Dr Tim Storer

  • Lecturer (Computing Science)

telephone: 4970
email: Timothy.Storer@glasgow.ac.uk

Research interests

Personal site: http://www.dcs.gla.ac.uk/~tws

Biography:
I am a lecturer in Software Engineering at the School of Computing Science, University of Glasgow. Between 2006 and 2009 I was a research assistant at the University of St Andrews working for Ian Sommerville. I have research interests in the engineering of large scale complex socio-technical systems and the reliability of software systems. Examples of areas I've applied this interest in include voting systems, civil contingencies and emergency response, digital forensics and scientific software.

Research Interests:
- software engineering
- software reliability
- socio-technical systems
- digital forensics

Selected publications

Glisson, W.B., Storer, T. and Buchanan-Wollaston, J. (2013) An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation, 10(1), pp. 44-55. (doi:10.1016/j.diin.2013.03.004)

Storer, T. and Lock, R. (2009) Accuracy: The fundamental requirement for voting systems. In: The Third International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Japan, 16-19 Mar 2009, pp. 374-379. ISBN 9781424435722 (doi:10.1109/ARES.2009.133)

Sommerville, I., Lock, R., Storer, T. and Dobson, J. (2009) Deriving Information Requirements from Responsibility Models. In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, 8-12 Jun 2009, pp. 515-529. (doi:10.1007/978-3-642-02144-2_40)

Lock, R., Storer, T., Harvey, N., Hughes, C. and Sommerville, I. (2008) Observations of the Scottish elections 2007. Transforming Government: People, Process and Policy, 2(2), pp. 104-118. (doi:10.1108/17506160810876185)

Supervision

  • Abidin, Nur Elimtiaz Bin
    Modelling Information-Flow Boundaries
  • Raue, Stefan
    It is planned to conduct research in the field of risk assessment and fire safety, thereby working in the joint project titled: EVALUATION OF PREVENTION AND PROTECTION ACTIVITIES ON COMMERCIAL, PUBLIC AND HERITAGE BUILDINGS.
  • Simpson, Robbie
    Formalised Responsibility Modelling for Automated Socio-Technical System Analysis

All publications

List by: Type | Date

Jump to: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
Number of items: 29.

2017

Alshammari, D., Singer, J. and Storer, T. (2017) Does CloudSim Accurately Model Micro Datacenters? In: IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, 25-30 June 2017, (Accepted for Publication)

Storer, T. (2017) Bridging the chasm: a survey of software engineering practice in scientific programming. ACM Computing Surveys, (Accepted for Publication)

2016

Glisson, W. B., Storer, T., Blyth, A., Grispos, G. and Campbell, M. (2016) In-the-wild residual data research and privacy. Journal of Digital Forensics, Security and Law, 11(1), pp. 77-98.

2015

Grispos, G., Glisson, W. B. and Storer, T. (2015) Security Incident Response Criteria: A Practitioner's Perspective. 21st Americas Conference on Information Systems, Fajardo, Puerto Rico, 13-15 Aug 2015. ISBN 9780996683104

Grispos, G., Glisson, W. B. and Storer, T. (2015) Recovering residual forensic data from smartphone interactions with cloud storage providers. In: Ko, R. and Choo, K.-K. R. (eds.) The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress: Waltham, MA, pp. 347-382. ISBN 9780128015957

Simpson, R. and Storer, T. (2015) Formalising responsibility modelling for automatic analysis. In: Barjis, J., Pergl, R. and Babkin, E. (eds.) Enterprise and Organizational Modeling and Simulation. Series: Lecture Notes in Business Information Processing (231). Springer Berlin Heidelberg. ISBN 9783319246253

2014

Grispos, G., Glisson, W. B. and Storer, T. (2014) Rethinking Security Incident Response: The Integration of Agile Principles. 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, GA, USA, 07-09 Sep 2014. ISBN 9780692253205

Marsh, S., Dwyer, N., Basu, A., Storer, T., Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S. and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

2013

Crawford, H., Renaud, K. and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi:10.1016/j.cose.2013.05.005)

Glisson, W.B. and Storer, T. (2013) Investigating information security risks of mobile device use within organizations. In: 19th Americas Conference on Information Systems, Chicago, IL, USA, 15-17 Aug 2013, (In Press)

Glisson, W.B., Storer, T. and Buchanan-Wollaston, J. (2013) An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation, 10(1), pp. 44-55. (doi:10.1016/j.diin.2013.03.004)

Buchanan-Wollaston, J., Storer, T. and Glisson, W. (2013) A comparison of forensic toolkits and mass market data recovery applications. In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science Orlando, FL, USA, 28-30 Jan 2013,

Grispos, G., Glisson, W. and Storer, T. (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS-46), Grand Wailea, Maui, Hawaii, 7-10 Jan 2013, pp. 4910-4919. (doi:10.1109/HICSS.2013.592)

Grispos, G., Glisson, W.B. and Storer, T. (2013) Cloud security challenges: investigating policies, standards, and guidelines in a Fortune 500 organization. In: 21st European Conference on Information Systems, Utrecht, The Netherlands, 5-8 Jun 2013,

Storer, T., Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

2012

Sommerville, I., Lock, R. and Storer, T. (2012) Information requirements for enterprise systems. In: Calinescu, R. and Garlan, D. (eds.) Large-scale Complex IT Systems: Development, Operation and Management. Series: Lecture notes in computer science (7539). Springer-Verlag: New York, NY, USA, pp. 266-282. ISBN 9783642340581 (doi:10.1007/978-3-642-34059-8_14)

Storer, T., Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Marsh, S. et al. (2012) Non-standards for trust: foreground trust and second thoughts for mobile security. In: Meadows, C.A. and Fernandez-Gago, C. (eds.) Security and Trust Management. Series: Lecture Notes in Computer Science (7170). Springer Verlag: Berlin, Germany, pp. 28-39. ISBN 9783642299629 (doi:10.1007/978-3-642-29963-6_4)

Grispos, G., Storer, T. and Glisson, W. (2012) Calm before the storm: the challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics, 4(2), pp. 28-48. (doi:10.4018/jdcf.2012040103)

Raue, S., Johnson, C.W. and Storer, T. (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

2011

Glisson, W., Storer, T., Mayall, G., Moug, I. and Grispos, G. (2011) Electronic retention: what does your mobile phone reveal about you? International Journal of Information Security, 10(6), pp. 337-349. (doi:10.1007/s10207-011-0144-3)

Grispos, G., Storer, T. and Glisson, W.B. (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation, 8(1), pp. 23-36. (doi:10.1016/j.diin.2011.05.016)

2010

Storer, T., Glisson, W. and Grispos, G. (2010) Investigating information recovered from re-sold mobile. In: Privacy and Usability Methods Pow-wow (PUMP) 2010, Dundee, UK, 6 Sep 2010,

2009

Lock, R., Storer, T. and Sommerville, I. (2009) Responsibility modelling for risk analysis. In: ESREL 2009 Annual Conference, Prague, Czech Republic, 7-10 Sep 2009,

Sommerville, I., Lock, R., Storer, T. and Dobson, J. (2009) Deriving Information Requirements from Responsibility Models. In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, 8-12 Jun 2009, pp. 515-529. (doi:10.1007/978-3-642-02144-2_40)

Storer, T. and Lock, R. (2009) Accuracy: The fundamental requirement for voting systems. In: The Third International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Japan, 16-19 Mar 2009, pp. 374-379. ISBN 9781424435722 (doi:10.1109/ARES.2009.133)

Sommerville, I., Storer, T. and Lock, R. (2009) Responsibility modelling for civil emergency planning. Risk Management, 11(3-4), pp. 179-207. (doi:10.1057/rm.2009.11)

2008

Little, L., Storer, T., Briggs, P. and Duncan, I. (2008) E-Voting in an ubicomp world: trust, privacy, and social implications. Social Science Computer Review, 26(1), pp. 44-59. (doi:10.1177/0894439307307683)

Lock, R., Storer, T., Harvey, N., Hughes, C. and Sommerville, I. (2008) Observations of the Scottish elections 2007. Transforming Government: People, Process and Policy, 2(2), pp. 104-118. (doi:10.1108/17506160810876185)

This list was generated on Tue Jun 27 15:02:37 2017 BST.
Number of items: 29.

Articles

Storer, T. (2017) Bridging the chasm: a survey of software engineering practice in scientific programming. ACM Computing Surveys, (Accepted for Publication)

Glisson, W. B., Storer, T., Blyth, A., Grispos, G. and Campbell, M. (2016) In-the-wild residual data research and privacy. Journal of Digital Forensics, Security and Law, 11(1), pp. 77-98.

Crawford, H., Renaud, K. and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi:10.1016/j.cose.2013.05.005)

Glisson, W.B., Storer, T. and Buchanan-Wollaston, J. (2013) An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation, 10(1), pp. 44-55. (doi:10.1016/j.diin.2013.03.004)

Grispos, G., Storer, T. and Glisson, W. (2012) Calm before the storm: the challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics, 4(2), pp. 28-48. (doi:10.4018/jdcf.2012040103)

Glisson, W., Storer, T., Mayall, G., Moug, I. and Grispos, G. (2011) Electronic retention: what does your mobile phone reveal about you? International Journal of Information Security, 10(6), pp. 337-349. (doi:10.1007/s10207-011-0144-3)

Grispos, G., Storer, T. and Glisson, W.B. (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation, 8(1), pp. 23-36. (doi:10.1016/j.diin.2011.05.016)

Sommerville, I., Storer, T. and Lock, R. (2009) Responsibility modelling for civil emergency planning. Risk Management, 11(3-4), pp. 179-207. (doi:10.1057/rm.2009.11)

Little, L., Storer, T., Briggs, P. and Duncan, I. (2008) E-Voting in an ubicomp world: trust, privacy, and social implications. Social Science Computer Review, 26(1), pp. 44-59. (doi:10.1177/0894439307307683)

Lock, R., Storer, T., Harvey, N., Hughes, C. and Sommerville, I. (2008) Observations of the Scottish elections 2007. Transforming Government: People, Process and Policy, 2(2), pp. 104-118. (doi:10.1108/17506160810876185)

Book Sections

Grispos, G., Glisson, W. B. and Storer, T. (2015) Recovering residual forensic data from smartphone interactions with cloud storage providers. In: Ko, R. and Choo, K.-K. R. (eds.) The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress: Waltham, MA, pp. 347-382. ISBN 9780128015957

Simpson, R. and Storer, T. (2015) Formalising responsibility modelling for automatic analysis. In: Barjis, J., Pergl, R. and Babkin, E. (eds.) Enterprise and Organizational Modeling and Simulation. Series: Lecture Notes in Business Information Processing (231). Springer Berlin Heidelberg. ISBN 9783319246253

Marsh, S., Dwyer, N., Basu, A., Storer, T., Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S. and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

Sommerville, I., Lock, R. and Storer, T. (2012) Information requirements for enterprise systems. In: Calinescu, R. and Garlan, D. (eds.) Large-scale Complex IT Systems: Development, Operation and Management. Series: Lecture notes in computer science (7539). Springer-Verlag: New York, NY, USA, pp. 266-282. ISBN 9783642340581 (doi:10.1007/978-3-642-34059-8_14)

Marsh, S. et al. (2012) Non-standards for trust: foreground trust and second thoughts for mobile security. In: Meadows, C.A. and Fernandez-Gago, C. (eds.) Security and Trust Management. Series: Lecture Notes in Computer Science (7170). Springer Verlag: Berlin, Germany, pp. 28-39. ISBN 9783642299629 (doi:10.1007/978-3-642-29963-6_4)

Conference or Workshop Item

Grispos, G., Glisson, W. B. and Storer, T. (2015) Security Incident Response Criteria: A Practitioner's Perspective. 21st Americas Conference on Information Systems, Fajardo, Puerto Rico, 13-15 Aug 2015. ISBN 9780996683104

Grispos, G., Glisson, W. B. and Storer, T. (2014) Rethinking Security Incident Response: The Integration of Agile Principles. 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, GA, USA, 07-09 Sep 2014. ISBN 9780692253205

Conference Proceedings

Alshammari, D., Singer, J. and Storer, T. (2017) Does CloudSim Accurately Model Micro Datacenters? In: IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, 25-30 June 2017, (Accepted for Publication)

Glisson, W.B. and Storer, T. (2013) Investigating information security risks of mobile device use within organizations. In: 19th Americas Conference on Information Systems, Chicago, IL, USA, 15-17 Aug 2013, (In Press)

Buchanan-Wollaston, J., Storer, T. and Glisson, W. (2013) A comparison of forensic toolkits and mass market data recovery applications. In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science Orlando, FL, USA, 28-30 Jan 2013,

Grispos, G., Glisson, W. and Storer, T. (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS-46), Grand Wailea, Maui, Hawaii, 7-10 Jan 2013, pp. 4910-4919. (doi:10.1109/HICSS.2013.592)

Grispos, G., Glisson, W.B. and Storer, T. (2013) Cloud security challenges: investigating policies, standards, and guidelines in a Fortune 500 organization. In: 21st European Conference on Information Systems, Utrecht, The Netherlands, 5-8 Jun 2013,

Storer, T., Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

Storer, T., Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Raue, S., Johnson, C.W. and Storer, T. (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

Storer, T., Glisson, W. and Grispos, G. (2010) Investigating information recovered from re-sold mobile. In: Privacy and Usability Methods Pow-wow (PUMP) 2010, Dundee, UK, 6 Sep 2010,

Lock, R., Storer, T. and Sommerville, I. (2009) Responsibility modelling for risk analysis. In: ESREL 2009 Annual Conference, Prague, Czech Republic, 7-10 Sep 2009,

Sommerville, I., Lock, R., Storer, T. and Dobson, J. (2009) Deriving Information Requirements from Responsibility Models. In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, 8-12 Jun 2009, pp. 515-529. (doi:10.1007/978-3-642-02144-2_40)

Storer, T. and Lock, R. (2009) Accuracy: The fundamental requirement for voting systems. In: The Third International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Japan, 16-19 Mar 2009, pp. 374-379. ISBN 9781424435722 (doi:10.1109/ARES.2009.133)

This list was generated on Tue Jun 27 15:02:37 2017 BST.