Research Output 1989 2019

Filter
Conference contribution
2019

Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis

Evrard, L., François, J. & Colin, J-N., 2019, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management 2019.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

2018

Blockchain and Internet of Things Opportunities and Challenges

Sok, K., Colin, J-N. & PO, K., 6 Dec 2018, Proceedings of the 9th International Symposium on Information and Communication Technology, SoICT 2018. p. 150-154 5 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Servers
Intelligent buildings
Domestic appliances
Internet of things
Refrigerators
23 Downloads (Pure)

Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System

Picard, N., Colin, J-N. & Zampunieris, D., 2018, Proceedings of the workshop on Security, Privacy, Big Data and Internet of Things SPBDIoT 2018: Within the 3rd International Conference on Internet of Things, Big Data and Security - IoTBDS 2018. Munoz, V. M., Walters, R., Firouzi, F., Wills, G. & Chang, V. (eds.). Vol. 2018-March. p. 333-339 7 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Sensors
Actuators
Engines
Data storage equipment
2017
48 Downloads (Pure)

Adaptive risk-aware access control model for Internet of Things

Rath, T. M. A. & Colin, J-N., 15 Sep 2017, Proceedings of the International Workshop on Secure Internet of Things 2017 (SIoT 2017). 10 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Internet of things
Health
Control systems
15 Downloads (Pure)

Agile Cultural Challenges in Europe and Asia: Insights from Practitioners

Ayed, H., Vanderose, B. & Habra, N., 2017, (Accepted/In press) Agile Cultural Challenges in Europe and Asia: Insights from Practitioners. IEEE Computer society, 10 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Open Access
File
Software engineering

Model-Driven Approach for Privacy Management in Business Ecosystem

Feltus, C., Grandry, E., Kupper, T. & Colin, J-N., 2017, MODELSWARD 2017 - Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development: MODELSWARD 2017. Pires, L. F., Selic, B. & Hammoudi, S. (eds.). Vol. 2017-January. p. 392-400 9 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Ecosystems
Industry
Data privacy
Processing
Compliance
21 Downloads (Pure)

Strengthening Access Control in case of Compromised Accounts in Smart Home

Rath, T. M. A. & Colin, J-N., 20 Nov 2017, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2017. Vol. 2017-October. p. 1-8 8 p. 8115827. (International Conference on Wireless and Mobile Computing, Networking and Communications; vol. 2017-October).

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Authentication
2016

Du secret à la confiance... quelques éléments de cryptographie

Colin, J-N., 18 Mar 2016, L'identification électronique et les services de confiance depuis le règlement eIDAS. Larcier , Vol. 39. p. 7-28 1. (Collection du CRIDS; vol. 39).

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Règlement e-IDAS et mobilité en soins de santé

Van Gyseghem, J-M., 18 Mar 2016, L'identification électronique et les services de confiance depuis le règlement eIDAS. Bruxelles: Larcier , p. 403-414 (Collection du CRIDS; vol. 39).

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Règlement e-IDAS et secteur public : La carte d'identité électronique belge, instrument d'une identité numérique européene?

Degrave, É. & De Terwangne, C., 18 Mar 2016, L'identification électronique et les services de confiance depuis le règlement eIDAS. Bruxelles: Larcier , p. 361-380 (Collection du CRIDS; vol. 39).

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

2015
2837 Downloads (Pure)

A Context-Driven Approach for Guiding Agile Adoption: The AMQuICk Framework

Ayed, H., Vanderose, B. & Habra, N., 15 Nov 2015, ICSEA 2015, The Tenth International Conference on Software Engineering Advances. Oberhauser, R., Lavazza, L., Mannaert, H. & Clyde, S. (eds.). Barcelona, Spain, p. 228 - 233 6 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Open Access
File
Software engineering
Costs

Privacy by design and administrative efficiency in e-governance: A case study

Vanderose, B., Degrave, É. & Habra, N., 2015, CEUR Workshop Proceedings. CEUR-WS, Vol. 1420. p. 110-115 6 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Data privacy
Communication
Transparency
Information management
Industry
2013
108 Downloads (Pure)

AM-QuICk : a measurement-based framework for agile methods customisation

Ayed, H., Habra, N. & Vanderose, B., 1 Dec 2013, Proceedings - Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement, IWSM-MENSURA 2013. p. 71-80 10 p. 6693225

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Software engineering
Decision making
2005

What can organizational analys give to requirement analys ? Developing an information system in Hospital Emergency Departments

De Vos, A., Lobet-Maris, C. & Rousseau, A., 1 Dec 2005, ICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems. p. 390-393 4 p. (ICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems).

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Information systems
Requirements engineering
Specifications
Emergency department