Personal profile

Education/Academic qualification

Doctor of Science, Université de Mons (UMons)

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Access control Engineering & Materials Science
Information systems Engineering & Materials Science
Data privacy Engineering & Materials Science
Authentication Engineering & Materials Science
Control systems Engineering & Materials Science
Ecosystems Engineering & Materials Science
Innovation Engineering & Materials Science
Technology Enhanced Learning Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2009 2020

Research Output 1995 2017

Model-Driven Approach for Privacy Management in Business Ecosystem

Feltus, C., Grandry, E., Kupper, T. & Colin, J-N. 2017 5th International Conference on Model-Driven Engineering and Software Development: MODELSWARD 2017.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Du secret à la confiance... quelques éléments de cryptographie

Colin, J-N. 18 Mar 2016 L'identification électronique et les services de confiance depuis le règlement eIDAS. Larcier , Vol. 39, p. 7-28 1. (Collection du CRIDS; vol. 39)

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System

Rath, T. M. A. & Colin, J. N. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Samarati, P. (ed.). Springer Verlag, Vol. 9149, p. 233-241 9 p. 16. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9149)

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Privacy Preserving
Perimeter
Access Control
Data privacy
Access control

Securing a loosely-coupled web-based eLearning ecosystem combining open standards

Colin, J. N. & Hoang, M. T. 2015 Lecture Notes in Business Information Processing. Springer Verlag, Vol. 226, p. 48-62 15 p. (Lecture Notes in Business Information Processing; vol. 226)

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Electronic Learning
Ecosystem
Web-based
Design
Standards
File
Routing protocols
Algebra
Agglomeration
Network protocols
Internet

Activities 2009 2016

Future-Proofing Cybersecurity Panel Discussion & Workshop

Colin, J. (Contributor)
6 Dec 2016

Activity: Participating in or organising an eventParticipation in workshop, seminar, course

23rd ACM Conference on Computer and Communications Security

Colin, J. (Contributor)
24 Oct 201628 Oct 2016

Activity: Participating in or organising an eventParticipation in conference

L'identification électronique et les services de confiance depuis le règlement eIDAS

Colin, J. (Contributor)
18 Mar 2016

Activity: Participating in or organising an eventParticipation in workshop, seminar, course

L'identification électronique et les services de confiance depuis le règlement eIDAS

Colin, J. (Contributor)
18 Mar 2016

Activity: Participating in or organising an eventParticipation in workshop, seminar, course

CODASPY 2016

Colin, J. (Participant)
7 Mar 201611 Mar 2016

Activity: Participating in or organising an eventParticipation in conference

Thesis

Alignement des concepts dans les domaines du contrôle d'accès et de la gestion des droits numériques

Author: Guillaume, G., 2011

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

Aligning Access Rights to Governance Needs with the Responsability MetaModel (ReMMo) in the Frame of Enterprise Architecture

Author: Feltus, C., 11 Mar 2014

Supervisor: Petit, M. (Co-Supervisor), Habra, N. (President), Colin, J. (Jury), Maris, C. (Jury), PIGNEUR, Y. (Jury), Proper, E. (Jury) & Dubois, E. (Co-Supervisor)

Student thesis: Doc typesDoctor of Sciences

File

Anonymisation des données: pourquoi et comment?

Author: Burniaux, F., 13 Jun 2013

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

Apprentissage dans un système d'auto-organisation

Author: Pardoen, M., 4 Sep 2013

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

Authentication in mobile environment

Author: Duchêne, A., 4 Sep 2013

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

Press / Media

Diffusion de contenu pornographique sur SnapChat

Jean-Noël Colin

26/05/16

1 media contribution

Press/Media: Expert Comment

Interview pour le Journal Télévisé de RTL-TVI

Jean-Noël Colin

25/02/16

1 media contribution

Press/Media: Expert Comment

Interview pour le journal télévisé de RTL TVI

Jean-Noël Colin

19/02/16

1 media contribution

Press/Media: Expert Comment

Interview Le Soir 21/8/2015

Jean-Noël Colin

21/08/15

1 media contribution

Press/Media: Expert Comment

Interview RTBF sur la cyber sécurité

Jean-Noël Colin

14/04/15

1 media contribution

Press/Media: Expert Comment