Personal profile

Education/Academic qualification

Doctor of Science, Université de Mons (UMons)

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Access control Engineering & Materials Science
Data privacy Engineering & Materials Science
Information Systems Medicine & Life Sciences
Authentication Engineering & Materials Science
Information systems Engineering & Materials Science
Delivery of Health Care Medicine & Life Sciences
Control systems Engineering & Materials Science
Ecosystems Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2009 2020

Research Output 1995 2018

Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System

Picard, N., Colin, J-N. & Zampunieris, D. 2018 Proceedings of the workshop on Security, Privacy, Big Data and Internet of Things SPBDIoT 2018: Within the 3rd International Conference on Internet of Things, Big Data and Security - IoTBDS 2018. 7 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Sensors
Actuators
Engines
Data storage equipment

Adaptive risk-aware access control model for Internet of Things

Rath, T. M. A. & Colin, J-N. 15 Sep 2017 IEEE explorer. 10 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Internet of things
Health
Control systems

Model-Driven Approach for Privacy Management in Business Ecosystem

Feltus, C., Grandry, E., Kupper, T. & Colin, J-N. 2017 5th International Conference on Model-Driven Engineering and Software Development: MODELSWARD 2017.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Strengthening Access Control in case of Compromised Accounts in Smart Home

Rath, T. M. A. & Colin, J-N. 23 Nov 2017 IEEE Explorer. p. 1-8 8 p.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

File
Access control
Authentication

Du secret à la confiance... quelques éléments de cryptographie

Colin, J-N. 18 Mar 2016 L'identification électronique et les services de confiance depuis le règlement eIDAS. Larcier , Vol. 39, p. 7-28 1. (Collection du CRIDS; vol. 39)

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Activities 2009 2016

Future-Proofing Cybersecurity Panel Discussion & Workshop

Colin, J. (Contributor)
6 Dec 2016

Activity: Participation in workshop, seminar, course

23rd ACM Conference on Computer and Communications Security

Colin, J. (Contributor)
24 Oct 201628 Oct 2016

Activity: Participation in conference

L'identification électronique et les services de confiance depuis le règlement eIDAS

Colin, J. (Contributor)
18 Mar 2016

Activity: Participation in workshop, seminar, course

L'identification électronique et les services de confiance depuis le règlement eIDAS

Colin, J. (Contributor)
18 Mar 2016

Activity: Participation in workshop, seminar, course

CODASPY 2016

Colin, J. (Participant)
7 Mar 201611 Mar 2016

Activity: Participation in conference

Thesis

Alignement des concepts dans les domaines du contrôle d'accès et de la gestion des droits numériques

Author: Guillaume, G., 2011

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

File

Aligning Access Rights to Governance Needs with the Responsability MetaModel (ReMMo) in the Frame of Enterprise Architecture

Author: Feltus, C., 11 Mar 2014

Supervisor: Petit, M. (Co-Supervisor), Habra, N. (President), Colin, J. (Jury), Lobet-Maris, C. (Jury), PIGNEUR, Y. (Jury), Proper, E. (Jury) & Dubois, E. (Co-Supervisor)

Student thesis: Doc typesDoctor of Sciences

File

Analyse des standards HL7 et KMEHR et développement d'un outil de conversion

Author: de Quirini, C., 2014

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

File

Anonymisation des données: pourquoi et comment?

Author: Burniaux, F., 13 Jun 2013

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

File

Apprentissage dans un système d'auto-organisation

Author: Pardoen, M., 4 Sep 2013

Supervisor: Colin, J. (Supervisor)

Student thesis: Master typesMaster of Computer science

File

Press / Media

Diffusion de contenu pornographique sur SnapChat

Jean-Noël Colin

26/05/16

1 media contribution

Press/Media: Expert Comment

Interview pour le Journal Télévisé de RTL-TVI

Jean-Noël Colin

25/02/16

1 media contribution

Press/Media: Expert Comment

Interview pour le journal télévisé de RTL TVI

Jean-Noël Colin

19/02/16

1 media contribution

Press/Media: Expert Comment

Interview Le Soir 21/8/2015

Jean-Noël Colin

21/08/15

1 media contribution

Press/Media: Expert Comment

Interview RTBF sur la cyber sécurité

Jean-Noël Colin

14/04/15

1 media contribution

Press/Media: Expert Comment