A digital licensing model for the exchange of learning objects in a federated environment J Simon, JN Colin Proceedings. First IEEE International Workshop on Electronic Contracting …, 2004 | 28 | 2004 |
Secure ICT services for mobile and wireless communications: a federated global identity management framework J Siddiqi, B Akhgar, M Naderi, W Orth, N Meyer, M Tuisku, G Pipan, ... Third International Conference on Information Technology: New Generations …, 2006 | 25 | 2006 |
PrimAndroid: privacy policy modelling and analysis for android applications G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 24 | 2011 |
A national-scale assessment of climate change impacts on species: assessing the balance of risks and opportunities for multiple taxa JW Pearce-Higgins, CM Beale, TH Oliver, TA August, M Carroll, ... Biological Conservation 213, 124-134, 2017 | 19 | 2017 |
Model-driven Approach for Privacy Management in Business Ecosystem. C Feltus, E Grandry, T Kupper, JN Colin MODELSWARD, 392-400, 2017 | 19 | 2017 |
LIMBS: Open source, open standards, and open content to foster learning resource exchanges JN Colin, D Massart Sixth IEEE International Conference on Advanced Learning Technologies (ICALT …, 2006 | 15 | 2006 |
Adaptive risk-aware access control model for internet of things TA Rath, JN Colin 2017 International Workshop on Secure Internet of Things (SIoT), 40-49, 2017 | 9 | 2017 |
A federated authorization service for bridging learning object distribution models JN Colin, TD Le, D Massart International Conference on Web-Based Learning, 116-125, 2009 | 9 | 2009 |
Authentication, authorisation, and rights management for the CELEBRATE brokerage system JN Colin, J Simon Celebrate Deliverable D 3 (3), 2003 | 9 | 2003 |
Patient privacy preservation: P-RBAC vs OrBAC in patient controlled records type of centralized healthcare information system. case study of walloon healthcare network, belgium AT Rath, JN Colin The Fourth International Conference on eHealth, Telemedicine, and Social …, 2012 | 8 | 2012 |
Celebrate: A federated model for exchange of learning objects J Simon, JN Colin Proc. of the World Conference on E-Learning in Corporate, Government …, 2004 | 8 | 2004 |
Strengthening access control in case of compromised accounts in smart home AT Rath, JN Colin 2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017 | 7 | 2017 |
Towards purpose enforcement model for privacy–aware usage control policy in distributed healthcare AT Rath, JN Colin International Journal of Security and Networks 8 (2), 94-105, 2013 | 7 | 2013 |
Context-aware and attribute-based access control applying proactive computing to IoT system N Picard, JN Colin, D Zampunieris Proceedings of the 3rd International Conference on Internet of Things, Big …, 2018 | 6 | 2018 |
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment AT Rath, JN Colin Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 6 | 2014 |
Protecting personal data: access control for privacy preserving perimeter protection system AT Rath, JN Colin IFIP Annual Conference on Data and Applications Security and Privacy, 233-241, 2015 | 5 | 2015 |
Analogue attacks in e-health: Issues and solutions RT Annanda, JN Colin | 4 | 2012 |
Attacker behavior-based metric for security monitoring applied to darknet analysis L Evrard, J François, JN Colin 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 3 | 2019 |
Access and Usage Control Requirements for Patient Controlled Record Type of Healthcare Information System. AT Rath, JN Colin HEALTHINF, 331-336, 2013 | 3 | 2013 |
A distributed local-optimum distance vector algorithm for the metarouting approach S Dynerowicz, JN Colin, L Schumacher 2011 IEEE International Conference on Communications (ICC), 1-6, 2011 | 3 | 2011 |