Jean-NoŽl Colin
Jean-NoŽl Colin
Professor of Computer Science, University of Namur
Verified email at
Cited by
Cited by
A digital licensing model for the exchange of learning objects in a federated environment
J Simon, JN Colin
Proceedings. First IEEE International Workshop on Electronic Contracting†…, 2004
Secure ICT services for mobile and wireless communications: a federated global identity management framework
J Siddiqi, B Akhgar, M Naderi, W Orth, N Meyer, M Tuisku, G Pipan, ...
Third International Conference on Information Technology: New Generations†…, 2006
PrimAndroid: privacy policy modelling and analysis for android applications
G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh
2011 IEEE International Symposium on Policies for Distributed Systems and†…, 2011
A national-scale assessment of climate change impacts on species: assessing the balance of risks and opportunities for multiple taxa
JW Pearce-Higgins, CM Beale, TH Oliver, TA August, M Carroll, ...
Biological Conservation 213, 124-134, 2017
Model-driven Approach for Privacy Management in Business Ecosystem.
C Feltus, E Grandry, T Kupper, JN Colin
MODELSWARD, 392-400, 2017
LIMBS: Open source, open standards, and open content to foster learning resource exchanges
JN Colin, D Massart
Sixth IEEE International Conference on Advanced Learning Technologies (ICALT†…, 2006
Adaptive risk-aware access control model for internet of things
TA Rath, JN Colin
2017 International Workshop on Secure Internet of Things (SIoT), 40-49, 2017
Patient privacy preservation: P-RBAC vs OrBAC in patient controlled records type of centralized healthcare information system. case study of walloon healthcare network, belgium
AT Rath, JN Colin
The Fourth International Conference on eHealth, Telemedicine, and Social†…, 2012
A federated authorization service for bridging learning object distribution models
JN Colin, TD Le, D Massart
International Conference on Web-Based Learning, 116-125, 2009
Authentication, authorisation, and rights management for the CELEBRATE brokerage system
JN Colin, J Simon
Celebrate Deliverable D 3 (3), 2003
Celebrate: A federated model for exchange of learning objects
J Simon, JN Colin
Proc. of the World Conference on E-Learning in Corporate, Government†…, 2004
Strengthening access control in case of compromised accounts in smart home
AT Rath, JN Colin
2017 IEEE 13th International Conference on Wireless and Mobile Computing†…, 2017
Towards purpose enforcement model for privacy–aware usage control policy in distributed healthcare
AT Rath, JN Colin
International Journal of Security and Networks 8 (2), 94-105, 2013
Context-aware and attribute-based access control applying proactive computing to IoT system
N Picard, JN Colin, D Zampunieris
Proceedings of the 3rd International Conference on Internet of Things, Big†…, 2018
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment
AT Rath, JN Colin
Proceedings of the 8th International Conference on Ubiquitous Information†…, 2014
Protecting personal data: access control for privacy preserving perimeter protection system
AT Rath, JN Colin
IFIP Annual Conference on Data and Applications Security and Privacy, 233-241, 2015
Analogue attacks in e-health: Issues and solutions
RT Annanda, JN Colin
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
Attacker behavior-based metric for security monitoring applied to darknet analysis
L Evrard, J FranÁois, JN Colin
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM†…, 2019
Access and Usage Control Requirements for Patient Controlled Record Type of Healthcare Information System.
AT Rath, JN Colin
HEALTHINF, 331-336, 2013
The system can't perform the operation now. Try again later.
Articles 1–20