. ECsoft WWW. March 2001.
  • Building Trust without Compromising Security, ECAF, Lisbon. March 2001
  • Managing Online Payments. Application Developer Advisor. Feb 2001
  • Implementing Inter-organisational Directories. EEMA Directory workshop, Munich. Oct 2000
  • LDAP Moving Forward: Business Applications. EEMA WWW. October 2000.
  • LDAP Moving Forward: Frequently Asked Questions. EEMA WWW. September 2000.
  • LDAP Moving Forward: RFC’s and Internet-Drafts. EEMA WWW. October 2000.
  • Applying Knowledge Management to corporate email. EMA. April 2000.
  • E-Mail, Asset or Liability? NEXOR WWW, April 2000
  • Security Issues in High Assurance Systems. EMA, Sept 1999.
  • Secure Messaging using CASM. CESG Open Day. April 7th 1999.
  • Security Solutions in High Assurance Messaging Systems. NEXOR WWW. August 1999.
  • Security Issues in High Assurance Messaging Systems. NEXOR WWW. August 1999.
  • Using Artificial Intelligence to Provide Efficient Electronic Mail Routing. NEXOR WWW. June 1999.
  • The Role of Knowledge Management in E-Commerce. EEMA Paris, June 1999
  • Protecting the National Information Infrastructure. NEXOR WWW. February 1999.
  • Understanding LDAP and X.500. EEMA WWW. August 1997
  • Challenge ‘97. EEMA Annual Conference. Maastricht June 1997.
  • Building a Global Directory with X.500 and LDAP. EMA, Philadelphia. April 1997.
  • Intranet Security. DTI REGIS Project Technical Report. March 1997
  • Is your Email Secure. NEXOR WWW. February 1997.
  • Integrating X.500 with the WWW to provide a Regional Directory Service. NEXOR WWW. October 1996.
  • The LDAP String Representation of Attribute Syntaxes. RFC 1778, March 1995
  • Implementing X.500, Open Systems Newsletter, February 1995
  • Electronic Mail – is it secure? EEMA briefing, February 1995
  • Harmonisation, Synchronisation, Migration and Interworking with Non-X.500 Directories, Electronic Directories for European Administration Conference. EEMA, May 1995.
  • Deploying a Corporate Directory Service, EMA ’95 Conference Proceedings Vol. II. May 1995.
  • Mail Security in Europe, EMA Update Magazine, Volume 2, No. 4. July 1994
  • MHS ;use of the Directory to support distribution lists, INTERNET-DRAFT March 1994
  • A Survey of Current and Possible Future Uses of Directory Services. Journal of Information Networking, Volume 1 No. 3. ISSN 0966-9248.
  • You cannot promote OSI Applications over OSI Networks, CONNEXIONS, May 1993.
  • Implementing X.400 and X.500: The PP and QUIPU Systems, Part III “QUIPU Manual”, Artech House, ISBN 0-89006-564-0
  • Managing the International X.500 Directory Pilot, Proceedings of EurOpen
    Conference 1991.
  • Distributed Operations in the Quipu Directory Service, Esprit Conference Week, 1990
  • Directory Navigation in the Quipu Directory System, UNIX & Connectivity November 1989
  • Colin’s Bibliography
  • Distributed Operations in the Quipu Directory Service, Esprit Conference Week, 1988
  • Directory Navigation in the Quipu Directory System, UNIX & Connectivity November 1989
  • Managing the International X.500 Directory Pilot, EurOpen 1991 Proceedings.
  • ISODE Volume 5: The Quipu OSI Directory, June 1992.
  • Implementing X.400 and X.500: The PP and QUIPU Systems, Part III “QUIPU Manual”, Artech House, ISBN 0-89006-564-0
  • An Aliasing Mechanism for Object Identifiers, Jan 1993, IETF OSI-DS 36
  • Directory technology is available NOW, EEMA Briefing April 1993
  • You cannot promote OSI Applications over OSI Networks, CONNEXIONS, May 1993.
  • A Survey of Current and Possible Future Uses of Directory Services, Journal of Information Networking, Volume 1 No. 3. ISSN 0966-9248.
  • Running OSI application over CLNS Networks, CONNEXIONS, Sept 1993
  • The X.500 String Representation of Standard Attribute Syntaxes, RFC 1488, June 1993
  • Future Directory Technology, Proceedings of EEMA Conference on Directories, Oct 1993.
  • MHS use of the Directory to support distribution lists, INTERNET-DRAFT March 1994
  • Monitoring Quality of Service in a Global Information Service, DANTE Report
  • Mail Security in Europe, EMA Update Magazine, Volume 2, No. 4. July 1994
  • Electronic Mail – is it secure? EEMA breifing, February 1995
  • Implementing X.500, Open Systems Newsletter, February 1995
  • Harmonisation, Synchronisation, Migration and Interworking with Non-X.500 Directories, Electronic Directories for European Administration Conference. EEMA, May 1995.
  • Deploying a Corporate Directory Service, ,EMA ’95 Conference Proceedings Vol. II. May 1995.
  • Seminar: Directories & X.500 – The Corporate Decision, Business Transformation in the Information Society. EEMA, June 95.
  • Secure Multi-Media Mail on the Internet, Interop Paris, September 95.
  • FAQ On Security, EEMA, 1996
  • E-Mail Security Technology, EMA Aneheim, April 96.
  • Global E-Mail Security, EEMA Brussels, June 96.
  • The Role of Directory in Electronic Commerce, Electronic Commerce Conference, London October 96.
Advertisement