Publications

Team publications

2019

  • Evrard, L., François, J., & Colin, J.-N. (2019). Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis. Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management 2019.
  • Knockaert, M., & Colin, J.-N. (2019). Le droit à la portabilité des données à caractère personnel: coup d’oeil juridique et technique. DPO News, 1, 3–5.
  • Evrard, L., François, J., Colin, J.-N., & Beck, F. (2019). port2dist: Semantic Port Distances for Network Analytics. Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management 2019.

2018

  • Picard, N., Colin, J.-N., & Zampunieris, D. (2018). Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System. Proceedingsof the Workshop on Security, Privacy, Big Data and Internet of Things SPBDIoT 2018: Within the 3rdInternational Conference on Internet of Things, Big Data and Security - IoTBDS 2018. https://doi.org/10.5220/0006815803330339
  • Sok, K., Colin, J. N., & Po, K. (2018). Blockchain and Internet of Things Opportunities and Challenges. Proceedings of the Ninth International Symposium on Information and Communication Technology, 150–154. https://doi.org/10.1145/3287921.3287933

2017

  • Rath, A. T., & Colin, J. N. (2017). Strengthening access control in case of compromised accounts in smart home. 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 1–8. https://doi.org/10.1109/WiMOB.2017.8115827
  • Rath, T. M. A., & Colin, J. N. (2017, September). Adaptive Risk-aware Access Control Model for Internet of Things. Proceedings of the International Workshop on Secure Internet of Things, in Conjunction with Esorics2017.
  • Feltus, C., Grandry, E., Kupper, T., & Colin, J.-N. (2017). Model-Driven Approach for Privacy Management in Business Ecosystem. In 5th International Conference on Model-Driven Engineering and Software Development.

2016

  • Colin, J.-N. (2016). Du secret à la confiance... quelques éléments de cryptographie. In L’identification électronique et les services de confiance depuis le règlement eIDAS (Vol. 39, pp. 7–28). Larcier.

2015

  • Anido, L., van Assche, F., Colin, J.-N., Ellis, W., Griffiths, D., & Simon, B. (2015). The iTEC Eduteka. Intelligent Systems Reference Library, 84, 115–135. https://doi.org/10.1007/978-3-319-14645-4_6
  • Colin, J.-N., & Hoang, M. T. (2015). Web Information Systems and Technologies International Conference, WEBIST 2014, Revised Selected Papers (V. Monfort & K.-H. Krempels, Eds.). Springer, Lecture Notes in Business Information Processing (LNBIP).
  • Colin, J.-N. (2015). The School IT Administrator Analysing the profile, role and training needs of network administrators in Europe’s schools. European Schoolnet.
  • Colin, J. N., & Hoang, M. T. (2015). Securing a loosely-coupled web-based eLearning ecosystem combining open standards. In Lecture Notes in Business Information Processing (Vol. 226, pp. 48–62). Springer Verlag. https://doi.org/10.1007/978-3-319-27030-2_4
  • Rath, T. M. A., & Colin, J. N. (2015). Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System. In P. Samarati (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9149, pp. 233–241). Springer Verlag. https://doi.org/10.1007/978-3-319-20810-7_16

2014

  • Colin, J.-N., & Hoang, M. T. (2014). Authentication and authorisation for widget-based applications in a loosely-coupled web eLearning environment. Proceedings of the 10th International Conference on Web Information Systems and Technologies (WEBIST 2014).
  • Rath, A. T., & Colin, J.-N. (2014). Modeling and Expressing Purpose Validation Policy for Privacy-aware Usage Control in Distributed Environment. Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 14:1–14:8. https://doi.org/10.1145/2557977.2557991
  • Colin, J.-N., & Hoang, M. T. (2014). UMAC - User Management and Access Control.

2013

  • Van Assche, F., Simon, B., Aram, M., Colin, J.-N., Hoang, M. T., Griffiths, D., Popat, K., Anido-Rifón, L., Caeiro-Rodríguez, M., Santos-Gago, J., Ellis, W., & Klerkx, J. (2013). Re-engineering the uptake of ICT in schools. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Vol. 8095 LNCS (pp. 645–646).
  • Colin, J.-N., & De Terwangne, C. (2013). Notions de "vie privée" et de "protection des données à caractère personnel". In Vie privée et données à caractère personnel (pp. pag. mult.). Politeia.
  • Rath, T. M. A., & Colin, J.-N. (2013). Towards enforcement of purpose for privacy policy in distributed healthcare. 2013 IEEE 10th Consumer Communications and Networking Conference, CCNC 2013, 881–886. https://doi.org/10.1109/CCNC.2013.6488578
  • Rath, T. M. A., & Colin, J.-N. (2013). A purpose model and policy enforcement engine for usage control in distributed healthcare information system. HEALTHINF 2013 - Proceedings of the International Conference on Health Informatics, 174–180.
  • Rath, T. M. A., & Colin, J.-N. (2013). Access and usage control requirements for patient controlled record type of healthcare information system. HEALTHINF 2013 - Proceedings of the International Conference on Health Informatics, 331–336.
  • Rath, T. M. A., & Colin, J.-N. (2013). Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare. International Journal of Security and Networks, 8, 94–105. https://doi.org/10.1504/IJSN.2013.055943

2012

  • Rath, T. M. A., & Colin, J.-N. (2012). Purpose Management and Enforcement for Sensitive Private Data in Open Environments.
  • Thavymony Annanda, R., & Colin, J.-N. (2012). Patient Privacy Preservation: P-RBAC vs OrBAC in Patient Controlled Records Type of Centralized Healthcare Information System. Case study of Walloon Healthcare Network, Belgium.
  • Thavymony Annanda, R., & Colin, J.-N. (2012). Analogue attacks in e-health: Issues and Solutions.

2011

  • Benats, G., Bandara, A., Yu, Y., Colin, J.-N., & Nuseibeh, B. (2011). PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. 2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 129–132. https://doi.org/10.1109/POLICY.2011.25
  • Dynerowicz, S., Colin, J.-N., & Schumacher, L. (2011). A distributed local-optimum distance vector algorithm for the metarouting approach. ICC 2011 Next Generation Networking and Internet Symposium (ICC’11 NGNI).
  • Delgado, J., & Colin, J.-N. (2011). Proceedings of the Virtual Goods + ODRL 2011 Conference: 9th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods. Universitat Politecninca de Catalunya.
  • Colin, J.-N., & de Terwangne, C. (2011). Défis pour la vie privée et la protection des données posés par la technologie : rapport pour l’Assemblée parlementaire du Conseil de l’Europe. Facultés Universitaires Notre-Dame de la Paix.

2010

  • Colin, J. N., & Arnab, A. (Eds.). (2010). Virtual Goods ’10: the 8th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods incorporating the 6th International ODRL Workshop ; September 30th - October 1st 2010, Namur, Belgium. Presses Universitaires de Namur.

2009

  • Mohammed, N., Jalal, R., Colin, J.-N., & Bahaa, K. (2009). Design and Implementation of Iraqi Virtual Library. Proceedings of the 7th International Conference on Education and Information Systems, Technologies and Applications (EISTA 2009).
  • Colin, J.-N., Dung, L. T., & Massart, D. (2009). Mediating Distribution Models and Access Control for the Exchange of Learning Resources. Proceedings of the European Workshop on ELearning Standards Best Practices @ICALT2009, Riga, Latvia, 714–715.
  • Colin, J.-N., Le, T.-D., & Massart, D. (2009). A Federated Authorization Service for Bridging Learning Object Distribution Models. In M. Spaniol, Q. Li, R. Klamma, & R. W. H. Lau (Eds.), Advances in Web Based Learning – ICWL 2009 (Vol. 5686, pp. 116–125). Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-03426-8_15

2008

  • Massart, D., Colin, J.-N., & Van Assche, F. (Eds.). (2008). Proceedings of the Second International Workshop on Search and Exchange of e-le@rning Materials (SE@M’08). CEUR Workshop Proceedings.

2007

  • Colin, J.-N., Massart, D., & Van Assche, F. (Eds.). (2007). Proceedings of the First International Workshop on Learning Object Discovery & Exchange (LODE’07). CEUR Workshop Proceedings.

2006

  • Colin, J.-N., & Massart, D. (2006). LIMBS: Open Source, Open Standards, and Open Content To Foster Learning Resource Exchanges. In C. IEEE Computer Society Los Alamitos (Ed.), Proceedings of the Sixth IEEE International Conference on Advanced Learning Technologies, ICALT’06 (pp. 682–686).
  • Siddiqi, J. I. A., Akhgar, B., Naderi, M., Orth, W., Meyer, N., Tuisku, M., Pipan, G., Gallego, M. L., García, J. A., Cecchi, M., & Colin, J.-N. (2006). Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework. Actes De La Conférence ITNG 2006, 351–357.

2005

  • Simon, J., & Colin, J.-N. (2005, January). A Digital Rights Management system for the exchange of Learning Objects. IEEE Workshop on Digital Rights Management Impact on Consumer Communications.

2004

  • Simon, J., & Colin, J.-N. (2004). Celebrate: A Federated Model for Exchange of Learning Objects. Proceedings of the World Conference on E-Learning in Corp., Govt., Health., & Higher Ed., 886–891.
  • Simon, J., & Colin, J.-N. (2004, July). A Digital Licensing Model for the Exchange of Learning Objects in a Federated Environment. Proceedings of the IEEE International Workshop on Electronic Contracting.
  • Colin, J.-N., & Simon, J. (2004). Celebrate: A Federated Model for Exchange of Learning Objects.