Strathprints logo
Strathprints Home | Open Access | Browse | Search | User area | Copyright | Help | Library Home | SUPrimo

Browse by Author or Creator

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Item type | No Grouping
Number of items: 52.

Article

English, C. and Terzis, S. and Nixon, P. (2005) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Personal and Ubiquitous Computing, 10 (1). ISSN 1617-4909

Terzis, Sotirios and Nixon, Paddy and Narasimhan, Nitya and Walsh, Tim (2005) Middleware for pervasive and ad-hoc computing. Personal and Ubiquitous Computing, 9 (6). ISSN 1617-4909

Cahill, V. and Gray, E. and Seigneur, J.M. and Jensen, C. and Chen, Y. and Shand, B. and Dimmock, N. and Twigg, A. and Bacon, J. and English, C. and Wagealla, W. and Terzis, S. and Nixon, P. and Serugendo, G. and Bryce, C. and Carbone, M. and Krukow, K. and Nielsen, M. (2003) Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing, 2 (3). pp. 52-61. ISSN 1536-1268

Kapidakis, S. and Terzis, S. and Sairamesh, J. (2000) A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries. International Journal on Digital Libraries, 3 (1). pp. 19-35. ISSN 1432-5012

Book

Terzis, Sotirios and Veiga, L., eds. (2010) Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010). ACM Press. ISBN 978-1-4503-0451-1

Veiga, L. and Donsez, D. and Riva, O. and Terzis, S., eds. (2009) International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2009). ACM Proceedings Series . ACM, New York, NY, USA.

Terzis, S., ed. (2008) 6th International Workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2008). ACM Proceedings Series . ACM, New York, NY, USA. ISBN 978-1-60558-364-8

Meier, R. and Terzis, S., eds. (2008) Distributed Applications and Interoperable Systems (DAIS 2008). LNCS, 5053 . Springer. ISBN 978-3-540-68639-2

Terzis, S. and Neely, S. and Narasimhan, N., eds. (2007) 5th International workshop on middleware for pervasive and ad-hoc computing (MPAC 2007). ACM Proceedings Series . ACM. ISBN 978-1-59593-930-2

Terzis, S., ed. (2006) 4th International workshop on middleware for pervasive and ad-hoc computing (MPAC 2006). ACM Proceedings Series, 182 . ACM, New York, NY, USA. ISBN 1-59593-421-9

Terzis, S. and Donsez, D., eds. (2005) 3rd International workshop on middleware for pervasive and ad-hoc computing (MPAC 2005). ACM Proceedings Series . ACM, New York, NY, USA. ISBN 1-59593-268-2

Nixon, Patrick and Terzis, Sotirios (2003) Trust management. Lecture Notes in Computer Science . Springer-Verlag Berlin, Heidelberg. ISBN 9783540402244

Book Section

Vella, Mark Joseph and Terzis, Sortirios and Roper, Marc (2012) Distress detection. In: Research in Attacks, Intrusions, and Defenses. Lecture Notes in Computer Science . Springer, pp. 384-385. ISBN 978-3-642-33337-8

Thomson, Graham and Terzis, Sortirios (2012) A middleware for pervasive situation-awareness. In: Distributed Applications and Interoperable Systems. Springer: Lecture Notes in Computer Science, pp. 148-161. ISBN 9783642308222

Nosseir, A. and Terzis, Sotirios (2011) Novice user perception of e-services : a study in the Egyptian public sector. In: Applied electrical engineering and computing technologies. IEEE, New York, pp. 1-6. ISBN 9781457710834

Nosseir, A. and Terzis, Sotirios (2011) Towards authentication via selected extraction from electronic personal histories. In: Enterprise Information Systems. Lecture Notes in Business Information Processing, 73 . Springer, pp. 571-586. ISBN 9783642198014

Nosseir, A. and Terzis, S. (2010) A study in authentication via electronic personal history questions. In: Proceedings of the 12th International Conference on Enterprise Information Systems. UNSPECIFIED, pp. 63-70.

Vella, M. and Roper, M. and Terzis, S. (2010) Danger theory and intrusion detection : possibilities and limitations of the analogy. In: Artificial Immune Systems. Lecture Notes in Computer Science . Springer, pp. 276-289. ISBN 978-3-642-14546-9

English, C. and Terzis, S. (2006) Gathering experience in trust-based interactions. In: Proceedings of 4th International Conference on Trust Management. Lecture Notes in Computer Science . Springer, pp. 62-76. ISBN 3540342958

Nosseir, A. and Connor, R. and Revie, C. and Terzis, S. (2006) Question-based authentication using context data. In: Proceedings of the 4th Nordic Conference on Human-Computer Interaction: Changing Roles. ACM International Conference Proceeding Series, 189 . ACM Press, Oslo, Norway, pp. 429-432. ISBN 1-59593-325-5

Thomson, G. and Terzis, S. and Nixon, P. (2006) Situation determination with reusable situation specifications. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2006. IEEE, pp. 620-623. ISBN 0769525202

Thomson, G. and Stevenson, G. and Terzis, S. and Nixon, P. (2006) A self-managing infrastructure for ad-hoc situation determination. In: Smart Homes and Beyond - ICOST2006 4th International Conference On Smart homes and health Telematics. Assistive Technology Research Series . IOS Press, pp. 157-164. ISBN 978-1-58603-623-2

Thomson, G. and Nixon, P. and Terzis, S. (2005) Situation determination with distributed context histories. In: Proceedings of 1st International Workshop on Exploiting Context Histories in Smart Environments. IEEE, Munich, Germany.

Terzis, S. and Wagealla, W. and English, C. and Nixon, P. (2005) Trust lifecycle management in a global computing environment. In: Global Computing. Lecture Notes in Computer Science, 3267/2005 . Springer, pp. 291-313. ISBN 978-3-540-24101-0

Nixon, P. and Wagealla, W. and English, C. and Terzis, S. (2004) Privacy, Security, and Trust Issues in Smart Environments. In: Smart Environments: Technology, Protocols and Applications. Wiley, London, UK, pp. 220-240. ISBN 978-0-471-54448-7

English, C. and Wagealla, W. and Nixon, P. and Terzis, S. and McGettrick, A. and Lowe, H. (2003) Trusting collaboration in global computing systems. In: Trust Management. Lecture Notes in Computer Science, 2692 . Springer, pp. 136-149. ISBN 978-3-540-40224-4

Terzis, S. and Nixon, P. and Wade, V. and Dobson, S. and Fuller, J. (2000) The future of enterprise groupware applications. In: Enterprise Information Systems. Kluwer Academic Publishers, pp. 99-106. ISBN 978-0-7923-6239-5

Terzis, S. and Nixon, P. (1999) Semantic trading: tackling interoperability problems during system integration. In: Object-Oriented Technology. ECOOP'99 Workshop Reader: ECOOP'99 Workshops, Panels, and Posters, Lisbon, Portugal, June 1999. Proceedings. Lecture Notes in Computer Science, 1743/1999 . Universidad de Malaga, pp. 35-42.

Conference or Workshop Item

Terzis, Sotirios and Nosseir, A. (2011) Novice user perception of e-services : a study in the Egyptian public sector. In: IEEE Conference on Applied Electrical Engineering and Computing Technologies (AEECT 2011), 2011-12-06 - 2011-12-08, Amman. (In Press)

Thomson, Graham and Terzis, Sotirios and Nixon, Paddy (2006) A model and architecture for situation determination. In: 16th Annual International Conference on Computer Science and Software Engineering (CASCON), 2006-10-16 - 2006-10-19, Toronto, Canada.

English, C. and Terzis, S. and Wagealla, W. (2004) Engineering trust based collaborations in a global computing environment. In: Second International Conference on Trust Management, 2004-03-29 - 2004-04-01, Oxford.

Thomson, G. and Nixon, P. and Terzis, S. (2004) Towards ad-hoc situation determination. In: First International Workshop on Advanced Context Modelling, Reasoning And Management, 2004-01-01, Nottingham, England.

Terzis, S. (2004) Trust lifecycle management in ad-hoc collaborations. In: Second UK-UbiNet Workshop, 2004-05-05 - 2004-05-07, Cambridge.

UNSPECIFIED (2003) Proceedings of the 1st international workshop on middleware for pervasive and ad hoc computing (MPAC). In: 1st international workshop on middleware for pervasive and ad hoc computing (MPAC), 2003-01-01 - 2003-01-01, Rio de Janeiro.

Glassey, R. and Stevenson, G. and Richmond, M. and Nixon, P. and Terzis, S. and Wang, F. and Ferguson, R.I. (2003) Towards a middleware for generalised context management. In: First International Workshop on Middleware for Pervasive and Ad Hoc Computing, Middleware 2003, 2003-06-17, Rio de Janeiro, Brazil.

Thomson, G. and Richmond, M. and Terzis, S. and Nixon, P. (2003) An Approach to dynamic context discovery and composition. In: Proceedings of UbiSys '03, System Support for Ubiquitous Computing Workshop, 2003-01-01, Seattle, USA.

Wagealla, W. and Terzis, S. and English, C. and Nixon, P. (2003) On trust and privacy in context-aware systems. In: Second Internal iTrust Workshop On Trust Management In Dynamic Open Systems, 2002-09-15 - 2002-09-17, Glasgow.

Thomson, G. and Terzis, S. and Nixon, P. (2003) Towards dynamic context discovery and composition. In: 1st UK-UbiNet Workshop, 2003-09-25 - 2003-09-26, London, England.

English, C. and Wagealla, W. and Terzis, S. and Lowe, H. and McGettrick, A. and Nixon, P. (2003) Trust dynamics for collaborative global computing. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-2003): Eighth International Workshop on Enabling Technologies, 2003-06-09 - 2003-06-11, Linz, Austria.

Wagealla, W. and Terzis, S. and English, C. (2003) Trust-based model for privacy control in context aware systems. In: Second Workshop on Security in Ubiquitous Computing at the Fifth Annual Conference on Ubiquitous Computing (UbiComp2003), 2003-10-12 - 2003-10-15, Washington, USA.

Wagealla, W. and Carbone, M. and English, C. and Terzis, S. and Nixon, P. (2003) A formal model of trust lifecycle management. In: Workshop on Formal Aspects of Security and Trust (FAST2003) as part of the 12th Formal Methods Europe Symposium (FM2003), 2003-09-08 - 2003-09-12, Pisa, Italy.

Nixon, P. and Dobson, S. and Terzis, S. and Wang, F. (2002) Architectural implications for context adaptive smart spaces. In: 5th IEEE International Workshop on Networked Appliances, 2002-10-30 - 2002-10-31, Liverpool.

English, C. and Nixon, P. and Terzis, S. and McGettrick, A. and Lowe, H. (2002) Dynamic trust models for ubiquitous computing environments. In: First Workshop on Security in Ubiquitous Computing at the Fourth Annual Conference on Ubiquitous Computing (Ubicomp2002), 2002-09-29 - 2002-10-01, Gothenburg, Sweden.

English, C. and Nixon, P. and Terzis, S. and McGettrick, A. and Lowe, H. (2002) Security models for trusting network appliances. In: 5th IEEE International Workshop on Networked Appliances, 2002-10-30 - 2002-10-31, Liverpool.

McGettrick, A. and English, C. and Lowe, H. and Nixon, P. and Terzis, S. (2002) Trust and mobility. In: First iTrust Workshop, 2002-09-02 - 2002-09-04, Glasgow.

Terzis, S. and English, C. and Stevenson, G. and Lowe, H. and McGettrick, A. and Nixon, P. (2002) Using simulation to explore trust lifecycle issues. In: First iTrust Workshop, 2002-09-02 - 2002-09-04, Glasgow.

Other

Terzis, S. (2009) The Many Faces of Trust. IEEE.

Report

Terzis, S. and Wagealla, W. and English, C. and Nixon, P. and McGettrick, A. (2004) Preliminary Trust Evolution Model. [Report]

Terzis, S. and Wagealla, W. and English, C. and Nixon, P. and McGettrick, A. (2004) Preliminary Trust Exploitation Model. [Report]

Terzis, S. and Wagealla, W. and English, C. and Nixon, P. and McGettrick, A. (2004) Preliminary Trust Formation Model. [Report]

Terzis, S. and Wagealla, W. and English, C. and McGettrick, A. and Nixon, P. (2003) The SECURE collaboration model. [Report]

Thesis

Terzis, S. (1997) Performance Monitoring in Digital Library Systems. Masters thesis, UoS.

This list was generated on Sun Nov 23 14:41:14 2014 GMT.