Jean-NoŽl Colin
Cited by
Cited by
C Linard, K Tersago, H Leirs, EF Lambin
International Journal of Health Geographics 6, 15, 2007
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
A digital licensing model for the exchange of learning objects in a federated environment
J Simon, JN Colin
Proceedings. First IEEE International Workshop on Electronic Contracting†…, 2004
Secure ICT services for mobile and wireless communications: a federated global identity management framework
J Siddiqi, B Akhgar, M Naderi, W Orth, N Meyer, M Tuisku, G Pipan, ...
Third International Conference on Information Technology: New Generations†…, 2006
Model-driven Approach for Privacy Management in Business Ecosystem.
C Feltus, E Grandry, T Kupper, JN Colin
MODELSWARD, 392-400, 2017
PrimAndroid: privacy policy modelling and analysis for android applications
G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh
2011 IEEE International Symposium on Policies for Distributed Systems and†…, 2011
LIMBS: Open source, open standards, and open content to foster learning resource exchanges
JN Colin, D Massart
Sixth IEEE International Conference on Advanced Learning Technologies (ICALT†…, 2006
Adaptive risk-aware access control model for internet of things
TA Rath, JN Colin
2017 International Workshop on Secure Internet of Things (SIoT), 40-49, 2017
Strengthening access control in case of compromised accounts in smart home
AT Rath, JN Colin
2017 IEEE 13th International Conference on Wireless and Mobile Computing†…, 2017
Context-aware and attribute-based access control applying proactive computing to IoT system
N Picard, JN Colin, D Zampunieris
Proceedings of the 3rd International Conference on Internet of Things, Big†…, 2018
Patient privacy preservation: P-RBAC vs OrBAC in patient controlled records type of centralized healthcare information system. case study of walloon healthcare network, belgium
AT Rath, JN Colin
The 4th International Conference on eHealth, Telemedicine, and Social†…, 2012
A Federated Authorization Service for Bridging Learning Object Distribution Models.
JN Colin, TD Le, D Massart
ICWL, 116-125, 2009
Authentication, authorisation, and rights management for the CELEBRATE brokerage system
JN Colin, J Simon
Celebrate Deliverable D 3 (3), 2003
Blockchain and Internet of Things opportunities and challenges
K Sok, JN Colin, K Po
Proceedings of the 9th International Symposium on Information and†…, 2018
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment
AT Rath, JN Colin
Proceedings of the 8th International Conference on Ubiquitous Information†…, 2014
Celebrate: A federated model for exchange of learning objects
J Simon, JN Colin
Proc. of the World Conference on E-Learning in Corporate, Government†…, 2004
Attacker behavior-based metric for security monitoring applied to darknet analysis
L Evrard, J FranÁois, JN Colin
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM†…, 2019
Internet of Things Opportunities and Challenges
K Sok, JN Colin, KB Po
Proceedings of the Ninth International Symposium on Information and†…, 2018
Towards purpose enforcement model for privacy–aware usage control policy in distributed healthcare
AT Rath, JN Colin
International Journal of Security and Networks 8 (2), 94-105, 2013
Protecting personal data: access control for privacy preserving perimeter protection system
AT Rath, JN Colin
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3†…, 2015
The system can't perform the operation now. Try again later.
Articles 1–20