Bibliography
During my career, I have written (or co-authored) the following books, papers, presentations and articles...
Concept of Employment of the Single Information Environment, MDIS Project, February 2024
Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Jan 2024
Interoperability - Are we there yet? Blog Series, Nexor WWW. November 2023.
Secure by Design is Risky Business. Nexor White Paper, February 2023.
The Cloudy World of Secure Information Exchange. Nexor White Paper. November 2022
The Birds of Wollaton Park. Friends of Wollaton Park. August 2022.
ZeTruDE (Zero Trust Development Environment) — Architecture. Serapis Project AII69, May 2022 (co-author).
ZeTruDE (Zero Trust Development Environment) — Provenance Technologies. Serapis Project AII69, May 2022 (co-author).
Cross-Domain Security (for cloud platforms). Serapis Project AII33, November 2021.
Single Information Environment Communication Protocol (SCP) Specification. Serapis Project AII59, September 2021
Innovation in Secure Information Exchange, Nexor White Paper, March 2021
20/20 Vision is not all it is cracked up to be. Nexor Report, January 2021
Actionable advice to tackle threats for everyone with access to the network. SC Magazine. June 2020
Protecting Information in the CAV Domain. Nexor White Paper, April 2020
Being aware of Cyber Threats, Building Services and Environment Engineer. April 2020
What All Employees With Network Access Should Know About Cybersecurity. Supply Chain Brain. April 2020.
If an Employee has network access, they should be aware of threats. GPPR report April 2020
IoT Security - Autonomous Vehicles. BCS Webinar. March 2020.
Ensuring Cybersecurity Resilience with a Skilled Workforce, East Midlands Cyber Security Conference, January 2020
The Industrial Data Space – A Cloud Based Approach. Nexor. November 2019
Why you could risk your cyber security through the supply chain. Supply Chain Briefing. November 2019
All the links in your supply chain need to be secure against cyber attacks. Lodestar. Oct 2019
The print security blind spot. Brother. September 2019
Strong Cyber Security drives growth & innovation. Vodafone. 2019
Overcoming the safety and security barriers to autonomous vehicle deployment, IoT Security Foundation Conference, November 2018
Overcoming the safety and security barriers to autonomous vehicle deployment. Aesin. October 2018
The benefits of being a ‘cyber ready’ business. Nexor. Oct 2018
Deploying IEGs with greater flexibility and a reduced footprint through virtualisation technologies. Nexor. October 2017
Enabling Secure Information Exchange in Cloud Environments
Nexor WWW. March 2017Security professionals: the board is not the problem – we are. Security Solutions Magazine. August 2016
Achieving Cyber Essentials. (Public Presentation). East Midlands Cyber Security Conference and Expo. July 2016
Governance: The Role of the Board. (Public Presentation). East Midlands Cyber Security Conference and Expo. July 2016
The Importance of Cyber Hygiene. East Midlands Chambers Magazine. June 2016
Trustworthy Software. (Public Presentation). BCS Nottingham. Feb 2016
Cyber Essentials at Home. Smart Homes and Buildings Association. November 2015
Information Exchange Gateways - The Evolving Story. Nexor WWW May 2015
The Internet of Automotive Things - IISP Pulse Magazine. Spring 2015
Protecting confidential information using Data Diodes. Nexor / Fox WWW. July 2014
Preventing document-based malware from devasting your business. Nexor WWW. July 2013
Air-Gaps, Firewalls and Data Diodes in Industrial Control Systems. Nexor WWW. March 2013
Nexor Dinoto: A new approach to document tracking. Nexor WWW. Jan 2012
Preventing Data Leakage in Cloud Environments. Nexor WWW. May 2011
The Role of Virtualisation in Cross-Domain Solutions. Nexor WWW. March 2011
Data Labelling, NATO IA. 2009
Identity Federation in Government – An Opportunity for Privacy Enhancement? The EU e-Identity Management Conference, June 2009
Open Architecture for Advanced Data Guarding. RSA Europe, 2009
Service Provisioning between Fixed and Deployed Security Domains, Nexor, 2008
Using a Cell Process in a Data Guard Application. Nexor. December 2008.
Enabling Smart Cards in Multiple Security Domains. Nexor WWW. June 2008
The majority of Businesses still rely on passwords. SC Magazine. Sept 2007.
Should businesses back the UK National Identity Programme? Infosec conference. April 2007.
Virtual Directories. Siemens WWW. Infosec 2007
Databases - the easy way to harvest sensitive business data. Infosec 2007
Successfully deploying single sign-on (SSO) within an outsourced environment. Siemens WWW. 2006
PKI article contribution - SC Magazine, July 2007
The Defensive Security Trap. ECsoft WWW. March 2001.
Building Trust without Compromising Security, ECAF, Lisbon. March 2001
Managing Online Payments. Application Developer Advisor. Feb 2001
Implementing Inter-organisational Directories. EEMA Directory workshop, Munich. Oct 2000
LDAP Moving Forward: Business Applications. EEMA WWW. October 2000.
LDAP Moving Forward: Frequently Asked Questions. EEMA WWW. September 2000.
LDAP Moving Forward: RFCs and Internet-Drafts. EEMA WWW. October 2000.
Applying Knowledge Management to corporate email. EMA. April 2000.
E-Mail, Asset or Liability? NEXOR WWW, April 2000
Security Issues in High Assurance Systems. EMA, Sept 1999.
Secure Messaging using CASM. CESG Open Day. April 7th 1999.
Security Solutions in High Assurance Messaging Systems. NEXOR WWW. August 1999.
Security Issues in High Assurance Messaging Systems. NEXOR WWW. August 1999.
Using Artificial Intelligence to Provide Efficient Electronic Mail Routing. NEXOR WWW. June 1999.
The Role of Knowledge Management in E-Commerce. EEMA Paris, June 1999
Protecting the National Information Infrastructure. NEXOR WWW. February 1999.
Understanding LDAP and X.500. EEMA WWW. August 1997
Challenge ‘97. EEMA Annual Conference. Maastricht June 1997.
Building a Global Directory with X.500 and LDAP. EMA, Philadelphia. April 1997.
Intranet Security. DTI REGIS Project Technical Report. March 1997
Is your Email Secure. NEXOR WWW. February 1997.
Integrating X.500 with the WWW to provide a Regional Directory Service. NEXOR WWW. October 1996.
The LDAP String Representation of Attribute Syntaxes. RFC 1778, March 1995
Implementing X.500, Open Systems Newsletter, February 1995
Electronic Mail - is it secure? EEMA briefing, February 1995
Harmonisation, Synchronisation, Migration and Interworking with Non-X.500 Directories, Electronic Directories for European Administration Conference. EEMA, May 1995.
Deploying a Corporate Directory Service, EMA '95 Conference Proceedings Vol. II. May 1995.
Mail Security in Europe, EMA Update Magazine, Volume 2, No. 4. July 1994
MHS: use of the Directory to support distribution lists, INTERNET-DRAFT March 1994
A Survey of Current and Possible Future Uses of Directory Services. Journal of Information Networking, Volume 1 No. 3. ISSN 0966-9248.
You cannot promote OSI Applications over OSI Networks, CONNEXIONS, May 1993.
Implementing X.400 and X.500: The PP and QUIPU Systems, Part III "QUIPU Manual", Artech House, ISBN 0-89006-564-0
Managing the International X.500 Directory Pilot, Proceedings of EurOpen
Conference 1991.Distributed Operations in the Quipu Directory Service, Esprit Conference Week, 1990
Directory Navigation in the Quipu Directory System, UNIX & Connectivity November 1989
Colin's Bibliography
Distributed Operations in the Quipu Directory Service, Esprit Conference Week, 1988
Directory Navigation in the Quipu Directory System, UNIX & Connectivity November 1989
Managing the International X.500 Directory Pilot, EurOpen 1991 Proceedings.
ISODE Volume 5: The Quipu OSI Directory, June 1992.
Implementing X.400 and X.500: The PP and QUIPU Systems, Part III "QUIPU Manual", Artech House, ISBN 0-89006-564-0
An Aliasing Mechanism for Object Identifiers, Jan 1993, IETF OSI-DS 36
Directory technology is available NOW, EEMA Briefing April 1993
You cannot promote OSI Applications over OSI Networks, CONNEXIONS, May 1993.
A Survey of Current and Possible Future Uses of Directory Services, Journal of Information Networking, Volume 1 No. 3. ISSN 0966-9248.
Running OSI application over CLNS Networks, CONNEXIONS, Sept 1993
The X.500 String Representation of Standard Attribute Syntaxes, RFC 1488, June 1993
Future Directory Technology, Proceedings of EEMA Conference on Directories, Oct 1993.
MHS use of the Directory to support distribution lists, INTERNET-DRAFT March 1994
Monitoring Quality of Service in a Global Information Service, DANTE Report
Mail Security in Europe, EMA Update Magazine, Volume 2, No. 4. July 1994
Electronic Mail - is it secure? EEMA briefing, February 1995
Implementing X.500, Open Systems Newsletter, February 1995
Harmonisation, Synchronisation, Migration and Interworking with Non-X.500 Directories, Electronic Directories for European Administration Conference. EEMA, May 1995.
Deploying a Corporate Directory Service, EMA '95 Conference Proceedings Vol. II. May 1995.
Seminar: Directories & X.500 - The Corporate Decision, Business Transformation in the Information Society. EEMA, June 95.
Secure Multi-Media Mail on the Internet, Interop Paris, September 95.
FAQ On Security, EEMA, 1996
E-Mail Security Technology, EMA Anaheim, April 96.
Global E-Mail Security, EEMA Brussels, June 96.
The Role of Directory in Electronic Commerce, Electronic Commerce Conference, London October 96.