Sotirios Terzis, PhD, MSc, BSc(Hon), MBCS, CITP, FHEA

Dr

  • United Kingdom

Accepting PhD Students

PhD projects

Socio-technical design of authentication mechanisms.
Understand the factors that drive user attitudes and behavior towards authentication systems and based on this understanding devise a methodology for effective authentication mechanism design.

Transparency and accountability in cloud computing systems
Move away from current blind trust in cloud computing systems towards appropriate trust management through the design and utilization of security mechanism that enhance transparency and accountability.

19972018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2017

Efficient delegated private set intersection on outsourced private datasets

Abadi, A., Terzis, S., Metere, R. & Dong, C., 26 May 2017, In : IEEE Transactions on Dependable and Secure Computing. p. 1-15 15 p.

Research output: Contribution to journalArticle

Open Access
File
4 Citations (Scopus)
143 Downloads (Pure)
2016

VD-PSI: verifiable delegated private set intersection on outsourced private datasets

Abadi, A., Terzis, S. & Dong, C., 10 Jun 2016, Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers. Grossklags, J. & Preneel, B. (eds.). Berlin Heidelberg, Vol. 9603. p. 149-168 20 p. (Lecture Notes in Computer Science; vol. 9603).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
25 Downloads (Pure)
2015

O-PSI: delegated private set intersection on outsourced datasets

Abadi, A., Terzis, S. & Dong, C., 26 May 2015, p. 3-17. 15 p.

Research output: Contribution to conferencePaper

Open Access
File
25 Citations (Scopus)
134 Downloads (Pure)
2013

Exploring user perceptions of authentication scheme security

Nosseir, A. & Terzis, S., 24 Jul 2013. 2 p.

Research output: Contribution to conferencePoster

Open Access
File
48 Downloads (Pure)
2012

A middleware for pervasive situation-awareness

Thomson, G. & Terzis, S., Jun 2012, Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 International Conference, DAIS 2012. Goschka, K. & Haridi, S. (eds.). Vol. 7272. p. 148-161 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

File
127 Downloads (Pure)

Distress detection

Vella, M. J., Terzis, S. & Roper, M., 12 Sep 2012, Research in Attacks, Intrusions, and Defenses: Proceedings of the 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Davide, B., Salvatore.J., S. & Marco, C. (eds.). Springer, p. 384-385 2 p. (Lecture Notes in Computer Science; vol. 7462).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

2011

Novice user perception of e-services: a study in the Egyptian public sector

Nosseir, A. & Terzis, S., Dec 2011, Applied electrical engineering and computing technologies : conference proceedings. New York: IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

2 Citations (Scopus)

Towards authentication via selected extraction from electronic personal histories

Nosseir, A. & Terzis, S., 2011, Enterprise Information Systems: Revised Selected Papers of the 12th International Conference on Enterprise Information Systems. Filipe, J. & Cordeiro, J. (eds.). Springer, p. 571-586 16 p. (Lecture Notes in Business Information Processing; vol. 73).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

2010

A study in authentication via electronic personal history questions

Nosseir, A. & Terzis, S., Jun 2010, Proceedings of the 12th International Conference on Enterprise Information Systems. Cordeiro, J. (ed.). p. 63-70 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

6 Citations (Scopus)

Danger theory and intrusion detection: possibilities and limitations of the analogy

Vella, M., Roper, M. & Terzis, S., 2010, Artificial Immune Systems: Proceedings of the 9th International Conference, ICARIS 2010. Hart, E., McEwan, C., Timmis, J. & Hone, A. (eds.). Springer, p. 276-289 14 p. (Lecture Notes in Computer Science; vol. 6209).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

8 Citations (Scopus)
2009

International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2009)

Veiga, L. (ed.), Donsez, D. (ed.), Riva, O. (ed.) & Terzis, S. (ed.), 1 Nov 2009, New York, NY, USA. (ACM Proceedings Series)

Research output: Book/ReportBook

The Many Faces of Trust

Terzis, S., 1 Apr 2009, 1 p. IEEE.

Research output: Other contribution

2008

6th International Workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2008)

Terzis, S. (ed.), 1 Dec 2008, New York, NY, USA. (ACM Proceedings Series)

Research output: Book/ReportBook

Distributed Applications and Interoperable Systems (DAIS 2008)

Meier, R. (ed.) & Terzis, S. (ed.), 1 Jun 2008, Springer. (LNCS)

Research output: Book/ReportBook

2007

5th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2007)

Terzis, S. (ed.), Neely, S. (ed.) & Narasimhan, N. (ed.), 1 Nov 2007, New York. (ACM Proceedings Series)

Research output: Book/ReportBook

2006

4th International workshop on middleware for pervasive and ad-hoc computing (MPAC 2006)

Terzis, S. (ed.), 2006, New York, NY, USA. (ACM Proceedings Series)

Research output: Book/ReportBook

A model and architecture for situation determination

Thomson, G., Terzis, S. & Nixon, P., 16 Oct 2006. 15 p.

Research output: Contribution to conferencePaper

Open Access
File
17 Downloads (Pure)

A self-managing infrastructure for ad-hoc situation determination

Thomson, G., Stevenson, G., Terzis, S., Nixon, P., Nugent, C. (ed.) & Augusto, J. (ed.), 2006, Smart Homes and Beyond - ICOST2006 4th International Conference On Smart homes and health Telematics. IOS Press, p. 157-164 7 p. (Assistive Technology Research Series).

Research output: Chapter in Book/Report/Conference proceedingChapter

File
90 Downloads (Pure)

Gathering experience in trust-based interactions

English, C., Terzis, S., Stolen, K. (ed.), Winsborough, W. H. (ed.), Martinelli, F. (ed.) & Massaci, F. (ed.), 2006, Proceedings of 4th International Conference on Trust Management. Springer, p. 62-76 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

File
5 Citations (Scopus)
35 Downloads (Pure)

Question-based authentication using context data

Nosseir, A., Connor, R., Revie, C. & Terzis, S., 2006, Proceedings of the 4th Nordic Conference on Human-Computer Interaction: Changing Roles. Oslo, Norway, Vol. 189. p. 429-432 3 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingChapter

7 Citations (Scopus)

Situation determination with reusable situation specifications

Thomson, G., Terzis, S. & Nixon, P., 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2006. IEEE, p. 620-623 3 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
9 Citations (Scopus)
50 Downloads (Pure)
2005

3rd International workshop on middleware for pervasive and ad-hoc computing (MPAC 2005)

Terzis, S. (ed.) & Donsez, D. (ed.), 1 Dec 2005, New York, NY, USA. (ACM Proceedings Series)

Research output: Book/ReportBook

Middleware for pervasive and ad-hoc computing

Terzis, S., Nixon, P., Narasimhan, N. & Walsh, T., 2005, In : Personal and Ubiquitous Computing. 9, 6

Research output: Contribution to journalArticle

1 Citation (Scopus)

Situation determination with distributed context histories

Thomson, G., Nixon, P. & Terzis, S., 2005, Proceedings of 1st International Workshop on Exploiting Context Histories in Smart Environments. Munich, Germany: IEEE

Research output: Chapter in Book/Report/Conference proceedingChapter

File
27 Downloads (Pure)

Towards self-protecting ubiquitous systems: monitoring trust-based interactions

English, C., Terzis, S. & Nixon, P., 31 Aug 2005, In : Personal and Ubiquitous Computing. 10, 1, 8 p.

Research output: Contribution to journalArticle

Open Access
File
17 Citations (Scopus)
11 Downloads (Pure)

Trust lifecycle management in a global computing environment

Terzis, S., Wagealla, W., English, C., Nixon, P., Priami, C. (ed.) & Quaglia, P. (ed.), 2005, Global Computing. Springer, Vol. 3267/2005. p. 291-313 22 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)
2004

Engineering trust based collaborations in a global computing environment

English, C., Terzis, S. & Wagealla, W., 2004.

Research output: Contribution to conferencePaper

9 Citations (Scopus)

Preliminary Trust Evolution Model

Terzis, S., Wagealla, W., English, C., Nixon, P. & McGettrick, A., 2004

Research output: Book/ReportOther report

Preliminary Trust Exploitation Model

Terzis, S., Wagealla, W., English, C., Nixon, P. & McGettrick, A., 2004

Research output: Book/ReportOther report

Preliminary Trust Formation Model

Terzis, S., Wagealla, W., English, C., Nixon, P. & McGettrick, A., 2004, Glasgow, United Kingdom: University of Strathclyde.

Research output: Book/ReportOther report

Privacy, security, and trust issues in smart environments

Nixon, P., Wagealla, W., English, C., Terzis, S., Cook, D. (ed.) & Das, S. (ed.), 23 Nov 2004, Smart Environments: Technology, Protocols and Applications. London, UK: John Wiley & Sons Inc., p. 220-240 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
152 Downloads (Pure)

Towards ad-hoc situation determination

Thomson, G., Nixon, P. & Terzis, S., 2004. 6 p.

Research output: Contribution to conferencePaper

File
33 Downloads (Pure)

Trust lifecycle management in ad-hoc collaborations

Terzis, S., 2004.

Research output: Contribution to conferencePaper

File
28 Downloads (Pure)
2003

A formal model of trust lifecycle management

Wagealla, W., Carbone, M., English, C., Terzis, S. & Nixon, P., 12 Sep 2003.

Research output: Contribution to conferencePaper

Open Access
File
7 Downloads (Pure)

An Approach to dynamic context discovery and composition

Thomson, G., Richmond, M., Terzis, S. & Nixon, P., 2003. 8 p.

Research output: Contribution to conferencePaper

File
31 Downloads (Pure)

On trust and privacy in context-aware systems

Wagealla, W., Terzis, S., English, C. & Nixon, P., 2003. 2 p.

Research output: Contribution to conferencePaper

File
32 Downloads (Pure)

Proceedings of the 1st international workshop on middleware for pervasive and ad hoc computing (MPAC)

Narasimhan, N. (ed.), Terzis, S. (ed.), Walsh, T. (ed.) & Nixon, P. (ed.), 1 Jun 2003.

Research output: Contribution to conferenceProceeding

The SECURE collaboration model

Terzis, S., Wagealla, W., English, C., McGettrick, A. & Nixon, P., 2003, Glasgow, United Kingdom: University of Strathclyde.

Research output: Book/ReportOther report

File
97 Downloads (Pure)

Towards a middleware for generalised context management

Glassey, R., Stevenson, G., Richmond, M., Nixon, P., Terzis, S., Wang, F. & Ferguson, I., 17 Jun 2003. 8 p.

Research output: Contribution to conferencePaper

Open Access
File
11 Downloads (Pure)

Towards dynamic context discovery and composition

Thomson, G., Terzis, S. & Nixon, P., 2003. 2 p.

Research output: Contribution to conferencePaper

File
19 Downloads (Pure)

Trust-based model for privacy control in context aware systems

Wagealla, W., Terzis, S. & English, C., 2003. 5 p.

Research output: Contribution to conferencePaper

File
84 Downloads (Pure)

Trust dynamics for collaborative global computing

English, C., Terzis, S., Wagealla, W., Lowe, H., Nixon, P. & McGettrick, A., 11 Jun 2003. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
6 Citations (Scopus)
18 Downloads (Pure)

Trusting collaboration in global computing systems

English, C., Wagealla, W., Nixon, P., Terzis, S., McGettrick, A. & Lowe, H., 2003, Trust Management. Springer, Vol. 2692. p. 136-149 13 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
28 Citations (Scopus)
63 Downloads (Pure)

Trust management

Nixon, P. & Terzis, S., 2003, Heidelberg. 349 p. (Lecture Notes in Computer Science; vol. 2692 )

Research output: Book/ReportBook

Using trust for secure collaboration in uncertain environments

Cahill, V., Gray, E., Seigneur, J. M., Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Serugendo, G., Bryce, C., Carbone, M., Krukow, K. & Nielsen, M., 2003, In : IEEE Pervasive Computing. 2, 3, p. 52-61 9 p.

Research output: Contribution to journalArticle

248 Citations (Scopus)
1 Downloads (Pure)
2002

Architectural implications for context adaptive smart spaces

Nixon, P., Dobson, S., Terzis, S. & Wang, F., 31 Oct 2002. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
1 Citation (Scopus)
8 Downloads (Pure)

Dynamic trust models for ubiquitous computing environments

English, C., Nixon, P., Terzis, S., McGettrick, A. & Lowe, H., 1 Oct 2002. 4 p.

Research output: Contribution to conferencePaper

Open Access
File
32 Downloads (Pure)

Security models for trusting network appliances

English, C., Nixon, P., Terzis, S., McGettrick, A. & Lowe, H., 31 Oct 2002. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
12 Citations (Scopus)
132 Downloads (Pure)

Trust and mobility

McGettrick, A., English, C., Lowe, H., Nixon, P. & Terzis, S., 2002.

Research output: Contribution to conferencePaper