If you made any changes in Pure these will be visible here soon.

Personal profile

Education/Academic qualification

Doctor of Science, Université de Mons (UMons)

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Access control Engineering & Materials Science
Authentication Engineering & Materials Science
Data privacy Engineering & Materials Science
Authorization Mathematics
Information systems Engineering & Materials Science
Technology Enhanced Learning Mathematics
Access Control Mathematics
Learning Objects Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2009 2020

Research Output 1995 2019

Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis

Evrard, L., François, J. & Colin, J-N., 2019, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management 2019.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System

Picard, N., Colin, J-N. & Zampunieris, D., 2018, Proceedings of the workshop on Security, Privacy, Big Data and Internet of Things SPBDIoT 2018: Within the 3rd International Conference on Internet of Things, Big Data and Security - IoTBDS 2018. Munoz, V. M., Walters, R., Firouzi, F., Wills, G. & Chang, V. (eds.). Vol. 2018-March. p. 333-339 7 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Sensors
Actuators
Engines
Data storage equipment

Adaptive risk-aware access control model for Internet of Things

Rath, T. M. A. & Colin, J-N., 15 Sep 2017, Proceedings of the International Workshop on Secure Internet of Things 2017 (SIoT 2017). 10 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Internet of things
Health
Control systems

Model-Driven Approach for Privacy Management in Business Ecosystem

Feltus, C., Grandry, E., Kupper, T. & Colin, J-N., 2017, 5th International Conference on Model-Driven Engineering and Software Development: MODELSWARD 2017.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Strengthening Access Control in case of Compromised Accounts in Smart Home

Rath, T. M. A. & Colin, J-N., 20 Nov 2017, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2017. Vol. 2017-October. p. 1-8 8 p. 8115827. (International Conference on Wireless and Mobile Computing, Networking and Communications; vol. 2017-October).

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Authentication

Activities 2009 2016

Future-Proofing Cybersecurity Panel Discussion & Workshop

Jean-Noël Colin (Contributor)
6 Dec 2016

Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

23rd ACM Conference on Computer and Communications Security

Jean-Noël Colin (Contributor)
24 Oct 201628 Oct 2016

Activity: Participating in or organising an event typesParticipation in conference

CODASPY 2016

Jean-Noël Colin (Participant)
7 Mar 201611 Mar 2016

Activity: Participating in or organising an event typesParticipation in conference

L'identification électronique et les services de confiance depuis le règlement eIDAS

Jean-Noël Colin (Contributor)
18 Mar 2016

Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

L'identification électronique et les services de confiance depuis le règlement eIDAS

Jean-Noël Colin (Contributor)
18 Mar 2016

Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

Thesis

Alignement des concepts dans les domaines du contrôle d'accès et de la gestion des droits numériques

Author: Guillaume, G., 2011

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster in Computer science

File

Aligning Access Rights to Governance Needs with the Responsability MetaModel (ReMMo) in the Frame of Enterprise Architecture

Author: Feltus, C., 11 Mar 2014

Supervisor: Petit, M. (Co-Supervisor), Habra, N. (President), Colin, J. (Jury), Maris, C. (Jury), PIGNEUR, Y. (External person) (Jury), Proper, E. (External person) (Jury) & Dubois, E. (External person) (Co-Supervisor)

Student thesis: Doc typesDoctor of Sciences

File

Analyse des standards HL7 et KMEHR et développement d'un outil de conversion

Author: de Quirini, C., 2014

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster in Computer science

File

Anonymisation des données: pourquoi et comment?

Author: Burniaux, F., 13 Jun 2013

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster in Computer science

File

Apprentissage dans un système d'auto-organisation

Author: Pardoen, M., 4 Sep 2013

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster in Computer science

File

Press / Media

Diffusion de contenu pornographique sur SnapChat

Jean-Noël Colin

26/05/16

1 media contribution

Press/Media: Expert Comment

Interview pour le Journal Télévisé de RTL-TVI

Jean-Noël Colin

25/02/16

1 media contribution

Press/Media: Expert Comment

Interview pour le journal télévisé de RTL TVI

Jean-Noël Colin

19/02/16

1 media contribution

Press/Media: Expert Comment

Interview Le Soir 21/8/2015

Jean-Noël Colin

21/08/15

1 media contribution

Press/Media: Expert Comment

Interview RTBF sur la cyber sécurité

Jean-Noël Colin

14/04/15

1 media contribution

Press/Media: Expert Comment